Model continues to grow our team, offerings, and presence. Model Technology Solutions is excited to announce that Mike Brimberry, a regionally...
The Biggest Mindset Shift You Can Make To Improve Security
My name is Jason Rutherford, and I'm the Managing Partner of Model Technology Solutions. The last two years have shifted the landscape of Endpoint...
Transparent and Secure | Operationalizing/Efficient Endpoint Security (Level 5)
This post is part of a multi-part series defining maturity model levels for endpoint devices. Today we will be covering Endpoint Security Level 5....
Investigating Entity Profiles With Microsoft Defender for Identity
This post is a short overview of how you can use Microsoft Defender for Identity to investigate high-alert users in your environment. If your active...
Microsoft Ignite 2021 | Key Updates for Endpoint Management and Security
Microsoft Ignite 2021 Microsoft held their annual Ignite conference at the beginning of November, announcing a slew of new features, functionality,...
All Recent Posts
Generative AI Implications for Law Firms
You’re a managing partner, principal, or senior IT staff at a law firm. Your team is starting to...
Anticipate, Prepare, Protect | A Security Checklist for a Proactive Defense
Navigating the digital landscape demands more than passive measures; it calls for a proactive...
Protecting Healthcare Data on Personal Devices: Strategies and Solutions
In the age of digital healthcare, the proliferation of Bring Your Own Device (BYOD) policies has...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.