Category: Cybersecurity

Browse our comprehensive Cybersecurity content to learn how to protect your digital assets against evolving threats. Understand the latest security technologies and practices.

Four Essential Components of Third-Party Risk Management
May 12, 2021

Four Essential Components of Third-Party Risk Management

Jaime Arze

Security considerations do not stop at the perimeter of our networks. We must take into account the posture of vendors who process our data, integrate with our systems, or those who we rely on in our day-to-day operations.

Read Now
How to Spot and Protect Against Phishing Email Attacks
April 17, 2021

How to Spot and Protect Against Phishing Email Attacks

George Rouse

Phishing is a form of social engineering that attempts to secure a user’s personal information such as bank account details or access to their personal information. Here’s how to avoid it.

Read Now
What is CryptoLocker Ransomware and How Does it Work?
March 24, 2021

What is CryptoLocker Ransomware and How Does it Work?

Courtney Heinbach

MSPs report CryptoLocker is the #1 ransomware strain affecting their clients. Here’s what you need to know about it.

Read Now
What is CTB-Locker Ransomware and How Does it Work?
March 16, 2021

What is CTB-Locker Ransomware and How Does it Work?

Courtney Heinbach

While there’s no foolproof way to protect against ransomware, there are steps MSPs can take to educate their staff and their clients about the various ransomware strains that could drastically impact business operations.

Read Now
How RMM Improves Cyber Resilience for SMBs
March 15, 2021

How RMM Improves Cyber Resilience for SMBs

Andrew Burton

MSPs use remote monitoring and management (RMM) software, among other tools and practices, to help their small and medium business (SMB) clients achieve cyber resilience.

Read Now
Microsoft Exchange Hack: 5 Tips to Guide an MSP’s Response
March 11, 2021

Microsoft Exchange Hack: 5 Tips to Guide an MSP’s Response

Keith Dempsey

The newest threat affecting the broader IT community is a complex mess of information related to Microsoft Exchange, with not just one, but multiple zero-day exploits, making this more than an everyday problem.

Read Now
How BCDR Fits Into a Cyber Resilience Strategy
March 08, 2021

How BCDR Fits Into a Cyber Resilience Strategy

Andrew Burton

The term “cyber resilience” refers to a business’s ability to continuously deliver on its intended outcome despite adverse cyber events. Managed service providers (MSPs) use information security and business continuity and disaster recovery (BCDR) technologies and organizational resilience practices to help their clients achieve cyber resilience.

Read Now
Silver Sparrow Dropper Flies Through macOS Detection; Free Script Available for MSPs
February 23, 2021

Silver Sparrow Dropper Flies Through macOS Detection; Free Script Available for MSPs

Dan Garcia

As a threat emerged this week in the form of a new dropper called Silver Sparrow, the Datto RMM engineering team sprung into action and has developed a free script for MSPs that detects the presence of this dropper.

Read Now
How MSPs Can Detect Crypto-Ransomware with Datto RMM
February 17, 2021

How MSPs Can Detect Crypto-Ransomware with Datto RMM

Sara Zorica

Ransomware is a massive problem for businesses of all sizes. Learn how Datto RMM helps MSPs detect ransomware and respond accordingly to avoid client downtime.

Read Now