Hi everyone. Welcome. My name is Jason Rutherford and I'm the Managing Partner for Model Technology Solutions. Today I'm going to show you...
Partially Secured | Defined Endpoint Security (Level 3)
Welcome to Model's approach to Unified Endpoint Management Maturity Model overview series! My name is Jason Ruthford and I'm the managing partner of...
Handling Windows 10 Updates and Compliance Issues in a WFH Environment
The modern office has been mobile for some time, but it took a global pandemic to really drive home the point. While laptop and mobile devices have...
Cybersecurity: Why You Need to Detect, Contain, and Remediate, Not Just Prevent
“Most people are starting to realize that there are only two different types of companies in the world: those that have been breached and know it...
Track where Users Login with Active Directory
Knowing where users login, and when, can be a very useful tool, especially when it comes to an organization’s cybersecurity efforts. For example,...
All Recent Posts
Protecting Healthcare Data on Personal Devices: Strategies and Solutions
In the age of digital healthcare, the proliferation of Bring Your Own Device (BYOD) policies has...
The Essential Role of Intune Management and Patching Strategies in Healthcare IT
In healthcare IT, the management of devices and applications is paramount, more so today as IT...
Navigating Compliance and Cybersecurity in Healthcare IT with Co-Managed Services
In the rapidly evolving world of healthcare IT, Directors and Managers are increasingly confronted...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.