Category: Threats

Dive into our detailed coverage of various Cyber Threats. Understand the nature of different cyberattacks and how to protect your organization from them.

November 18, 2021

What is Bazar Loader and How to Prepare?

Rotem Shemesh

Bazar Loader is a fileless attack that downloads through the backdoor allowing attackers to install additional malware, often used for ransomware attacks. Since its inception in April 2020, Bazar Loader has attacked a wide variety of organizations in North America and Europe.

Read Now
November 17, 2021

Strong Supply Chain Security Starts with Secure Software

Emilyann Fogarty

In the past year or so, supply chain attacks have become more prevalent than ever, making vendor security a top-of-mind concern for many organizations.

Read Now
August 19, 2021

BCDR Recovery Options for Ransomware

John Maxwell

In this second blog in our series, we look at the various recovery methods for ransomware and highlight the BCDR functionality.

Read Now
August 17, 2021

The “Power of Two” for Combating Ransomware

John Maxwell

This is first of a 3 part series that will focus on ransomware. This first one details the four steps to tackle ransomware and uses examples of both RMM’s ransomware and BCDR recovery.

Read Now
Datto SIRIS Ransomware Detection Screenshot
August 06, 2021

How RMM Tools Help MSPs Combat Ransomware

Courtney Heinbach

There are countless tools available to managed service providers (MSPs) to help them mitigate the risk of ransomware for themselves and their small and medium business (SMB) clients. There’s no single solution that can completely prevent a business from an attack, but rather many that work together. MSPs should consider their RMM tools as a key component in their ransomware mitigations strategy.

Read Now
July 09, 2021

How MSPs Can Prevent, Detect, and Respond to Ransomware Attacks

Courtney Heinbach

Reality is, there is no foolproof way to prevent a ransomware attack. Even the most protected and prepared businesses can fall victim to ransomware. However, there are steps MSPs can take to lower the chances of their SMB clients being hit with an attack.

Read Now
May 27, 2021

What is Ryuk Ransomware and How Does it Work?

Rotem Shemesh

Here’s everything MSPs and their clients need to know about Ryuk ransomware.

Read Now
May 18, 2021

What is Maze Ransomware and How Does it Work?

Rotem Shemesh

Maze Ransomware has been in the headlines non-stop ever since it was first reported in May 2019. It has been used to attack individual companies, governments, and increasingly – and perhaps most worryingly – MSPs.

Read Now
May 12, 2021

Four Essential Components of Third-Party Risk Management

Jaime Arze

Security considerations do not stop at the perimeter of our networks. We must take into account the posture of vendors who process our data, integrate with our systems, or those who we rely on in our day-to-day operations.

Read Now