Estimated Reading Time: 2 minutesLooking for a Microsoft partner with the expertise and experience to help you ease into hybrid work and implement or optimize Microsoft 365 in your environment? Model Technology Solutions recently received the designation as a...
Estimated Reading Time: 4 minutesRansomware is malicious software that blocks access to a computer system or files unless a sum of money is paid. Ransomware twists the power of encryption against you. Encryption should protect your data and files, but ransomware uses...
Estimated Reading Time: 7 minutesMy name is Jason Rutherford, and I’m the Managing Partner of Model Technology Solutions. The last two years have shifted the landscape of Endpoint Security. Gone are the days when caring about cybersecurity was relegated to a...
Estimated Reading Time: 6 minutesMicrosoft’s endpoint management software is some of the most-powerful on the marketplace. We here at Model have dedicated our careers to understanding and leveraging this powerful software to the benefit of the clients who use it...
Estimated Reading Time: 7 minutesThis post is part of a multi-part series defining maturity model levels for endpoint devices. Today we will be covering Endpoint Security Level 5. In this post you’ll read about: What is Unified Endpoint Management (UEM)? Our...