Product: Datto Managed SOC

October 22, 2021

Atomic Red Team Part 2: Using Atomic Red Team for Adversary Attack Emulation

Cristofer Sochacki

In this blog, we will continue to outline what we discussed in Part 1 of this series and what we demonstrated in our session at DattoCon last week. We will be diving into the technical aspects of the tools used and how they were configured.

Read Now
October 18, 2021

Atomic Red Team Part 1: Testing Security Controls Through Attack Emulation

Cristofer Sochacki

Your team has deployed next-gen anti-virus, applied the latest security patches, and your are forwarding all endpoint telemetry to a managed detection and response vendor. The question you have now is – how can you ensure that the deployed defenses are working properly and you will be notified of malicious activity?

Read Now
November 06, 2020

Common Types of Ransomware

Courtney Heinbach

Ransomware strains are always evolving. Here’s a list of the most common types business are currently facing.

Read Now
October 21, 2019

What Is A SIM Port Hack?

Tobias Geisler Mesevage

A SIM port hack involves a hacker who has convinced your mobile phone carrier to activate your phone number on another device.

Read Now
July 25, 2019

What Is an Intrusion Detection System?

Tobias Geisler Mesevage

An intrusion detection system is a vital part of any MSP’s IT security plan. Learn what an intrusion is and how you can ensure it doesn’t happen.

Read Now
June 20, 2019

What Is a Configuration Vulnerability?

Tobias Geisler Mesevage

Understand what a security configuration vulnerability is and how to avoid vulnerabilities to prevent cyber threats.

Read Now
May 07, 2019

What Is Data Risk Management?

Tobias Geisler Mesevage

A holistic data risk management system minimizes the ability of data that can be exposed or breached, and also promotes productivity in the workplace.

Read Now