Stay up to date with industry news. Let us know if there is something specific that you would like to know about. And of course, feel free to share.
Featured image for “Managing Your Passwords ”

Managing Your Passwords 

Passwords, we all have them, we all have registered accounts all over the web. Managing them can be tough. Many of us either like to keep it simple, sacrificing security or have trouble keeping track of all the different ones we have. In this blog I will go through best practices of setting and keeping passwords.  Choosing Passwords  Passwords should...
Read More
Featured image for “Vendor Security Audit”

Vendor Security Audit

In today’s digital age, protecting your company’s sensitive information from leaks and internet crimes is crucial. If you’ve been experiencing such issues, it might be time to consider a vendor security audit. But what exactly does that entail, and why is it so important? A vendor security audit involves a thorough examination of your company’s digital infrastructure by a team...
Read More
Featured image for “5 Ways to Secure Your Company’s Wireless Router”

5 Ways to Secure Your Company’s Wireless Router

Wireless routers connect devices and the Internet within a company’s network but are often vulnerable to attacks due to poor configurations and outdated firmware. Companies can enhance security by changing default passwords and SSIDs, disabling remote management, enabling WPA2, and regularly updating firmware. These steps are crucial to prevent unauthorized access and data breaches....
Read More
Featured image for “How to Send a Private File or Email Using Sensitivity Labels”

How to Send a Private File or Email Using Sensitivity Labels

With sensitivity labels, you can create document and email security protocols on a large scale, this is crucial for growing SME’s so you don’t have to worry about sending the wrong information or leaking sensitive information, nor waste time painstakingly sorting out each recipient for a specific document or email.   Here I will show you how to create different levels...
Read More
Featured image for “RapidDeploy helps first responders defend public safety with Azure Sentinel”

RapidDeploy helps first responders defend public safety with Azure Sentinel

With public safety and customer trust at stake, #RapidDeploy takes cybersecurity seriously. When RapidDeploy implemented a Security Information and Event Management ( #SIEM ) system, it chose #Microsoft Azure Sentinel, one of the world’s first cloud-native SIEMs. Watch the video for the full story....
Read More
Featured image for “Security Solution Overview”

Security Solution Overview

With #Microsoft #AdvancedThreatProtection, #AzureSecurity, and #AzureSentinel you can reduce the number of security vendors you manage and safeguard your organization, without sacrificing productivity. Together they form a complete, intelligent solution that helps secure corporate data and protect against bad actors, while taking advantage of the transformative opportunities presented by cloud computing. Watch the video to learn more....
Read More
Featured image for “Construction giant gains competitive edge with zero-trust approach to security”

Construction giant gains competitive edge with zero-trust approach to security

Long-time #Microsoft customer, #TheWalshGroup chose the Microsoft Azure team when they were ready to invest in integrated Threat Protection with a zero-trust approach. See how the company gained a competitive edge in the article below....
Read More


Due to the massive workforce shift from working in-office to working remotely, the demand for Windows Virtual Desktop has increased. Microsoft continues to work around the clock to ensure its customers have best-in-class experiences with the Azure Migration Program, an enhanced Teams experience, and more. Check out the newest updates and what you can expect in the future, and contact Techtron to learn more....
Read More

How to setup Multi-Factor Authentication (MFA)

By setting up MFA, you add an extra layer of security to your Microsoft 365 account sign-in. For example, you first specify your password and, when prompted, you also type averification code sent to your phone. To start the MFA setup process close and re-open Outlook. (if you use the web portal toaccess email simply logout and log back in...
Read More
Featured image for “Free Cyber Security Training”

Free Cyber Security Training

Cyber threats are here to stay and we need to learn to deal with the increasing threat. User awareness/training is essential as part of any companies strategy to protect themselves. Even a basic level of cyber training can be very effective in increasing a companies protection against cyber threats. A well trained employees are vert effective at preventing cyber threats...
Read More

Making Azure Sentinel work for you

Microsoft Azure Sentinel is the first Security Incident and Event Management (SIEM) solution built into a major public cloud platform that delivers intelligent security analytics across enterprise environments and offers automatic scalability to meet changing needs. This new white paper outlines best practice recommendations for configuring data sources for Azure Sentinel, using Azure Sentinel during incident response, and proactively hunting for threats...
Read More

6 Ways to Keep Your WordPress Site Secure

More than 60 million sites depend on WordPress. Unfortunately, WordPress is also popular with hackers. To attack WordPress sites, hackers often exploit vulnerabilities found in the plugins that extend WordPress functionality. These attacks are becoming ever more common, and frequently end up affecting hundreds of thousands of sites. However, there are ways to minimize the risks involved in running a...
Read More

Join our mailing list

Please phone or email us, or if you would prefer to just receive news and updates, please submit your email address below.