Downtime: The Datto Blog

Locky, TeslaCrypt Among Latest Ransomware Threats

If it seems like there’s a new ransomware threat popping up every week, it’s not just you.

Hospital Pays King's Ransom After Ransomware Attack

Hollywood Presbyterian Medical Center was forced to pay 40 bitcoins, roughly $17,000, to unlock their files.

Google Engineers Unearth 7-Year-Old Glibc Vulnerability

Bug leaves some Linux systems vulnerable to stack-based buffer overflow attacks.

3 Lessons From A Ransomware Attack

High-profile ransomware threats require equally high-profile prevention.

A Look Back At The Top Cybersecurity Threats Of 2015

It felt like a new cybersecurity threat was making headlines every other week this year, thanks to some major data breaches, attacks and scams.

What Can We Learn From The Spiceworks State Of IT Report?

Wouldn’t it be great if there was a report compiling survey results from more than 800 IT professionals as well as social data from conversations and real-time usage stats on equipment that’s actually used by IT pros?

Surviving a Ransomware Attack

When it comes to ransomware, IT professionals are constantly looking for the best solution to protect their data and avoid being crippled by the latest attack.

Malvertising: The Latest Malware Threat

There’s a new threat when it comes to malware.

Is Wearable Technology Putting Your IT At Risk?

Fitbits, smartwatches, Google Glass. There’s been an influx of wearable technology the past few years and the launch of the Apple Watch means this market is only getting bigger. With the proliferation of these devices invading the workplace, how will the IT department be affected?

Reclaim Control Of Your Organization’s Files

People in your organization – possibly including you – might store files on a cloud service. As the glib phrase goes: because convenience.

Ransomware Threats Increase

With cases on the rise, are you protected?

Is Your Data Ready For The Windows 10 Update?

With the recent release of Windows 10 being followed by various patches and updates, is it ready for your data?

Total Data Protection And The Cybersecurity Bill

While the cybersecurity bill has been pushed back, the demand and interest for increased security is certainly here. How does it impact your data protection strategy?

Shadow IT: What Does It Mean For Your Company?

Shadow IT has risen lately due to the increased use of cloud software, SaaS, and BYOD. What is it and what does it mean for your company?

Is Car Hacking the New Normal?

There’s another car hack to keep your eye on. Researchers were able to hack a Tesla Model S.

How Many Times Have You Been Hacked?

There’s a good chance your personal information has been exposed by hackers at some point in the past several years. Find out.

Does the Stagefright Exploit Put Your Mobile Data at Risk?

Stagefright, the new vulnerability for Android devices, has been dubbed ‘Heartbleed for Mobile’. Is your mobile data at risk?

Are Data Threats Like Sharknado?

Does it seem like vendors are always sensationalizing threats to your data and impending doom sort of like a Sharknado?

Making Sense of Census Bureau Hack

While this is just another instance in a long list of data breaches, it again brings up the issue of downtime and recovery time.

Chrysler Hit By Car Hacking Breach

While car hacking may not be a major threat just yet, this story just reminds us of the very real threat hackers pose to your information on a daily basis.

Page 7 of 8 < 2 3 4 5 6 7 8 > Last >