<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>How To Guides</title>
	<atom:link href="https://pip.com.au/category/how-to-guides/feed/" rel="self" type="application/rss+xml" />
	<link>https://pip.com.au</link>
	<description></description>
	<lastBuildDate>Sun, 08 Feb 2026 11:23:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://pip.com.au/wp-content/uploads/2025/02/cropped-PIP-fb3-32x32.jpg</url>
	<title>How To Guides</title>
	<link>https://pip.com.au</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Microsoft 365 Migration Checklist: Full Guide to Migrate</title>
		<link>https://pip.com.au/migrate-to-microsoft-365-overnight-full-checklist/</link>
					<comments>https://pip.com.au/migrate-to-microsoft-365-overnight-full-checklist/#comments</comments>
		
		<dc:creator><![CDATA[PIP]]></dc:creator>
		<pubDate>Thu, 28 Aug 2025 02:53:43 +0000</pubDate>
				<category><![CDATA[Front Page]]></category>
		<category><![CDATA[How To Guides]]></category>
		<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[365]]></category>
		<category><![CDATA[checlist]]></category>
		<category><![CDATA[exchange]]></category>
		<category><![CDATA[Microsft]]></category>
		<category><![CDATA[migrating]]></category>
		<category><![CDATA[migration]]></category>
		<category><![CDATA[onpremise]]></category>
		<category><![CDATA[overnight]]></category>
		<guid isPermaLink="false">https://pip.com.au/?p=3257</guid>

					<description><![CDATA[Migrating from on-premise Microsoft Office suite of products, including on-premises Exchange Server or other IMAP Email services can be achieved [&#8230;]
<p><a href="https://pip.com.au/migrate-to-microsoft-365-overnight-full-checklist/">Source</a></p>]]></description>
		
					<wfw:commentRss>https://pip.com.au/migrate-to-microsoft-365-overnight-full-checklist/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft 365 Security: A Cyber Security Solution for Businesses</title>
		<link>https://pip.com.au/microsoft-365-a-cyber-security-solution-for-businesses/</link>
					<comments>https://pip.com.au/microsoft-365-a-cyber-security-solution-for-businesses/#comments</comments>
		
		<dc:creator><![CDATA[PIP]]></dc:creator>
		<pubDate>Thu, 14 Aug 2025 01:05:38 +0000</pubDate>
				<category><![CDATA[Front Page]]></category>
		<category><![CDATA[How To Guides]]></category>
		<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[365]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[essential 8]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[microsoft 365]]></category>
		<category><![CDATA[office 365]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://pip.com.au/?p=5707</guid>

					<description><![CDATA[Microsoft 365 as a Complete Cyber Security Solution for Australian Businesses &#8211; Why this matters now. Australian organisations—especially SMBs—are operating [&#8230;]
<p><a href="https://pip.com.au/microsoft-365-a-cyber-security-solution-for-businesses/">Source</a></p>]]></description>
		
					<wfw:commentRss>https://pip.com.au/microsoft-365-a-cyber-security-solution-for-businesses/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Deploying Yealink Teams Devices: Best Practice</title>
		<link>https://pip.com.au/deploying-yealink-devices-for-microsoft-teams-best-practice/</link>
					<comments>https://pip.com.au/deploying-yealink-devices-for-microsoft-teams-best-practice/#comments</comments>
		
		<dc:creator><![CDATA[PIP]]></dc:creator>
		<pubDate>Thu, 24 Jul 2025 21:02:37 +0000</pubDate>
				<category><![CDATA[Front Page]]></category>
		<category><![CDATA[How To Guides]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[microsoft 365]]></category>
		<category><![CDATA[office 365]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[teams]]></category>
		<category><![CDATA[Video Conferencing]]></category>
		<category><![CDATA[yealink]]></category>
		<guid isPermaLink="false">https://pip.com.au/?p=5664</guid>

					<description><![CDATA[As hybrid work becomes the norm, organisations are investing in communication platforms that are secure, scalable, and easy to manage. [&#8230;]
<p><a href="https://pip.com.au/deploying-yealink-devices-for-microsoft-teams-best-practice/">Source</a></p>]]></description>
		
					<wfw:commentRss>https://pip.com.au/deploying-yealink-devices-for-microsoft-teams-best-practice/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Unlocking VoIP: 10 Hidden Gems Inside Your Phone System</title>
		<link>https://pip.com.au/unlocking-voip-10-hidden-gems-inside-your-phone-system/</link>
		
		<dc:creator><![CDATA[PIP]]></dc:creator>
		<pubDate>Wed, 23 Jul 2025 08:30:52 +0000</pubDate>
				<category><![CDATA[Front Page]]></category>
		<category><![CDATA[How To Guides]]></category>
		<category><![CDATA[PIP News]]></category>
		<guid isPermaLink="false">https://pip.com.au/?p=5651</guid>

					<description><![CDATA[Think your VoIP phone is just for making calls? Think again. In Australia, the shift to VoIP (Voice over Internet [&#8230;]
<p><a href="https://pip.com.au/unlocking-voip-10-hidden-gems-inside-your-phone-system/">Source</a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>What is ASD essential 8? Your complete Cyber Security guide.</title>
		<link>https://pip.com.au/what-is-asd-essential-8-your-complete-cyber-security-guide/</link>
					<comments>https://pip.com.au/what-is-asd-essential-8-your-complete-cyber-security-guide/#comments</comments>
		
		<dc:creator><![CDATA[PIP]]></dc:creator>
		<pubDate>Sat, 26 Apr 2025 01:04:41 +0000</pubDate>
				<category><![CDATA[Front Page]]></category>
		<category><![CDATA[How To Guides]]></category>
		<category><![CDATA[asd]]></category>
		<category><![CDATA[australian]]></category>
		<category><![CDATA[business]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[essential 8]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://pip.com.au/?p=5107</guid>

					<description><![CDATA[&#8220;Safeguard your businesses against cyber threats such as hackers, ransomware, and data breaches. The essential eight mitigation strategies establishes robust [&#8230;]
<p><a href="https://pip.com.au/what-is-asd-essential-8-your-complete-cyber-security-guide/">Source</a></p>]]></description>
		
					<wfw:commentRss>https://pip.com.au/what-is-asd-essential-8-your-complete-cyber-security-guide/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
		<item>
		<title>What is DMARC &#8211; (Domain-based Message Authentication, Reporting, and Conformance)</title>
		<link>https://pip.com.au/what-is-dmarc-domain-based-message-authentication-reporting-and-conformance/</link>
		
		<dc:creator><![CDATA[PIP]]></dc:creator>
		<pubDate>Thu, 26 Sep 2024 02:02:19 +0000</pubDate>
				<category><![CDATA[How To Guides]]></category>
		<category><![CDATA[dkim]]></category>
		<category><![CDATA[dmarc]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[mail]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[spf]]></category>
		<guid isPermaLink="false">https://pip.com.au/?p=3557</guid>

					<description><![CDATA[What is DMARC ? DMARC (Domain-based Message Authentication, Reporting, and Conformance), is an email authentication protocol designed to give email [&#8230;]
<p><a href="https://pip.com.au/what-is-dmarc-domain-based-message-authentication-reporting-and-conformance/">Source</a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>What are DomainKeys Identified Mail &#8211; DKIM records ?</title>
		<link>https://pip.com.au/what-are-domainkeys-identified-mail-dkim-records/</link>
		
		<dc:creator><![CDATA[PIP]]></dc:creator>
		<pubDate>Mon, 23 Sep 2024 21:51:15 +0000</pubDate>
				<category><![CDATA[How To Guides]]></category>
		<category><![CDATA[dkim]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[mail]]></category>
		<category><![CDATA[records]]></category>
		<guid isPermaLink="false">https://pip.com.au/?p=3530</guid>

					<description><![CDATA[What is DomainKeys Identified Mail &#8211; DKIM ? DKIM is an email authentication protocol designed to detect email spoofing. It [&#8230;]
<p><a href="https://pip.com.au/what-are-domainkeys-identified-mail-dkim-records/">Source</a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>What are Send Policy Framework &#8211; SPF Records ?</title>
		<link>https://pip.com.au/what-are-send-policy-framework-spf-records/</link>
		
		<dc:creator><![CDATA[PIP]]></dc:creator>
		<pubDate>Wed, 18 Sep 2024 23:33:45 +0000</pubDate>
				<category><![CDATA[How To Guides]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[domain]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[emails]]></category>
		<category><![CDATA[mail]]></category>
		<category><![CDATA[recod]]></category>
		<category><![CDATA[records]]></category>
		<category><![CDATA[servr]]></category>
		<category><![CDATA[smtp]]></category>
		<category><![CDATA[spf]]></category>
		<guid isPermaLink="false">https://pip.com.au/?p=3523</guid>

					<description><![CDATA[What is Sender Policy Framework SPF ? The Sender Policy Framework (SPF) is an email verification method intended to prevent [&#8230;]
<p><a href="https://pip.com.au/what-are-send-policy-framework-spf-records/">Source</a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>What is ISO 27000 and ISO 27001 &#8211; A Definitive Guide</title>
		<link>https://pip.com.au/what-is-iso-27000-and-iso-27001-a-definitive-guide/</link>
		
		<dc:creator><![CDATA[PIP]]></dc:creator>
		<pubDate>Fri, 12 Jul 2024 11:14:14 +0000</pubDate>
				<category><![CDATA[How To Guides]]></category>
		<category><![CDATA[iso27000]]></category>
		<category><![CDATA[iso27001]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://pip.com.au/?p=3506</guid>

					<description><![CDATA[The ISO/IEC 27000-series, also known as the &#8216;ISMS Family of Standards&#8217; or &#8216;ISO27k&#8217; for short, comprises information security standards published [&#8230;]
<p><a href="https://pip.com.au/what-is-iso-27000-and-iso-27001-a-definitive-guide/">Source</a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>FIX: Emails Not Received or Disappearing from Outlook</title>
		<link>https://pip.com.au/fix-emails-not-received-or-disappearing-from-outlook/</link>
		
		<dc:creator><![CDATA[PIP]]></dc:creator>
		<pubDate>Thu, 20 Jun 2024 02:38:09 +0000</pubDate>
				<category><![CDATA[How To Guides]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[filters]]></category>
		<category><![CDATA[lost]]></category>
		<category><![CDATA[micrososft]]></category>
		<category><![CDATA[Outlook]]></category>
		<category><![CDATA[spam]]></category>
		<guid isPermaLink="false">https://pip.com.au/?p=3501</guid>

					<description><![CDATA[Microsoft Outlook is the worlds leading Email client, used extensively worldwide from home users to Enterprise corporations. It now boasts [&#8230;]
<p><a href="https://pip.com.au/fix-emails-not-received-or-disappearing-from-outlook/">Source</a></p>]]></description>
		
		
		
			</item>
	</channel>
</rss>
