Strong Supply Chain Security Starts with Secure Software
Emilyann Fogarty
In the past year or so, supply chain attacks have become more prevalent than ever, making vendor security a top-of-mind concern for many organizations.
Read NowBrowse our comprehensive Cybersecurity content to learn how to protect your digital assets against evolving threats. Understand the latest security technologies and practices.
Emilyann Fogarty
In the past year or so, supply chain attacks have become more prevalent than ever, making vendor security a top-of-mind concern for many organizations.
Read NowCristofer Sochacki
In this blog, we will continue to outline what we discussed in Part 1 of this series and what we demonstrated in our session at DattoCon last week. We will be diving into the technical aspects of the tools used and how they were configured.
Read NowCristofer Sochacki
Your team has deployed next-gen anti-virus, applied the latest security patches, and your are forwarding all endpoint telemetry to a managed detection and response vendor. The question you have now is – how can you ensure that the deployed defenses are working properly and you will be notified of malicious activity?
Read NowJohn Maxwell
In this second blog in our series, we look at the various recovery methods for ransomware and highlight the BCDR functionality.
Read NowJohn Maxwell
This is first of a 3 part series that will focus on ransomware. This first one details the four steps to tackle ransomware and uses examples of both RMM’s ransomware and BCDR recovery.
Read NowCourtney Heinbach
There are countless tools available to managed service providers (MSPs) to help them mitigate the risk of ransomware for themselves and their small and medium business (SMB) clients. There’s no single solution that can completely prevent a business from an attack, but rather many that work together. MSPs should consider their RMM tools as a key component in their ransomware mitigations strategy.
Read NowCourtney Heinbach
Reality is, there is no foolproof way to prevent a ransomware attack. Even the most protected and prepared businesses can fall victim to ransomware. However, there are steps MSPs can take to lower the chances of their SMB clients being hit with an attack.
Read NowRyan Weeks
The Datto Information Security Team is actively monitoring the Kaseya VSA security incident. As soon as there is more information available on the exploit being used and how to detect it, Datto will assess if scripts can be developed to aid partners.
Read NowJustin Bacco
In the year 2021, information security is everyone’s problem.
Read Now