Nov 22, 2021
Datto BCDR: Immutable Backup and Recovery for the Ongoing Threat
When it comes to data security, backup solutions are of the utmost importance when ensuring data can be recovered, no matter how dire the situation.
When it comes to cybersecurity, you can be your clients' hero. Use the resources we've compiled below to learn cybersecurity tips from Datto experts as well as best practices from fellow MSPs and take proactive action against cyber threats.
Nov 22, 2021
John Maxwell
When it comes to data security, backup solutions are of the utmost importance when ensuring data can be recovered, no matter how dire the situation.
Nov 18, 2021
Rotem Shemesh
Bazar Loader is a fileless attack that downloads through the backdoor allowing attackers to install additional malware, often used for ransomware attacks. Since its inception in April 2020, Bazar Loader has attacked a wide variety of organizations in North America and Europe.
Nov 17, 2021
Emilyann Fogarty
In the past year or so, supply chain attacks have become more prevalent than ever, making vendor security a top-of-mind concern for many organizations.
With cybercrime on the rise, hackers are taking advantage of victims by gaining access to their personal information. Be aware of phishing signs to avoid leaking sensitive information.
More than half of all cyberattacks are committed against small-to-midsize businesses (SMBs), costing them roughly $6 trillion a year and the average payout estimated to be $200,000.
Oct 22, 2021
Cristofer Sochacki
In this blog, we will continue to outline what we discussed in Part 1 of this series and what we demonstrated in our session at DattoCon last week. We will be diving into the technical aspects of the tools used and how they were configured.
Oct 18, 2021
Cristofer Sochacki
Your team has deployed next-gen anti-virus, applied the latest security patches, and your are forwarding all endpoint telemetry to a managed detection and response vendor. The question you have now is - how can you ensure that the deployed defenses are working properly and you will be notified of malicious activity?
Online data hacking is increasing; it is important to spot the signs of a possible hack and the ways to prevent them.
Learn how Ceeva, a Managed Service Provider in Pittsburgh, PA made the switch to Datto RMM and deployed Ransomware Detection to protect its customers from today's - and tomorrow's - cyberthreats.
Watch our on-demand webinar where we will look at these challenges and how a technology partner can help improve business operations, manage client endpoints, and mitigate cyber risk.
Aug 19, 2021
John Maxwell
In this second blog in our series, we look at the various recovery methods for ransomware and highlight the BCDR functionality.
Aug 17, 2021
John Maxwell
This is first of a 3 part series that will focus on ransomware. This first one details the four steps to tackle ransomware and uses examples of both RMM's ransomware and BCDR recovery.