Phone:202.293.5003    Sales:202.293.5003 x4
News from and about MadWolf Technologies
/ Author: Bill Jones / Number of views: 850 / Comments: 0 /

MadWolf's Phone System Upgrade

MadWolf has recently gone through an upgrade of our phone system.  To reach an MWT staff member, please follow the below instructions:
Dial 9 from the Main Menu
Enter Extension Number followed by a “#” key
MadWolf thanks you for your understanding while we transition our systems, in order to improve our processes and provide better, faster service to you.
Categories:Featured Row
/ Author: Santos Arellano / Number of views: 1921 / Comments: 0 /

6 Simple Ways to Enable Flexible Work Today

There’s no one-size-fits-all solution to flexible work. Every company’s needs are different.
In the long term, making flexible work the best it can be for every employee will require an intentional approach, as well as investment in the right digital tools and reimagined office spaces.
/ Author: Santos Arellano / Number of views: 1460 / Comments: 0 /

The passwordless future is here for your Microsoft account

Nobody likes passwords. They’re inconvenient. They’re a prime target for attacks. Yet for years they’ve been the most important layer of security for everything in our digital lives—from email to bank accounts, shopping carts to video games.
/ Author: Santos Arellano / Number of views: 1822 / Comments: 0 /

Hybrid Work: A Guide for Business Leaders

Flexible work is here to stay. But the shift to hybrid work is not just remote work on overdrive. It's a strategic business opportunity for every organization that requires a new operating model. As a leader, you need a roadmap to guide the entire organization on the path to hybrid work. "Hybrid Work: A Guide for Business Leaders," is your blueprint. 
/ Author: Santos Arellano / Number of views: 1655 / Comments: 0 /

Want better security with enhanced access control?

With cyber threats on the rise, security teams are always on the lookout for new ways to control access, monitor apps and protect data. 
How can MadWolf Technologies help you fortify your business against threats?
Get in touch to learn about our Microsoft Security offerings.
/ Author: Santos Arellano / Number of views: 2108 / Comments: 0 /

MadWolf Technologies is a proud sponsor of Freedom House Annual Awards and 80th Anniversary

For 80 years, Freedom House has worked to defend and expand freedom globally. To help create a world where all people are free, Freedom House identifies threats to freedom, spurs collective action to counter those threats, and supports activists working to defend and expand freedom.
/ Author: Santos Arellano / Number of views: 2563 / Comments: 0 /

Know Your Character Path Limits

In a recent work session where I was managing documents in a list library, I encountered an error that I thought had been banished to the annals of time. The dreaded “This is not a valid file name” error.
The way I encountered this error was by attempting to save a Word document to a different working library folder. Previously, I had been using the browser-based version of... 
Categories:NewsFeatured Row
/ Author: Santos Arellano / Number of views: 1813 / Comments: 0 /

Modernize Endpoints A Zero Trust approach

Advance your journey to Zero Trust with modern endpoints and unified management

The approach to modernizing endpoints is realized with Microsoft 365—and Microsoft Zero Trust is the model for security. With Zero Trust in place, employees can perform from anywhere in the world while maintaining tight control over core security needs. Let the Microsoft intelligent security cloud and endpoint leadership be your guide. Take a look at this infographic and advance your journey toward the Zero Trust model.
/ Author: Steve Parker / Number of views: 1729 / Comments: 0 /

Who Loves the Holidays More? Santa or Attackers?

Note From Santa!

As we approach the core of the 2021 Holiday season, we should all be on red alert for new attempts by malicious attackers to compromise our infrastructures and data. A recent alert by the Cybersecurity and Infrastructure Security Agency informs us that attackers are ready to pounce, particularly when we are distracted by the holidays. We've seen it before, and chances are this Holiday season will see an unprecedented amount of new and varied exploits and attacks, particularly in aftermath of the Log4J vulnerability disclosure. 
Categories:NewsFeatured Row
/ Author: Bill Jones / Number of views: 990 / Comments: 0 /

MWT guidance regarding "Log4J" software vulnerability

A significant security vulnerability has been identified in the “Log4J” software package.  This package is a Java software library, or a building block of an application, that is part of the open-source Apache software foundation.  This library is commonly used when application vendors build software  using Java code.  The identified exploit has the potential to allow a malicious attacker complete control over a vulnerable system on which the affected application resides.
Categories:Featured Row