The View From NCS Technologies

Mike Turicchi

Recent Posts

Vulnerability Assessment Survey

Posted by Mike Turicchi on Jul 24, 2023 12:31:39 PM

The security operations maturity self- assessment helps you evaluate how prepared your security operations team is to detect, respond and recover from cyber-attacks. Use this tool to determine the stage in security maturity model you've reached and get recommendations for processes and tooling that can increase preparedness.
Read More

Wolf Pro Security for Small and Mid-Sized Organizations

Posted by Mike Turicchi on Jul 24, 2023 10:31:44 AM

Cyber criminals don't care if your business is large or small, about to go public or teetering on bankruptcy. They only care about breaking inside your systems and they usually focus on your vulnerable endpoints. Download this informative solution brief showing how Wolf Pro Security helps contain threats in an easy-to-manage and deploy package.
Read More

Reevaluate your Endpoint Strategy

Posted by Mike Turicchi on Jul 17, 2023 3:25:01 PM

Organizations of all sizes are on the front lines in the war against cyber criminals. The bad guys are after your data, and they'll try anything to get inside your systems. Download this insightful solution brief showing why cyber attacks focus on endpoints and how you can protect these vulnerable parts of your system.
Read More

Test your team's security readiness with the Gone Phishing Tournament

Posted by Mike Turicchi on Jul 17, 2023 12:36:37 PM

Eighty-two percent of breaches include employee mistakes, such as falling victim to a phishing scam. Phishing is the cheapest and most reliable way for an attacker to get a foot in the door of an organization. Explore Microsoft's and Terranova Security's Gone Phishing Tournament to test your company's behaviors using real-world simulations.
Read More

HP Wolf Pro Security: Comprehensive PC security, made simple

Posted by Mike Turicchi on Jul 17, 2023 10:33:09 AM

There is a confusing array of choices when deciding on endpoint security for your organization. If you need clarity, download this helpful infographic showing how HP Wolf Pro Security delivers comprehensive PC security in a simple cloud-based package while keeping your teams happy and productive.
Read More

Announcing Availability: Ryzen 7045 HX Series Processors

Posted by Mike Turicchi on Jul 10, 2023 5:30:14 PM

Extraordinary needs require extraordinary products. Watch this informative video about the AMD Ryzen 7045 HX Series Processors, the 16-core, 32-thread chips with an incredible boost frequency of 5.7 GHz, making it the heart of the most powerful laptops on the market.
Read More

Microsoft Entra Verified ID

Posted by Mike Turicchi on Jul 10, 2023 3:22:03 PM

Together with the open standards community, customers and partners, Microsoft is helping create a decentralized identity system designed for security, privacy and inclusivity. Read the datasheet for additional information on the features and benefits of Microsoft Entra Verified ID.,
Read More

AMD processors mean business

Posted by Mike Turicchi on Jul 10, 2023 12:44:15 PM

Ready for a new world of performance, experiences and security? Watch this dynamic video about the AMD Ryzen™ PRO 6000 Series processors that deliver uncompromised processing speed and smooth responsiveness to meet your demanding requirements.
Read More

Improve security with remote access and verifiable ID's

Posted by Mike Turicchi on Jul 3, 2023 5:22:50 PM

Among the many benefits of Microsoft Entra Verified ID is that it can help ensure organizations consistently match the most qualified person with the right project. Request a free consultation with one of our experts to discuss how NCS Technologies, Inc. can help you improve security with remote access and verifiable IDs enabled by technology solutions like Microsoft Entra.
Read More

Avanade Reimagines Access to Training and Skills Management Using Microsoft Entra Verified ID

Posted by Mike Turicchi on Jul 3, 2023 10:29:04 AM

Oftentimes the best and most creative ideas come from within an organization, as professional services and technology provider Avanade recently found out. Read the blog to gain insight on how Microsoft Entra Verified ID helped enable this as the company shifted from owning all the identities and credentials to the users controlling their own credentials—when they want to use them and what they want to share.
Read More