Micro Technology Solutions Inc.

Convention - Academic conference

MTSi and Cisco Present: Zero Trust and Meraki Solutions at Top Golf

Eric Shain, our Cisco Territory Account Manager, spoke about Meraki and Zero Trust. He discussed Meraki’s ascendance from a startup, to their acquisition by Cisco, to now a firm with over 14 million active devices currently in use. Eric showed the wide range of products in the Meraki lineup including enterprise grade access points, cameras,

MTSi and Cisco Present: Zero Trust and Meraki Solutions at Top Golf Read More »

woman on her laptop using her phone as multi-factor authentication device

Streamline Your Business and Boost Security with Single Sign-On (SSO)

Businesses today rely on a growing number of software applications. This means employees must manage several sets of login credentials, which can become overwhelming. Frustration often leads to shortcuts and security risks. Single Sign-On (SSO) can help simplify the login process and avoid these risks. What is Single Sign-ON (SSO)? SSO is a user authentication

Streamline Your Business and Boost Security with Single Sign-On (SSO) Read More »

network, server, system

Server Virtualization Landscape for 2024

SERVER VIRTUALIZATION After 18 months, Broadcom has finally closed their deal to purchase VMware. Since then, there have been many stories about Broadcom terminating partners and raising prices. Like many vendors, VMware by Broadcom is shifting to a subscription licensing model, which means you can no longer purchase licenses that continue to be valid indefinitely.

Server Virtualization Landscape for 2024 Read More »

logo, microsoft, windows

Windows 2012 End-of-Life

On October 10, 2023, Windows Server 2012 and Windows Server 2012 R2 will go end-of-life. This means that Microsoft will no longer provide software updates. Any bugs or compatibility issues discovered from then on will not be fixed. The bigger issue is that security vulnerabilities will not be patched. If threat actors discover a vulnerability

Windows 2012 End-of-Life Read More »

Computer

Security Awareness Training

It’s estimated that 3.4 billion phishing emails are sent each day worldwide and that 91% of all successful data breaches begin with a spear phishing attack. Information Technology professionals agree that end users are the weak link in cyber security defenses. Security awareness training helps shore up your defenses by teaching users how to spot

Security Awareness Training Read More »

Wireless Network Surveys, Ekahau heat map

Planning for Wi-Fi 6E

Wi-Fi 6E opens up access to the 6GHz band (Wi-Fi 6 uses 5GHz) and with it a myriad of benefits including low latency, 3 times as many Wi-Fi channels, and the capacity for much higher bandwidth. Another key benefit is that devices like cordless phones, airport radar, perimeter sensors, and digital satellite don’t interfere with

Planning for Wi-Fi 6E Read More »