Micro Technology Solutions Inc.

Security

Management

Advanced Cybersecurity Simplified for SMBs

Best practices in cybersecurity recommend a layered approach to security tools because networks are made up of a variety of devices each with their own vulnerabilities. Most organizations employ several tools to prevent and detect unauthorized activity on the network. We often discuss tools like Multi-factor Authentication (MFA), Endpoint Detection and Response (EDR), Intrusion Detection, […]

Advanced Cybersecurity Simplified for SMBs Read More »

Computer security - Security

Bolster Your Cyber Security with Zero Trust from ThreatLocker

Zero Trust is a promising concept, but many implementations are costly and difficult to implement. ThreatLocker has a novel approach called application whitelisting. The idea is that only applications that are explicitly allowed to run can execute. All other applications are blocked. The result is devastating for malware. Untrusted software, ransomware and other malware is denied by default.

Bolster Your Cyber Security with Zero Trust from ThreatLocker Read More »

September 21 - National day

Vulnerability Assessment

Vulnerability Assessment Wherever you are on the journey to cybersecurity, undetected vulnerabilities can open the door to cyber criminals. Vulnerabilities can come from a variety of sources including outdated software, patches that have not been applied, and system misconfiguration. These vulnerabilities are invisible to administrators because they are not causing systems to malfunction, so they

Vulnerability Assessment Read More »

Computer security - Computer

Introducing Huntress for Managed Detection and Response

A customer enrolled in our security protection suite clicked on a malicious link, what happened? Malware opened a command prompt and began running scripts on her machine. This situation could have ended with numerous computers at our client firm sitting idle with their data encrypted. Fortunately, this customer has Huntress installed on all of their

Introducing Huntress for Managed Detection and Response Read More »

woman on her laptop using her phone as multi-factor authentication device

Streamline Your Business and Boost Security with Single Sign-On (SSO)

Businesses today rely on a growing number of software applications. This means employees must manage several sets of login credentials, which can become overwhelming. Frustration often leads to shortcuts and security risks. Single Sign-On (SSO) can help simplify the login process and avoid these risks. What is Single Sign-ON (SSO)? SSO is a user authentication

Streamline Your Business and Boost Security with Single Sign-On (SSO) Read More »

Computer

Security Awareness Training

It’s estimated that 3.4 billion phishing emails are sent each day worldwide and that 91% of all successful data breaches begin with a spear phishing attack. Information Technology professionals agree that end users are the weak link in cyber security defenses. Security awareness training helps shore up your defenses by teaching users how to spot

Security Awareness Training Read More »