by Mike Brimberry | Jul 10, 2024 | Cyber Security, Legal Services
Estimated Reading Time: 4 minutesIf you’re a managing partner, principal, or senior IT staff at a law firm, an intentional, well-defined cybersecurity program isn’t just a nice-to-have—these days it’s a must. The American Bar Association’s (ABA) Rule 1.6...
by Gabriel Taylor | Apr 17, 2024 | Endpoint Management, Intune, Microsoft Intune, Patch Management, Unified Endpoint Management
Estimated Reading Time: 2 minutesIn healthcare IT, the management of devices and applications is paramount, more so today as IT environments grow in complexity and reach, particularly with the surge in remote healthcare services. The transition to remote work and...
by Mike Brimberry | Apr 10, 2024 | Cyber Security
Estimated Reading Time: 3 minutesIn the rapidly evolving world of healthcare IT, Directors and Managers are increasingly confronted with a daunting landscape of stringent compliance requirements and escalating cybersecurity threats. The stakes have never been higher,...
by Model Technology Solutions | Dec 13, 2023 | Case Studies
Estimated Reading Time: 5 minutesCybersecurity used to be a term used only by solitary employees in offices down two flights of stairs from ground floor. Now everyone from the humble IT engineer to the top of the C-Suite are grinding their teeth at night about this...
by Model Technology Solutions | Mar 8, 2023 | Case Studies, Financial Services Case Studies
Estimated Reading Time: 2 minutesCornerstone is a nationwide company with about 100 locations across the U.S. and 2,300 endpoints to manage. Their internal team was made up of 7 then-burnt-out IT professionals who were trying to keep up with their necessary patching....