Downtime: The Datto Blog

Chrysler Hit By Car Hacking Breach

While car hacking may not be a major threat just yet, this story just reminds us of the very real threat hackers pose to your information on a daily basis.

Is It Open Season on Your Data? It Is Shark Week After All

In honor of all things “Jawsome” we’ve decided to shed some light on a few security threats lurking only a few clicks away.

How To Make Your Computer Security Indestructible

Do your security systems still serve a strategic defensive purpose? Or have changing technologies and people’s practices reduced your security systems to little more than a showpiece? Consider adding an IT Auditor to your team and you’ll know the answer.

The Ultimate Computer Security 101 Checklist

Computer security can be complicated and intimidating for the average user out there. As an IT Admin, it’s up to you to assist users and explain the why - why you need a strong password, why backing up your data is important, why you should never connect to Wi-Fi without a password, etc.

Safeguard Your Browser: 5 Critical Tips For Web Browser Security

Try an experiment: see how long you can use your computer without opening a web browser. That means no web search, no social media, no shopping, and no news. No browser also means you can’t use web apps: no web documents, no web databases, and no webmail.

The Reasons Your IT Admin Is Terrified Of Your Smartphone

Smartphones, tablets and other mobile devices are indispensable for many employees these days, but they can prove terrifying for IT administrators and security managers.

5 Workstation Security Best Practices

Hopefully you’ve never experienced the total frustration of dealing with a system infested with malware. It may take hours to detect and remove all of the malware-affected files on a system. Because of this, many IT people prefer a “clean install”, which erases the drive and replaces everything on it. But with a clean install, you’ll lose any information not saved elsewhere.

Defend Your Data From These Four Network Villains

You open your laptop and connect to the “Free WiFi” access point, no password required. Just connect and browse. Convenient, but definitely not secure. When it comes to network security, there are (at least) four villains out there that threaten your data: an evil twin, a local snoop, a remote attacker, and a traffic interceptor. Each villain attacks a different part of the network, so you’ll need a different tactic to fend off each attack. Let’s review!

3 Quick Things to Teach Your Users About Password Security

Information Technology administrators know the value of password security. Communicating the value of strong passwords to your end-users, however, can often prove to be a challenge.

How Do You Protect Your Clients’ Data?

Many Managed Service Providers (MSPs) have a backup and data protection offering as the cornerstone of their solution offerings.

Are You Ready For The Next HIPAA Deadline?

Datto Partners and MSPs Be Sure to Sign Your Healthcare-Related Clients BAAs to Comply with HIPAA Omnibus Rule by 9/22

4 Steps to Recover from CryptoLocker

Cryptolocker is making its rounds.

Page 8 of 8 < 3 4 5 6 7 8