Posts Tagged ‘datto’

MTBW’s Jason Verney Obtains Datto Technical Specialist II Certification

MTBW Continuing Education Campaign Datto’s mission is to empower the world’s small and medium-sized businesses with the best in enterprise-level technology. Datto provides Business Continuity/Disaster Recovery solutions that allow any company regardless of size the ability to have regularly scheduled virtualized images created of core network infrastructure. MTBW dedicates time and resources for our employees to not only maintain certification status but perennially increase their knowledge to provide the leading edge of solutions to our clients. If you need any assistance with your security posture and/or your Business Continuity/Disaster Recovery BCDR please reach out to the security experts at MTBW…

Read More »

MTBW’s Greg Baharoff Obtains Datto Technical Specialist II Certification

MTBW Continuing Education Campaign Datto’s mission is to empower the world’s small and medium-sized businesses with the best in enterprise-level technology. Datto provides Business Continuity/Disaster Recovery solutions that allow any company regardless of size the ability to have regularly scheduled virtualized images created of core network infrastructure. MTBW dedicates time and resources for our employees to not only maintain certification status but perennially increase their knowledge to provide the leading edge of solutions to our clients. If you need any assistance with your security posture and/or your Business Continuity/Disaster Recovery BCDR please reach out to the security experts at MTBW…

Read More »

Cloud Storage a Regular Target for Ransomware Infections

The State of the Channel Ransomware Report From 1,700 Managed Service Providers of Datto supplied some interesting in the trenches findings. Of the 1,700 MSP’s responding 26% report Cloud-based targets such as Dropbox, Office365 and G Suite infections. In addition, 5% of all SMB’s have had a Ransomware infection, with 30% reporting the Ransomware remained on the system if it wasn’t completely reinitialized. This means that the same perpetrator could infect the system again even after payment had been made. Some other interesting findings are that the Cryptolocker variant is still the most prevalent. The leading industry targets for Ransomware…

Read More »

Datto New Recovery Agent

Datto has released a new version of their Recovery Agent that allows for a more efficient and streamlined restoration. As the backup process occurs in the background, the operation doesn’t cause any business interruptions. The time-sensitive operation is the restoration process. The new Recovery Agent provides a noticeable reduction in the restore process, thus it is a definite improvement. Unfortunately, there isn’t an in-place upgrade process, so what is necessary is that the existing agent is uninstalled, the new agent installed, the current backups removed and then the initial seeding of all the data before the incremental backups can occur….

Read More »

How Does Your End Point Protection Rate at Blocking Ransomware

Recently Network World in conjunction with KnowBe4 published a document regarding the effectiveness against Ransomware of the most popular end point protection applications as reported by real world users in a current survey. These included such industry heavy hitters as Symantec, Sophos, Trend Micro, Kaspersky, Webroot, McAfee, ESET, Microsoft and Vipre. The testing included the KnowBe4’s ransomware simulator, RanSim, to test the ability of the antivirus solutions to detect and stop RanSim “attacks.” Mimicking 10 different infection scenarios, RanSim attempts to encrypt simulation files it downloads from the Internet, rather than files from the actual endpoint. Follow the link here…

Read More »

Recent Real World Experience: Combating Ransomware Infection Part I Principle of Least Privilege

Just this past weekend MTBW Services was called upon to assist in the recovery from a Ransomware infection. Though never a pleasant way to spend a weekend, from our experience assisting scores of other companies infected with this insidious Malware, we were able to clean and recover the data affected. We have released an extensive checklist regarding protections in the battle against Ransomware – Ransomware Evolutions and Derivatives – but there are a few from this most recent battle that merit reiteration. The Principle of Least Privilege is a critical component in combating the ravages of Ransomware. The Principle of…

Read More »

Backup, Business Continuity And Disaster Recovery In A Box

As a continuation of the information we’re disseminating to all our clients regarding protection against the insidious threats we’re all currently confronting, we want to broaden the scope. Certainly the Defense in Depth security posture that we have covered previously is critical, though it is not all that is required to insure your business protection and functionality. Just as a safe driver operates in a defensive manner to avoid collisions, though still obtains insurance for those unforeseen situations, companies require an IT solution to respond to various business interruptions. Whether those outages are caused by Malware such as Ransomware or…

Read More »