Advanced Cybersecurity Simplified for SMBs
Best practices in cybersecurity recommend a layered approach to security tools because networks are made up of a variety of devices each with their own…
At Micro Technology Solutions, Inc., we pride ourselves in keeping our clients in the know with our Monthly Tech Times Newsletter and our unique Events. Stay updated on news and upcoming events by signing up for our mailing list.
Best practices in cybersecurity recommend a layered approach to security tools because networks are made up of a variety of devices each with their own…
Business Email Compromise (BEC) is a growing problem that every organization needs to protect against. According to the FBI’s Internet Crime Complaint Center (IC3), business…
Zero Trust is a promising concept, but many implementations are costly and difficult to implement. ThreatLocker has a novel approach called application whitelisting. The idea…
Eric Shain, our Cisco Territory Account Manager, spoke about Meraki and Zero Trust. He discussed Meraki’s ascendance from a startup, to their acquisition by Cisco, to now a firm with over 14 million active devices currently in use. Eric showed the wide range of products in the Meraki lineup including enterprise grade access points, cameras, […]