Hello, and welcome to Model Technology Solutions' approach to Unified Endpoint Management. Today we are talking about Security Level 4 of our...
Simulating an Attack and Reviewing Remediation Steps with Microsoft Defender for O365
These days there's many paths that outside attackers can attempt to break into your environment. But by far one of the most-effective methods is by...
Limiting Your Attack Surface with Microsoft Defender for Endpoint
Every day security vulnerabilities in apps create risk for potentially exploitable paths that a malicious actor might attempt to use in order to...
Protecting Your Organization from Shadow IT | Microsoft Defender for Cloud Apps
In this post, we're going to talk about how to protect your organization from unsanctioned applications using policies with Microsoft Defender for...
How To Securely Expose Internal Applications to the Outside World
Hey everyone, Jason Rutherford here with Model Technology Solutions. Today we're going to talk about how to configure an external app proxy. Using...
All Recent Posts
Anticipate, Prepare, Protect | A Security Checklist for a Proactive Defense
Navigating the digital landscape demands more than passive measures; it calls for a proactive...
Protecting Healthcare Data on Personal Devices: Strategies and Solutions
In the age of digital healthcare, the proliferation of Bring Your Own Device (BYOD) policies has...
The Essential Role of Intune Management and Patching Strategies in Healthcare IT
In healthcare IT, the management of devices and applications is paramount, more so today as IT...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.