Blog

March 23, 2022

What is Nvidia RTX-LHR v2 Unlocker and How Does it Work?

Maor Dahan

On February 22, the crypto mining community received a massive fake news alert that claimed to successfully unlock the Nvidia LHR mining prevention feature. This was later reported as malware and is what we refer to as community phishing.

Read Now
March 18, 2022

Building in Reliability and Durability at Datto

Bob Petrocelli

Cloud operations and cloud storage are in our DNA and we are, as always, committed to continuous improvement for our partners and their clients.

Read Now
March 15, 2022

The Evolution of Datto’s Application Security Program and BSIMM

Nicole Holden

Security has been, and continues to be one of the primary focuses of Datto in our effort to provide best-in-class solutions to our partners.

Read Now

The Evolution of Datto’s Vulnerability Disclosure Program

Nicole Holden

In our continuous efforts to protect the confidentiality, integrity, and availability of customer data we have recently updated our Vulnerability Disclosure Program (VDP) policy.

Read Now
March 14, 2022

Defend and Protect Your Microsoft Teams Data with Datto

Erin Stephan

Microsoft only assures service availability to Teams’ 270 million monthly active users, and not the data within, making it necessary for businesses to implement an integrated solution that provides Microsoft Teams users with data backup plus advanced threat protection.

Read Now
March 03, 2022

Conti Ransomware – How it Works and 4 Ways to Protect Yourself

Ofir Yaakobi

With a robust defense and response plan for Conti ransomware, you can ensure users, clients, and your organization are protected against Conti and other ransomware attacks.

Read Now

Top 20 Most Common Hacker Behaviors

Elizabeth Fichtner

The top MITRE ATT&CK™ behaviors to monitor for on your endpoints and servers.

Read Now
March 02, 2022

The Role of Compromise Assessments in Enterprise Security

Elizabeth Fichtner

A compromise or threat assessment differs from intrusion detection in that it is an independent, evidence based assessment reporting your vulnerabilities, suspicious behaviors, possible exploits and indicators of a successful compromise.

Read Now
March 01, 2022

Dealing with DarkSide

Elizabeth Fichtner

How to deal with DarkSide – a group that packages and provides ransomware capabilities as a service

Read Now