Security

How to Perform a Remote Device Wipe in Microsoft Intune

In dynamic work environments, managing and securing devices remotely is critical. Microsoft Intune, a robust mobile device management (MDM) solution, offers an array of features, including the ability to perform remote device wipes. Below, we will walk you through the step-by-step process of performing a remote device wipe in Microsoft Intune so you can get started properly managing devices today.

February 12th, 2024|Insights, Security|

What is Mobile Threat Management and How is it Used?

MTM (mobile threat management) is a security solution designed to detect malicious apps and inappropriate app permissions that invade privacy (e.g. turning on camera and mic). Notably, MTM detects app side-loading (an important feature considering the impacts of the EU’s Digital Markets Act), phishing attempts, malicious web links, and man-in-the-middle attacks. MTM also detects jailbreak attempts in real time and passes telemetry to your IT admins.

August 24th, 2023|Insights, Security|

Preventing Ransomware Attacks: Safeguarding Your Business and Avoiding the Pain of Rebuilding

Ransomware attacks can have devastating consequences for businesses, often resulting in the loss of critical data and significant financial costs. In fact, the average ransomware attack cost businesses $4.54 million in 2022 with global ransomware costs predicted to exceed $265 billion by 2031. Considering these statistics, ransomware already has the ability to cripple small [...]

July 10th, 2023|Insights, Security|

BitLocker Recovery Key Retrieval Methods

If you are an administrator, you will likely get a number of requests for the key regardless of the Self-Service Portal’s capabilities. In this instance, there are two approaches to retrieve your BitLocker Recover Key. This first being through Endpoint Manager and the other through Azure AD.

February 23rd, 2022|Insights, Security|

Going from Zero to Hero with Modern App Patching

In a modern cloud environment, patch deployment has changed for the better. Patch Tuesday is now largely a concept of the past. IT teams are now able to push patches and upgrades over the air with ease – rectifying security vulnerabilities in real-time. This patching process has drastically reduced the duration of time between discovering a security vulnerability and patching it.

January 31st, 2022|Insights, Security|
Go to Top