Estimated Reading Time: 15 minutesThe rapid rise in remote work, cybercrime, and the decentralization of devices has caused Microsoft to rework their patch management process. Every company who uses Microsoft-based patching will be affected by this change. The new...
Estimated Reading Time: 7 minutesWelcome to another installment of our Maturity Model series. In this post, we’ll briefly cover the Maturity Model phases and categories, and what the Updates and Servicing category looks like at Level 5 maturity. Our Maturity...
Estimated Reading Time: 10 minutesWelcome to the third post of our Intune Reporting Series. The first post introduced Intune’s reporting framework and core concepts, then dove in to identify and discuss the various Operational reports strewn throughout the system. The...
Estimated Reading Time: 2 minutesModel Technology Solutions strives to be one of the world’s best places to work and we work hard to have the best expertise in-house, which is why we continue to grow our security team, offerings, and presence. Model is excited to...
Estimated Reading Time: 4 minutesEvery day security vulnerabilities in apps create risk for potentially exploitable paths that a malicious actor might attempt to use in order to compromise a device in your infrastructure. To prevent this, you can use Microsoft...