<?xml version="1.0" encoding="UTF-8"?>
<root>
  <posts>
    <post_id>295</post_id>
    <post_category_id>1</post_category_id>
    <post_title><![CDATA[What Are DKIM and DMARC – and Why They Matter for Business Email Security]]></post_title>
    <post_content_short><![CDATA[Most email scams don’t start with a virus or a hacked system - they start with an email that looks legitimate. DKIM and DMARC are two simple
but powerful controls that help protect your business from impersonation, phishing and email fraud. Here’s what they are, how they work, and
why they matter.]]></post_content_short>
    <post_icon>https://www.fortitech.com.au/media/website_posts/295/test-(1).png</post_icon>
    <post_content_type>page</post_content_type>
    <post_content_url>https://www.fortitech.com.au/blog/what-are-dkim-and-dmarc-and-why-they-matter-for-business-email-security/</post_content_url>
    <post_date>2026-02-11 04:33:00</post_date>
  </posts>
  <posts>
    <post_id>224</post_id>
    <post_category_id>1</post_category_id>
    <post_title><![CDATA[Stop your emails being rejected by Microsoft 365 and Google]]></post_title>
    <post_content_short><![CDATA[The increasing rise in digital threats has prompted Microsoft 365 and Google to introduce stricter authentication protocols. These
	protocols are not just about enhancing security—they're about protecting your business from the loss of customer trust and potential
	revenue.  Find out how you can ensure your business emails meet these new requirements in our blog.
]]></post_content_short>
    <post_icon>https://www.fortitech.com.au/media/website_posts/224/outlook-logo.png</post_icon>
    <post_content_type>page</post_content_type>
    <post_content_url>https://www.fortitech.com.au/blog/email-authentication-guide-for-microsoft-365-and-google/</post_content_url>
    <post_date>2024-02-28 04:19:00</post_date>
  </posts>
  <posts>
    <post_id>152</post_id>
    <post_category_id>1</post_category_id>
    <post_title><![CDATA[Client Install: Securing a Microsoft 365 tenancy]]></post_title>
    <post_content_short><![CDATA[This week David worked with a legal client to secure their Microsoft 365 tenancy after an access breach. After reaching out to
	FortiTech the company sat with David to discuss their recent breach and work through a plan to secure their Microsoft 365 tenanc, find
	out what we did in our latest blog.
]]></post_content_short>
    <post_icon>https://www.fortitech.com.au/media/website_posts/152/M365-security.jpg</post_icon>
    <post_content_type>page</post_content_type>
    <post_content_url>https://www.fortitech.com.au/blog/client-install-securing-a-microsoft-365-tenancy/</post_content_url>
    <post_date>2022-05-04 09:00:00</post_date>
  </posts>
</root>
