Micro Technology Solutions Inc.

Security

September 21 - National day

Vulnerability Assessment

Vulnerability Assessment Wherever you are on the journey to cybersecurity, undetected vulnerabilities can open the door to cyber criminals. Vulnerabilities can come from a variety of sources including outdated software, patches that have not been applied, and system misconfiguration. These vulnerabilities are invisible to administrators because they are not causing systems to malfunction, so they […]

Vulnerability Assessment Read More »

Computer security - Computer

Introducing Huntress for Managed Detection and Response

A customer enrolled in our security protection suite clicked on a malicious link, what happened? Malware opened a command prompt and began running scripts on her machine. This situation could have ended with numerous computers at our client firm sitting idle with their data encrypted. Fortunately, this customer has Huntress installed on all of their

Introducing Huntress for Managed Detection and Response Read More »

woman on her laptop using her phone as multi-factor authentication device

Streamline Your Business and Boost Security with Single Sign-On (SSO)

Businesses today rely on a growing number of software applications. This means employees must manage several sets of login credentials, which can become overwhelming. Frustration often leads to shortcuts and security risks. Single Sign-On (SSO) can help simplify the login process and avoid these risks. What is Single Sign-ON (SSO)? SSO is a user authentication

Streamline Your Business and Boost Security with Single Sign-On (SSO) Read More »

Computer

Security Awareness Training

It’s estimated that 3.4 billion phishing emails are sent each day worldwide and that 91% of all successful data breaches begin with a spear phishing attack. Information Technology professionals agree that end users are the weak link in cyber security defenses. Security awareness training helps shore up your defenses by teaching users how to spot

Security Awareness Training Read More »

Business - Organization

Your Cyber Insurance Carrier Wants You to Hire An MSP. And you should.

Your Cyber Insurance Carrier Wants You to Hire An MSP. And you should. IT Security Starts with the Basics The experts inside your insurance company and experienced IT professionals agree that many of the most important things protecting your data from cyberattack are maintenance practices that are followed with discipline. As professionals, we often see

Your Cyber Insurance Carrier Wants You to Hire An MSP. And you should. Read More »