Blog
Featured Articles
![[Case Study] Helping a Leading Healthcare Data and Analytics Firm Boost Their Cybersecurity and Get More Business](https://b2186977.smushcdn.com/2186977/wp-content/uploads/2023/08/Featured-Image-Template-1-1080x675.jpg?lossy=0&strip=0&webp=1)
[Case Study] Helping a Leading Healthcare Data and Analytics Firm Boost Their Cybersecurity and Get More Business
When it comes to patient health information, more security isn't just better, it's must. As...

Model Receives Microsoft Solutions Partner for Modern Work Designation
Looking for a Microsoft partner with the expertise and experience to help you ease into hybrid...
Category
Endpoint Management
[Case Study] Helping a Leading Healthcare Data and Analytics Firm Boost Their Cybersecurity and Get More Business
When it comes to patient health information, more security isn't just better, it's must. As cybercrime becomes more innovative, any organization dealing with healthcare data has to be at the top of their game with data security....
Well-Defined and Centralized | Operationalizing/Efficient Management Infrastructure (Level 5)
Welcome to Model's Approach to Unified Endpoint Management. This is the final post in our Management Infrastructure Maturity Model series, which is series of posts and videos we’ve done about our proprietary approach to UEM and...
Advanced Reporting with Microsoft Graph API and Power BI | Microsoft Intune Reporting Series, Part Four
Welcome to the fourth post in our Microsoft Intune Reporting series. In our first post, we introduced Intune’s reporting framework and core concepts, then dove in to identify and discuss the various Operational reports strewn...
Category
Cybersecurity
[Case Study] Helping a Leading Healthcare Data and Analytics Firm Boost Their Cybersecurity and Get More Business
When it comes to patient health information, more security isn't just better, it's must. As cybercrime becomes more innovative, any organization dealing with healthcare data has to be at the top of their game with data security....
How M365 Protects Sensitive Data
In today’s collaborative, work-from-anywhere world, files containing your company’s sensitive information – whether it be confidential business data or customer records often leave the four walls of your office. An employee may...
How M365 Helps Guard Against Phishing Attacks
Phishing is a form of fraud in which an attacker masquerades as a reputable person or company in email or other electronic communication channels. A common phishing tactic is to send an email with a forged return address, so...
Category
Windows
Should You Upgrade to Windows 11 Yet? [March 2022]
We're now six months into the release of Windows 11. You've probably asked yourself at least once, "Should I consider upgrading my devices yet?" Maybe you're somewhat skeptical of new OS updates, especially of entirely new...
Microsoft Ignite 2021 | Key Updates for Endpoint Management and Security
Microsoft Ignite 2021 Microsoft held their annual Ignite conference at the beginning of November, announcing a slew of new features, functionality, and technology coming to the Microsoft 365 ecosystem. These changes run the...
How To Install Windows 21H1 Upgrades Using Windows Updates for Business [2021]
The Windows 10 21H1 operating system upgrade adds some new features to Windows 10 that are valuable for IT professionals. Some of these include: Windows Hello Multicamera SupportWindows Defender Application Guard PerformanceWMI...
Category
News and Press Releases
Model Receives Microsoft Solutions Partner for Modern Work Designation
Looking for a Microsoft partner with the expertise and experience to help you ease into hybrid work and implement or optimize Microsoft 365 in your environment? Model Technology Solutions recently received the designation as a...
Well-Defined and Centralized | Operationalizing/Efficient Management Infrastructure (Level 5)
Welcome to Model's Approach to Unified Endpoint Management. This is the final post in our Management Infrastructure Maturity Model series, which is series of posts and videos we’ve done about our proprietary approach to UEM and...
Mike Brimberry Leads Model’s Cybersecurity and Support Services Expansion
Model continues to grow our team, offerings, and presence. Model Technology Solutions is excited to announce that Mike Brimberry, a regionally recognized cybersecurity expert, has joined Model as Director of Cybersecurity and...
Category
Customer Success Stories
[Case Study] Helping a Leading Healthcare Data and Analytics Firm Boost Their Cybersecurity and Get More Business
When it comes to patient health information, more security isn't just better, it's must. As cybercrime becomes more innovative, any organization dealing with healthcare data has to be at the top of their game with data security....
[Case Study] Helping A $30 Billion Bank Shut Down Vulnerabilities & Inefficiencies
Between increasing cybercrime and meeting regulatory standards, many financial institutions are concerned about their security posture. One of our clients, a $30 billion bank with locations in multiple U.S. states, was no...
[Case Study] Helping Cornerstone Home Lending Automate Patching & Spend More Time At Home
Cornerstone is a nationwide company with about 100 locations across the U.S. and 2,300 endpoints to manage. Their internal team was made up of 7 then-burnt-out IT professionals who were trying to keep up with their necessary...
more categories
Other Subjects
Microsoft Intune →
Microsoft Azure →
Microsoft Powershell →
microsoft orchestrator →
Endpoint Configuration Manager (MECM/SCCM) →
system center operations manager (SCOM) →
Service management automation (SMA) →
structured query language (sql) →
Operations Management Suite (OMS) →