by Steve Bowman | Nov 4, 2021 | Cyber Security, Office 365
Estimated Reading Time: 4 minutesThese days there’s many paths that outside attackers can attempt to break into your environment. But by far one of the most-effective methods is by simulating trusted entities, such as a credentials harvest attack. According to...
by Steve Bowman | Nov 4, 2021 | Endpoint Management, Intune, Patch Management
Estimated Reading Time: 4 minutesInefficient app deployment is one of the big causes of resource waste (and endpoint security holes) that we address here at Model Technology Solutions. Having a non-automated solution for app deployment: Steals valuable time from your...
by Steve Bowman | Oct 27, 2021 | Cyber Security, Microsoft Defender
Estimated Reading Time: 4 minutesEvery day security vulnerabilities in apps create risk for potentially exploitable paths that a malicious actor might attempt to use in order to compromise a device in your infrastructure. To prevent this, you can use Microsoft...
by Steve Bowman | Oct 22, 2021 | Cyber Security
Estimated Reading Time: 6 minutesIn this post, we’re going to talk about how to protect your organization from unsanctioned applications using policies with Microsoft Defender for Cloud Apps. You’ll read a high-level overview of Microsoft’s CASB...
by Model Technology Solutions | Sep 22, 2021 | Cyber Security, Unified Endpoint Management
Estimated Reading Time: 6 minutesWelcome to Model’s approach to Unified Endpoint Management Maturity Model overview series! My name is Jason Ruthford and I’m the managing partner of Model Technology Solutions. Today, we’re going to be reviewing...