Micro Technology Solutions Inc.

mtsolutions

Computer security - Security

Bolster Your Cyber Security with Zero Trust from ThreatLocker

Zero Trust is a promising concept, but many implementations are costly and difficult to implement. ThreatLocker has a novel approach called application whitelisting. The idea is that only applications that are explicitly allowed to run can execute. All other applications are blocked. The result is devastating for malware. Untrusted software, ransomware and other malware is denied by default.

Bolster Your Cyber Security with Zero Trust from ThreatLocker Read More »

September 21 - National day

Vulnerability Assessment

Vulnerability Assessment Wherever you are on the journey to cybersecurity, undetected vulnerabilities can open the door to cyber criminals. Vulnerabilities can come from a variety of sources including outdated software, patches that have not been applied, and system misconfiguration. These vulnerabilities are invisible to administrators because they are not causing systems to malfunction, so they

Vulnerability Assessment Read More »

Digital transformation - Cloud computing

Migrating On-Premises to Azure: Streamlining Domain Management and File Sharing

When a server reaches End-of-life, most small businesses plan for the capital outlay to replace it with a newer server at their location, but as cloud adoption accelerates, more small companies are considering Azure as an alternative. This blog explores how Microsoft Azure can be leveraged to replace an on-premises server functioning as both a

Migrating On-Premises to Azure: Streamlining Domain Management and File Sharing Read More »

Computer security - Computer

Introducing Huntress for Managed Detection and Response

A customer enrolled in our security protection suite clicked on a malicious link, what happened? Malware opened a command prompt and began running scripts on her machine. This situation could have ended with numerous computers at our client firm sitting idle with their data encrypted. Fortunately, this customer has Huntress installed on all of their

Introducing Huntress for Managed Detection and Response Read More »

Convention - Academic conference

MTSi and Cisco Present: Zero Trust and Meraki Solutions at Top Golf

Eric Shain, our Cisco Territory Account Manager, spoke about Meraki and Zero Trust. He discussed Meraki’s ascendance from a startup, to their acquisition by Cisco, to now a firm with over 14 million active devices currently in use. Eric showed the wide range of products in the Meraki lineup including enterprise grade access points, cameras,

MTSi and Cisco Present: Zero Trust and Meraki Solutions at Top Golf Read More »

logo, microsoft, windows

Windows 2012 End-of-Life

On October 10, 2023, Windows Server 2012 and Windows Server 2012 R2 will go end-of-life. This means that Microsoft will no longer provide software updates. Any bugs or compatibility issues discovered from then on will not be fixed. The bigger issue is that security vulnerabilities will not be patched. If threat actors discover a vulnerability

Windows 2012 End-of-Life Read More »