How to Perform a Remote Device Wipe in Microsoft Intune

In dynamic work environments, managing and securing devices remotely is critical. Microsoft Intune, a robust mobile device management (MDM) solution, offers an array of features, including the ability to perform remote device wipes. Below, we will walk you through the step-by-step process of performing a remote device wipe in Microsoft Intune so you can get started properly managing devices today.

February 12th, 2024|Insights, Security|

What is Mobile Threat Management and How is it Used?

MTM (mobile threat management) is a security solution designed to detect malicious apps and inappropriate app permissions that invade privacy (e.g. turning on camera and mic). Notably, MTM detects app side-loading (an important feature considering the impacts of the EU’s Digital Markets Act), phishing attempts, malicious web links, and man-in-the-middle attacks. MTM also detects jailbreak attempts in real time and passes telemetry to your IT admins.

August 24th, 2023|Insights, Security|

Preventing Ransomware Attacks: Safeguarding Your Business and Avoiding the Pain of Rebuilding

Ransomware attacks can have devastating consequences for businesses, often resulting in the loss of critical data and significant financial costs. In fact, the average ransomware attack cost businesses $4.54 million in 2022 with global ransomware costs predicted to exceed $265 billion by 2031. Considering these statistics, ransomware already has the ability to cripple small [...]

July 10th, 2023|Insights, Security|

BitLocker Recovery Key Retrieval Methods

There will likely come a time when you will need to retrieve a BitLocker Recovery Key. The reasons you may need to recover this security feature can vary. Personally, I’ve experienced an assortment of needs for the BitLocker Recovery key. The commonality between each retrieval experience, however, typically stems from a hardware issue. I’ve witnessed the [...]

February 23rd, 2022|Insights, Security|

Going from Zero to Hero with Modern App Patching

In a modern cloud environment, patch deployment has changed for the better. Patch Tuesday is now largely a concept of the past. IT teams are now able to push patches and upgrades over the air with ease – rectifying security vulnerabilities in real-time. This patching process has drastically reduced the duration of time between discovering a security vulnerability and patching it.

January 31st, 2022|Insights, Security|

The Anatomy of a Cyber-Attack

      It is no secret that the rate of cyber-attacks has escalated considerably in the past year. In fact, according to Reuters, cybercrime as a whole has risen 500% since the beginning of the pandemic. Cybercriminals are successful at breaching environments because they use various methods to carry out attacks. Many of the methods show cleverness, [...]

January 4th, 2022|Insights, Security|
Go to Top