Estimated Reading Time: 4 minutesThese days there’s many paths that outside attackers can attempt to break into your environment. But by far one of the most-effective methods is by simulating trusted entities, such as a credentials harvest attack. According to...
Estimated Reading Time: 4 minutesInefficient app deployment is one of the big causes of resource waste (and endpoint security holes) that we address here at Model Technology Solutions. Having a non-automated solution for app deployment: Steals valuable time from your...
Estimated Reading Time: 6 minutesIn this post, we’re going to talk about how to protect your organization from unsanctioned applications using policies with Microsoft Defender for Cloud Apps. You’ll read a high-level overview of Microsoft’s CASB...
Estimated Reading Time: 7 minutesTroubleshooting Microsoft Azure AD Sync Issues First, make sure that the device is properly joined to Microsoft Azure Active Directory. If the device is on-premises, make sure that it’s hybrid joined. If it’s cloud based,...
Estimated Reading Time: 3 minutesAs the old saying goes, “An ounce of prevention is worth a pound of cure.” Looking to the coming year, what headaches could a director of Infrastructure save themselves by doing a little updating and maintenance now? Turns out, plenty....