by Jason Rutherford | May 19, 2025 | Cyber Security
Estimated Reading Time: 3 minutesIn today’s digital-first business environment, companies rely on third-party vendors and service providers for everything from cloud computing to payroll management. While these relationships drive efficiency and innovation, they also...
by Model Technology Solutions | Mar 8, 2023 | Case Studies, Financial Services Case Studies
Estimated Reading Time: 3 minutesBetween increasing cybercrime and meeting regulatory standards, many financial institutions are concerned about their security posture. One of our clients, a $30 billion bank with locations in multiple U.S. states, was no different....
by Brad Price | Feb 7, 2023 | Patch Management
Estimated Reading Time: 15 minutesThe rapid rise in remote work, cybercrime, and the decentralization of devices has caused Microsoft to rework their patch management process. Every company who uses Microsoft-based patching will be affected by this change. The new...
by Steve Bowman | Jan 7, 2023 | Cyber Security, M365
Estimated Reading Time: 4 minutesRansomware is malicious software that blocks access to a computer system or files unless a sum of money is paid. Ransomware twists the power of encryption against you. Encryption should protect your data and files, but ransomware uses...
by Steve Bowman | Dec 8, 2022 | Cyber Security, Microsoft Intune
Estimated Reading Time: 5 minutesBring your own device (BYOD) refers to a policy of permitting employees to use personally-owned devices (laptops, tablets, and smartphones) to access company information and applications. BYOD continues to grow in popularity among...