Step-by-step security improvements for non-technical managers
Out-of-the-box Microsoft 365 is shockingly insecure. Microsoft ships with security features turned OFF by default because they don't want to "inconvenience" users during trial periods.
This means your tenant right now is probably vulnerable to:
In this 30-minute course, you'll make 5 critical security changes that will:
Best part: You don't need to be technical. Just follow the screenshots.
Why this matters: 58% of breaches start with stolen passwords. MFA blocks 99.9% of automated attacks. This is the single most important setting.
Open the Microsoft Entra admin center
Go to https://entra.microsoft.com
(You must be a Global Administrator to do this)
Navigate to Security Defaults
Left sidebar: Protection → Authentication methods → Policies
Enable Security Defaults
Click "Security defaults" → Toggle to "Enabled"
This will require MFA for all users (including you!)
Notify your team
Send an email: "Starting [date], you'll need to set up MFA. Download the Microsoft Authenticator app on your phone. You'll be prompted to set up on your next login."
Expected pushback from team:
"This is annoying. Why do we need this?"
Your response: "Our cyber insurance requires it. Also, we don't want to be the next company on the news that got hacked. It's a one-time 2-minute setup, then just a tap on your phone each login."
Why this matters: By default, users can share files with "Anyone with the link"—meaning the file is publicly accessible to the entire internet. This has led to countless data breaches where confidential files were accidentally shared publicly.
Open SharePoint admin center
Go to https://admin.microsoft.com → Click "SharePoint"
Go to Policies → Sharing
Left sidebar: Policies → Sharing
Change external sharing settings
Under "SharePoint": Move the slider to "New and existing guests"
Under "OneDrive": Move the slider to "New and existing guests"
This means users can share with specific people outside your organization (by entering their email), but NOT with "Anyone with the link".
Set expiration dates
Scroll down to "Advanced settings" → Enable "Links must expire within this many days" → Set to 30 days
Click Save at the bottom
Why this matters: 91% of cyberattacks start with phishing. Adding a visual warning banner to external emails helps users spot suspicious messages.
Open Exchange admin center
Go to https://admin.exchange.microsoft.com
Go to Mail flow → Rules
Left sidebar: Mail flow → Rules
Create a new rule
Click "+ Add a rule" → "Create a new rule"
Name: External Email Warning
Apply this rule if: The sender is located → Outside the organization
Do the following: Prepend the subject → [EXTERNAL]
Click Save
What users will see:
All emails from outside your organization will have [EXTERNAL] in the subject line. This helps spot phishing attempts claiming to be from "Your CEO" or "IT Department".
Why this matters: When employees leave, their Microsoft 365 account often stays active for weeks or months. This wastes money AND creates a security risk (former employees can still access company data).
Create an offboarding checklist (right now!)
Open a Word doc or Google Doc and title it "Employee Offboarding Checklist"
Add these steps to the checklist:
□ Remove user from Microsoft 365 (admin.microsoft.com → Active users → Delete)
□ Convert mailbox to shared mailbox (preserves emails, costs $0)
□ Remove from all Teams and SharePoint sites
□ Reset password immediately (prevents login while you clean up access)
□ Collect any company devices (laptop, phone)
Save this checklist somewhere obvious
Put it in your HR folder, pin it in Teams, email it to yourself. When someone leaves, you'll know exactly what to do.
Why this matters: Microsoft Secure Score gives you a free, real-time security scorecard (0-100). It shows exactly what security settings are missing and how to fix them. Think of it as a "check engine light" for your Microsoft 365 security.
Open Microsoft Secure Score
Go to https://security.microsoft.com/securescore
Review your current score
You'll see a number like "42/100" or "67/100". Don't panic if it's low—most SMBs start at 30-50.
Click "Recommended actions"
This shows you the top security improvements you should make, sorted by impact. Each action has a step-by-step guide.
Bookmark this page and check it monthly
Set a calendar reminder to review your Secure Score on the 1st of every month. Goal: improve by 5-10 points per month.
Target Scores:
You've just made 5 critical security improvements that will protect your business from the most common threats.
You blocked:
99.9% of automated attacks
You prevented:
Accidental data leaks
You gained:
Security visibility
This mini-course covered 5 settings. There are 42 more security improvements you should make. Get your free comprehensive security assessment.
Get Free Security Score →Even with these 5 settings, you may not meet all cyber insurance requirements. Use our checklist to see what else is needed.
View Insurance Checklist →TSSAC's Core Membership includes hands-on help implementing these settings plus ongoing monitoring and support.
View Pricing →Found this helpful? Share it with other business owners: