Hello, and welcome to Model Technology Solutions' approach to Unified Endpoint Management. Today we are talking about Security Level 4 of our...

Hello, and welcome to Model Technology Solutions' approach to Unified Endpoint Management. Today we are talking about Security Level 4 of our...
These days there's many paths that outside attackers can attempt to break into your environment. But by far one of the most-effective methods is by...
Every day security vulnerabilities in apps create risk for potentially exploitable paths that a malicious actor might attempt to use in order to...
In this post, we're going to talk about how to protect your organization from unsanctioned applications using policies with Microsoft Defender for...
Hey everyone, Jason Rutherford here with Model Technology Solutions. Today we're going to talk about how to configure an external app proxy. Using...
If you’re a managing partner, principal, or senior IT staff at a law firm, an intentional,...
As a managing partner, principal, or senior IT staff at a law firm, you’re a prime target for...
You’re a managing partner, principal, or senior IT staff at a law firm. Your team is starting to...
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.