Stay up to date with industry news. Let us know if there is something specific that you would like to know about. And of course, feel free to share.
Featured image for “RapidDeploy helps first responders defend public safety with Azure Sentinel”

RapidDeploy helps first responders defend public safety with Azure Sentinel

With public safety and customer trust at stake, #RapidDeploy takes cybersecurity seriously. When RapidDeploy implemented a Security Information and Event Management ( #SIEM ) system, it chose #Microsoft Azure Sentinel, one of the world’s first cloud-native SIEMs. Watch the video for the full story....
Read More
Featured image for “Security Solution Overview”

Security Solution Overview

With #Microsoft #AdvancedThreatProtection, #AzureSecurity, and #AzureSentinel you can reduce the number of security vendors you manage and safeguard your organization, without sacrificing productivity. Together they form a complete, intelligent solution that helps secure corporate data and protect against bad actors, while taking advantage of the transformative opportunities presented by cloud computing. Watch the video to learn more....
Read More
Featured image for “Construction giant gains competitive edge with zero-trust approach to security”

Construction giant gains competitive edge with zero-trust approach to security

Long-time #Microsoft customer, #TheWalshGroup chose the Microsoft Azure team when they were ready to invest in integrated Threat Protection with a zero-trust approach. See how the company gained a competitive edge in the article below....
Read More


Due to the massive workforce shift from working in-office to working remotely, the demand for Windows Virtual Desktop has increased. Microsoft continues to work around the clock to ensure its customers have best-in-class experiences with the Azure Migration Program, an enhanced Teams experience, and more. Check out the newest updates and what you can expect in the future, and contact Techtron to learn more....
Read More

How to setup Multi-Factor Authentication (MFA)

By setting up MFA, you add an extra layer of security to your Microsoft 365 account sign-in. For example, you first specify your password and, when prompted, you also type averification code sent to your phone. To start the MFA setup process close and re-open Outlook. (if you use the web portal toaccess email simply logout and log back in...
Read More
Featured image for “Free Cyber Security Training”

Free Cyber Security Training

Cyber threats are here to stay and we need to learn to deal with the increasing threat. User awareness/training is essential as part of any companies strategy to protect themselves. Even a basic level of cyber training can be very effective in increasing a companies protection against cyber threats. A well trained employees are vert effective at preventing cyber threats...
Read More

Making Azure Sentinel work for you

Microsoft Azure Sentinel is the first Security Incident and Event Management (SIEM) solution built into a major public cloud platform that delivers intelligent security analytics across enterprise environments and offers automatic scalability to meet changing needs. This new white paper outlines best practice recommendations for configuring data sources for Azure Sentinel, using Azure Sentinel during incident response, and proactively hunting for threats...
Read More

6 Ways to Keep Your WordPress Site Secure

More than 60 million sites depend on WordPress. Unfortunately, WordPress is also popular with hackers. To attack WordPress sites, hackers often exploit vulnerabilities found in the plugins that extend WordPress functionality. These attacks are becoming ever more common, and frequently end up affecting hundreds of thousands of sites. However, there are ways to minimize the risks involved in running a...
Read More

Biggest Monitoring Mistake Companies Make

By far the biggest and most common mistake most companies make when it comes to security monitoring is they monitor too much. Just because you can does not mean you should. Modern IT systems create huge amounts of data and metrics to monitor, and most of the modern Security Incident & Event Management (SIEM) platforms are designed to hold large...
Read More

Split Tunnel VPNs Improve Performance of Cloud Apps for Remote Workers

Split Tunnel VPNs Improve Performance of Cloud Apps for Remote Workers Virtual private networks (VPN) are still the mainstay for providing users with remote access to corporate resources when working from home. But with remote access networks under more strain due to the global health pandemic, many employees are experiencing poor performance of cloud-based apps. Performance issues are usually caused...
Read More

Cybercriminals Actively Targeting Work-From-Home Employees By All Possible Means

In the wake of the COVID-19 global epidemic, organizations are forced to switch to Work From Home (WFH) strategies to keep their businesses running. And although this is not a new trend, especially in the IT industry, this time it is much different in terms of the scope and intensity. What is different now In majority organizations, almost the entire...
Read More

New DNS Vulnerability Lets Attackers Launch Large-Scale DDoS Attacks

Israeli cybersecurity researchers have disclosed details about a new flaw impacting DNS protocol that can be exploited to launch amplified, large-scale distributed denial-of-service (DDoS) attacks to takedown targeted websites. Called NXNSAttack, the flaw hinges on the DNS delegation mechanism to force DNS resolvers to generate more DNS queries to authoritative servers of attacker’s choice, potentially causing a botnet-scale disruption to online...
Read More

Join our mailing list

Please phone or email us, or if you would prefer to just receive news and updates, please submit your email address below.