
Strong Supply Chain Security Starts with Secure Software
Emilyann Fogarty
In the past year or so, supply chain attacks have become more prevalent than ever, making vendor security a top-of-mind concern for many organizations.
Read NowEmilyann Fogarty
In the past year or so, supply chain attacks have become more prevalent than ever, making vendor security a top-of-mind concern for many organizations.
Read NowJohn Maxwell
In this second blog in our series, we look at the various recovery methods for ransomware and highlight the BCDR functionality.
Read NowJohn Maxwell
This is first of a 3 part series that will focus on ransomware. This first one details the four steps to tackle ransomware and uses examples of both RMM’s ransomware and BCDR recovery.
Read NowCourtney Heinbach
There are countless tools available to managed service providers (MSPs) to help them mitigate the risk of ransomware for themselves and their small and medium business (SMB) clients. There’s no single solution that can completely prevent a business from an attack, but rather many that work together. MSPs should consider their RMM tools as a key component in their ransomware mitigations strategy.
Read NowCourtney Heinbach
Reality is, there is no foolproof way to prevent a ransomware attack. Even the most protected and prepared businesses can fall victim to ransomware. However, there are steps MSPs can take to lower the chances of their SMB clients being hit with an attack.
Read NowRyan Weeks
The Datto Information Security Team is actively monitoring the Kaseya VSA security incident. As soon as there is more information available on the exploit being used and how to detect it, Datto will assess if scripts can be developed to aid partners.
Read NowRotem Shemesh
Here’s everything MSPs and their clients need to know about Ryuk ransomware.
Read NowRotem Shemesh
Maze Ransomware has been in the headlines non-stop ever since it was first reported in May 2019. It has been used to attack individual companies, governments, and increasingly – and perhaps most worryingly – MSPs.
Read NowJaime Arze
Security considerations do not stop at the perimeter of our networks. We must take into account the posture of vendors who process our data, integrate with our systems, or those who we rely on in our day-to-day operations.
Read Now