by Jason Rutherford | Feb 8, 2022 | Active Directory, Azure, Cyber Security, Endpoint Management, Microsoft Defender, Microsoft Intune, Patch Management, Unified Endpoint Management
Estimated Reading Time: 7 minutesThis post is part of a multi-part series defining maturity model levels for endpoint devices. Today we will be covering Endpoint Security Level 5. In this post you’ll read about: What is Unified Endpoint Management (UEM)? Our...
by Jason Rutherford | Jan 13, 2022 | Active Directory, Certificate Authority
Estimated Reading Time: 3 minutesIf you’ve ever had a failed certificate authority in one of your environments, it probably caused a lot of issues! In that case, there are various ways to remove that certificate. But sometimes those various...
by Jesse Walter | Nov 4, 2021 | Cyber Security, Office 365
Estimated Reading Time: 4 minutesThese days there’s many paths that outside attackers can attempt to break into your environment. But by far one of the most-effective methods is by simulating trusted entities, such as a credentials harvest attack. According to...
by Gabriel Taylor | Nov 4, 2021 | Endpoint Management, Intune, Patch Management
Estimated Reading Time: 4 minutesInefficient app deployment is one of the big causes of resource waste (and endpoint security holes) that we address here at Model Technology Solutions. Having a non-automated solution for app deployment: Steals valuable time from your...
by Jesse Walter | Oct 22, 2021 | Cyber Security
Estimated Reading Time: 6 minutesIn this post, we’re going to talk about how to protect your organization from unsanctioned applications using policies with Microsoft Defender for Cloud Apps. You’ll read a high-level overview of Microsoft’s CASB...