Estimated Reading Time: 4 minutesRansomware is malicious software that blocks access to a computer system or files unless a sum of money is paid. Ransomware twists the power of encryption against you. Encryption should protect your data and files, but ransomware uses...
Estimated Reading Time: 5 minutesBring your own device (BYOD) refers to a policy of permitting employees to use personally-owned devices (laptops, tablets, and smartphones) to access company information and applications. BYOD continues to grow in popularity among...
Estimated Reading Time: 5 minutesFor most companies, gone are the days of simple cybersecurity and endpoint security solutions. With the increased complexity of remote work and rapidly shifting cyber threats, dedication and focus are now required to protect your...
Estimated Reading Time: 7 minutesWelcome to another installment of our Maturity Model series. In this post, we’ll briefly cover the Maturity Model phases and categories, and what the Updates and Servicing category looks like at Level 5 maturity. Our Maturity...
Estimated Reading Time: 7 minutesMy name is Jason Rutherford, and I’m the Managing Partner of Model Technology Solutions. The last two years have shifted the landscape of Endpoint Security. Gone are the days when caring about cybersecurity was relegated to a...