{"id":1160,"date":"2021-02-17T21:42:20","date_gmt":"2021-02-18T02:42:20","guid":{"rendered":"https:\/\/www.is-t.net\/blog\/?p=1160"},"modified":"2022-07-31T11:50:34","modified_gmt":"2022-07-31T16:50:34","slug":"office-365-security-configuration","status":"publish","type":"post","link":"https:\/\/www.is-t.net\/blog\/office-365-security-configuration\/","title":{"rendered":"The Importance Of Properly Configuring Office 365 For The Tightest Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1160\" class=\"elementor elementor-1160\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b5b3c00 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b5b3c00\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8da8510\" data-id=\"8da8510\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7652b89 elementor-widget elementor-widget-text-editor\" data-id=\"7652b89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Whether large or small, businesses throughout the nation are finding maximized productivity and streamlined operations by implementing <a href=\"https:\/\/www.is-t.net\/managed-it-services-houston-tx\/microsoft-office-365\">Microsoft\u2019s Office 365 cloud solutions<\/a>. Office 365 offers the same great Microsoft applications, products, and services businesses have come to expect and love, but with the added convenience, intelligence, and connectivity features of the cloud.<\/p><p>But for many businesses who have yet to take the leap to cloud-based solutions, security is often cited as a major concern. Is moving your business to the cloud safe? The answer is yes, but only if the proper configurations are made and all security-related tasks and best practices are followed. Moving to 365 is something that can be done by your <a href=\"https:\/\/www.is-t.net\/managed-it-services-houston-tx\">managed IT service company<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92335ca elementor-widget elementor-widget-image\" data-id=\"92335ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/02\/Office365SecurityAndConfiguration2_IST.jpg\" class=\"attachment-large size-large wp-image-1163\" alt=\"Office 365 Seucrity &amp; Configuration Services\" srcset=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/02\/Office365SecurityAndConfiguration2_IST.jpg 800w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/02\/Office365SecurityAndConfiguration2_IST-300x150.jpg 300w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/02\/Office365SecurityAndConfiguration2_IST-768x384.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-996286c elementor-widget elementor-widget-heading\" data-id=\"996286c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.is-t.net\/blog\/office-365-security-configuration\/#Configurations_to_Office_365\" >Configurations to Office 365<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.is-t.net\/blog\/office-365-security-configuration\/#Security_Tasks\" >Security Tasks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.is-t.net\/blog\/office-365-security-configuration\/#Security_Best_Practices\" >Security Best Practices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.is-t.net\/blog\/office-365-security-configuration\/#Office_365_Experts\" >Office 365 Experts<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"elementor-heading-title elementor-size-medium\"><span class=\"ez-toc-section\" id=\"Configurations_to_Office_365\"><\/span>Configurations to Office 365\n<span class=\"ez-toc-section-end\"><\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c3d07c elementor-widget elementor-widget-text-editor\" data-id=\"0c3d07c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Office 365 features a variety of settings, features, and functions that help to protect your organization\u2019s security. However, not all of the security configurations available within Office 365 are automatically enabled. Admins and users must customize configurations to optimize security according to their business\u2019s specific needs. Business owners can ensure better security by taking the following proactive steps:<\/p><ul><li>Setting up multi-factor authentication<\/li><li>Using dedicated admin accounts<\/li><li>Configure mail settings for optimum cybersecurity protection against malware, ransomware, and phishing attacks<\/li><li>Configure mailbox encryption settings<\/li><li>Enable Safe Links and Safe Attachments settings<\/li><\/ul><p>Knowing which settings to enable and how to configure the various features Office 365 has to offer can be difficult for the average user. Often, to achieve the best possible configuration, an expert is needed.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d6adc3 elementor-widget elementor-widget-heading\" data-id=\"8d6adc3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Security_Tasks\"><\/span>Security Tasks\n<span class=\"ez-toc-section-end\"><\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fee2c6f elementor-widget elementor-widget-text-editor\" data-id=\"fee2c6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In addition to configuring settings within Office 365, there are general security maintenance tasks that need to be done regularly to ensure optimal performance and security. Some of these tasks include updating software regularly, consistently ensuring security compliance for changing industry\/government regulations, and having a reliable<a href=\"https:\/\/www.is-t.net\/blog\/business-backup-disaster-recovery-plan\/\"> backup and disaster recovery solution<\/a>. Depending on how your business utilizes Office 365, there may be other maintenance steps to take.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3900c21 elementor-widget elementor-widget-image\" data-id=\"3900c21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/02\/Office365SecurityAndConfiguration1_IST.jpg\" class=\"attachment-large size-large wp-image-1162\" alt=\"You Can use Office 365 on any device\" srcset=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/02\/Office365SecurityAndConfiguration1_IST.jpg 800w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/02\/Office365SecurityAndConfiguration1_IST-300x150.jpg 300w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/02\/Office365SecurityAndConfiguration1_IST-768x384.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c0e3cd elementor-widget elementor-widget-heading\" data-id=\"1c0e3cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Security_Best_Practices\"><\/span>Security Best Practices\n<span class=\"ez-toc-section-end\"><\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-968c1ae elementor-widget elementor-widget-text-editor\" data-id=\"968c1ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Admins and employees should be educated on security best practices so when they\u2019re working in the cloud, they do not expose your business systems to cyber security risks. Some of the best practices that all users should follow include:<\/p><ul><li>Using strong passwords<\/li><li>Changing passwords regularly<\/li><li>Enabling available security features on devices<\/li><li>Avoiding suspicious links, emails, and websites<\/li><\/ul><p>For many business owners, the process of configuring Office 365, performing the recommended security tasks, and teaching employees the right security measures for everyday use seems too daunting. That\u2019s why working with an expert is the ideal solution. By partnering with an experienced third-party provider who knows the ins and outs of Office 365, your business can experience the benefits of the cloud without the frustration of choosing a plan, migrating business data, and setting up the proper configuration.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf75fa8 elementor-widget elementor-widget-heading\" data-id=\"cf75fa8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Office_365_Experts\"><\/span> Office 365 Experts\n<span class=\"ez-toc-section-end\"><\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1542109 elementor-widget elementor-widget-text-editor\" data-id=\"1542109\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>When you find a competent provider that offers Office 365 solutions for your needs not only will they provide expert advice on which Office 365 plan would be the best fit for your business, but they should also have the experience to easily migrate your business systems, mailboxes, and data to ensure a seamless transition. During this process its important that implement a proper configuration to ensure your Office 365 solution is optimized for the best possible security. They should also have the ability to help maintain your office 365 security with ongoing maintenance, updates, and more.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Whether large or small, businesses throughout the nation are finding maximized productivity and streamlined operations by implementing Microsoft\u2019s Office 365 cloud solutions. Office 365 offers the same great Microsoft applications, products, and services businesses have come to expect and love, but with the added convenience, intelligence, and connectivity features of the cloud. But for many [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-1160","post","type-post","status-publish","format-standard","hentry","category-managed-services"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Expert Office 365 Implementation, Security Configuration &amp; Maintenance<\/title>\n<meta name=\"description\" content=\"Don&#039;t be overwhelmed by the daunting task of switching to cloud based computing. Allow the experts at IS&amp;T to implement the proper Office 365 plan to your business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.is-t.net\/blog\/office-365-security-configuration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Expert Office 365 Implementation, Security Configuration &amp; Maintenance\" \/>\n<meta property=\"og:description\" content=\"Don&#039;t be overwhelmed by the daunting task of switching to cloud based computing. Allow the experts at IS&amp;T to implement the proper Office 365 plan to your business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.is-t.net\/blog\/office-365-security-configuration\/\" \/>\n<meta property=\"og:site_name\" content=\"IS&amp;T Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-18T02:42:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-31T16:50:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/02\/Office365SecurityAndConfiguration2_IST.jpg\" \/>\n<meta name=\"author\" content=\"Scott Lard\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Lard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/office-365-security-configuration\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/office-365-security-configuration\\\/\"},\"author\":{\"name\":\"Scott Lard\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/person\\\/01b75441ccfa116bc0ca0750c112b0fa\"},\"headline\":\"The Importance Of Properly Configuring Office 365 For The Tightest Security\",\"datePublished\":\"2021-02-18T02:42:20+00:00\",\"dateModified\":\"2022-07-31T16:50:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/office-365-security-configuration\\\/\"},\"wordCount\":555,\"publisher\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/office-365-security-configuration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Office365SecurityAndConfiguration2_IST.jpg\",\"articleSection\":[\"Managed Services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/office-365-security-configuration\\\/\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/office-365-security-configuration\\\/\",\"name\":\"Expert Office 365 Implementation, Security Configuration & Maintenance\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/office-365-security-configuration\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/office-365-security-configuration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Office365SecurityAndConfiguration2_IST.jpg\",\"datePublished\":\"2021-02-18T02:42:20+00:00\",\"dateModified\":\"2022-07-31T16:50:34+00:00\",\"description\":\"Don't be overwhelmed by the daunting task of switching to cloud based computing. Allow the experts at IS&T to implement the proper Office 365 plan to your business.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/office-365-security-configuration\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.is-t.net\\\/blog\\\/office-365-security-configuration\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/office-365-security-configuration\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Office365SecurityAndConfiguration2_IST.jpg\",\"contentUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Office365SecurityAndConfiguration2_IST.jpg\",\"width\":800,\"height\":400,\"caption\":\"Office 365 Seucrity & Configuration Services\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/office-365-security-configuration\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Importance Of Properly Configuring Office 365 For The Tightest Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/\",\"name\":\"IS&amp;T Blog\",\"description\":\"News for nerds, stuff that matters\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#organization\",\"name\":\"IS&T Consulting Group, LLC\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ist-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ist-logo.png\",\"width\":125,\"height\":47,\"caption\":\"IS&T Consulting Group, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/person\\\/01b75441ccfa116bc0ca0750c112b0fa\",\"name\":\"Scott Lard\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g\",\"caption\":\"Scott Lard\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Expert Office 365 Implementation, Security Configuration & Maintenance","description":"Don't be overwhelmed by the daunting task of switching to cloud based computing. Allow the experts at IS&T to implement the proper Office 365 plan to your business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.is-t.net\/blog\/office-365-security-configuration\/","og_locale":"en_US","og_type":"article","og_title":"Expert Office 365 Implementation, Security Configuration & Maintenance","og_description":"Don't be overwhelmed by the daunting task of switching to cloud based computing. Allow the experts at IS&T to implement the proper Office 365 plan to your business.","og_url":"https:\/\/www.is-t.net\/blog\/office-365-security-configuration\/","og_site_name":"IS&amp;T Blog","article_published_time":"2021-02-18T02:42:20+00:00","article_modified_time":"2022-07-31T16:50:34+00:00","og_image":[{"url":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/02\/Office365SecurityAndConfiguration2_IST.jpg","type":"","width":"","height":""}],"author":"Scott Lard","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Lard","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.is-t.net\/blog\/office-365-security-configuration\/#article","isPartOf":{"@id":"https:\/\/www.is-t.net\/blog\/office-365-security-configuration\/"},"author":{"name":"Scott Lard","@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/person\/01b75441ccfa116bc0ca0750c112b0fa"},"headline":"The Importance Of Properly Configuring Office 365 For The Tightest Security","datePublished":"2021-02-18T02:42:20+00:00","dateModified":"2022-07-31T16:50:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.is-t.net\/blog\/office-365-security-configuration\/"},"wordCount":555,"publisher":{"@id":"https:\/\/www.is-t.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.is-t.net\/blog\/office-365-security-configuration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/02\/Office365SecurityAndConfiguration2_IST.jpg","articleSection":["Managed Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.is-t.net\/blog\/office-365-security-configuration\/","url":"https:\/\/www.is-t.net\/blog\/office-365-security-configuration\/","name":"Expert Office 365 Implementation, Security Configuration & Maintenance","isPartOf":{"@id":"https:\/\/www.is-t.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.is-t.net\/blog\/office-365-security-configuration\/#primaryimage"},"image":{"@id":"https:\/\/www.is-t.net\/blog\/office-365-security-configuration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/02\/Office365SecurityAndConfiguration2_IST.jpg","datePublished":"2021-02-18T02:42:20+00:00","dateModified":"2022-07-31T16:50:34+00:00","description":"Don't be overwhelmed by the daunting task of switching to cloud based computing. Allow the experts at IS&T to implement the proper Office 365 plan to your business.","breadcrumb":{"@id":"https:\/\/www.is-t.net\/blog\/office-365-security-configuration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.is-t.net\/blog\/office-365-security-configuration\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.is-t.net\/blog\/office-365-security-configuration\/#primaryimage","url":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/02\/Office365SecurityAndConfiguration2_IST.jpg","contentUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/02\/Office365SecurityAndConfiguration2_IST.jpg","width":800,"height":400,"caption":"Office 365 Seucrity & Configuration Services"},{"@type":"BreadcrumbList","@id":"https:\/\/www.is-t.net\/blog\/office-365-security-configuration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.is-t.net\/blog\/"},{"@type":"ListItem","position":2,"name":"The Importance Of Properly Configuring Office 365 For The Tightest Security"}]},{"@type":"WebSite","@id":"https:\/\/www.is-t.net\/blog\/#website","url":"https:\/\/www.is-t.net\/blog\/","name":"IS&amp;T Blog","description":"News for nerds, stuff that matters","publisher":{"@id":"https:\/\/www.is-t.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.is-t.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.is-t.net\/blog\/#organization","name":"IS&T Consulting Group, LLC","url":"https:\/\/www.is-t.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2019\/04\/ist-logo.png","contentUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2019\/04\/ist-logo.png","width":125,"height":47,"caption":"IS&T Consulting Group, LLC"},"image":{"@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/person\/01b75441ccfa116bc0ca0750c112b0fa","name":"Scott Lard","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g","caption":"Scott Lard"}}]}},"_links":{"self":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts\/1160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/comments?post=1160"}],"version-history":[{"count":18,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts\/1160\/revisions"}],"predecessor-version":[{"id":3575,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts\/1160\/revisions\/3575"}],"wp:attachment":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/media?parent=1160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/categories?post=1160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/tags?post=1160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}