Ransomware Attacks on Healthcare Facilities Have Doubled

pexels-vidal-balielo-jr-1250655

2020 was an especially bad year for ransomware attacks on all types of organizations. However, hospitals and healthcare facilities were hit particularly hard.

How AI Helps Businesses Scale Without Adding Complexity

Growth should feel like progress — not pressure. Yet for many business leaders, scaling quickly introduces friction instead of momentum. More customers mean more requests. More employees mean more coordination. And suddenly, teams are spending more time tracking down information than moving the business forward. Artificial intelligence (AI) offers a way out of that cycle… Continue reading How AI Helps Businesses Scale Without Adding Complexity

The Hidden Risks of DIY AI: What Businesses Miss Without an IT Partner

AI Can Accelerate Growth — or Create New Risks If You Go It Alone Artificial intelligence promises efficiency, speed, and innovation — and when it’s implemented correctly, those benefits are very real. We see AI helping businesses reduce manual work, improve customer experiences, and make faster, more informed decisions. But AI isn’t a plug-and-play solution.… Continue reading The Hidden Risks of DIY AI: What Businesses Miss Without an IT Partner

AI-Driven Cybercrime Is Reshaping Risk for SMBs

We’re seeing artificial intelligence change the way businesses operate — and, just as importantly, the way cybercriminals attack. Today’s threats aren’t slow or obvious. They’re automated, highly convincing, and built to exploit both technology and human decision-making. When we talk with small and mid-sized organizations, we hear a common assumption: “We’re not a big enough… Continue reading AI-Driven Cybercrime Is Reshaping Risk for SMBs

Tech Acceleration: How Smart Businesses Turn Technology Into Growth

Technology isn’t slowing down. Neither is the pressure on business leaders to keep up. Every year brings new tools, new threats, and new expectations. Customers expect speed. Employees expect flexibility. Regulators expect compliance. And competitors are quick to adopt whatever gives them an edge. I talk to business owners every week who say the same… Continue reading Tech Acceleration: How Smart Businesses Turn Technology Into Growth

How Digital Transformation Helps Your Business Work Smarter and Grow Faster 

Big technology isn’t just for big businesses anymore. The tools that once gave large enterprises an edge are now within reach for organizations of all sizes. Today, even small businesses can harness the same powerful technologies to automate repetitive tasks, boost team collaboration and stay connected with customers like never before.   Digital transformation helps… Continue reading How Digital Transformation Helps Your Business Work Smarter and Grow Faster 

Cut Through the Hype: Must-Have Solutions for Digital Transformation

Digital transformation isn’t about tearing everything down and starting over. It’s about using modern tools to run your business better, faster and smarter. Whether it’s managing inventory, handling customer queries or tracking performance, the goal is simple: Make things easier and more efficient.   But the moment you start exploring digital tools, the noise hits.… Continue reading Cut Through the Hype: Must-Have Solutions for Digital Transformation

Why the Right IT Partner Is Key to Tech-Driven Growth

Every business owner wants the same thing — growth. More customers, more revenue and more time to focus on what matters. But here’s the reality: Growth today isn’t just about hard work or great ideas. It’s about using the right tools to make your business faster, smarter and ready for what comes next.   That’s… Continue reading Why the Right IT Partner Is Key to Tech-Driven Growth

Key Insights on Tech Trends, Emerging Threats and Digital Transformation

Technology advancement isn’t slowing down, and neither can your business. Every few months, a new tool, platform or threat changes how businesses operate. Ignoring these shifts is not an option.   Falling behind doesn’t just mean missing out on the latest innovations. It means losing customers to competitors, exposing your business to security risks and… Continue reading Key Insights on Tech Trends, Emerging Threats and Digital Transformation

Upgrading Cybersecurity? 11 Essential Tools for 2026

Upgrading Cybersecurity

In the race to adapt to COVID-19, businesses suddenly found themselves exposed to a wide range of cybersecurity risks. Hackers exploited this situation by ramping up their attacks, knowing that organizations were suddenly more vulnerable.

Complete Guide to Managed Detection and Response: Benefits, Features, and Pricing

Learn the benefits of MDR security solutions, how they detect and respond to cyberattacks, and why your business needs MDR services.

Linux Ransomware: Are Your Servers Safe?

Discover how ransomware targets Linux systems and learn to improve your prevention and recovery practices for 2025.

Cyber Insurance Requirements: Why a Policy Isn’t Enough

Cyber insurance requirements are evolving in 2025. Learn what insurers demand, why standards are rising, and how backups help secure coverage.

What Are AiTM Attacks? Understanding the Rising Threat of Adversary-in-the-Middle Tactics

In today’s increasingly cloud-based world, your business likely depends on platforms like Microsoft 365, Google Workspace, Salesforce, and other SaaS applications to operate. These tools are powerful—but they also present a growing attack surface for cybercriminals. One of the most sophisticated and concerning tactics emerging today is the Adversary-in-the-Middle (AiTM) attack. This type of phishing… Continue reading What Are AiTM Attacks? Understanding the Rising Threat of Adversary-in-the-Middle Tactics

6 Reasons Not to Pay the Ransom in a Ransomware Attack (Plus Negotiation Tips)

Discover how to navigate ransomware demands and negotiations. Learn why paying the ransom is often not the best option and explore alternative solutions to protect your business.

Endpoint Detection & Response (EDR) Software: Safeguarding Your Business in an Evolving Threat Landscape

EDR software is crucial for modern cybersecurity, providing essential protection against sophisticated threats to safeguard data and infrastructure. Ensure robust security with advanced EDR solutions.

Cyber Resilience: How to Master the 6 Key Elements (with Examples) and Overcome Today’s Top Challenges 

Discover how to achieve cyber resilience by mastering six key elements and overcoming common challenges. Learn practical strategies and examples to safeguard your business against evolving cyber threats. Schedule a free consultation today!

How to prevent disaster with cybersecurity training for employees

We often point to statistics showing that human error is a business’s greatest cybersecurity vulnerability. Cybersecurity training is absolutely vital to preventing those mistakes.  But what, exactly, should that training consist of? In this post, we break it down for you.

Preventing Data Breaches with Cyber Awareness Training

Cyber awareness training is crucial for every company to prevent data breaches. Learn about cyber threat awareness, phishing simulations, and top training solutions.

Protecting Your Business with Dark Web Monitoring

Discover how the dark web is a breeding ground for cybercrime, from stolen credentials to financial data. Learn why proactive monitoring can save your business from costly data breaches.

Antivirus Software is Changing. What You Need to Know

As cyber threats evolve, traditional antivirus software is no longer sufficient. Businesses must deploy advanced cybersecurity solutions to detect elusive threats and prevent cyberattacks from disrupting their operations.

2025 Guide to Remote Monitoring & Management (RMM)

Learn the importance of Remote Monitoring and Management (RMM) in today’s IT landscape. Our guide outlines key roles, benefits, and compares top RMM solutions to help you choose the best fit for your organization.

Understanding Penetration Testing: What Is Pen Testing and Why It’s Important

Penetration testing (pen testing) simulates cyberattacks to identify vulnerabilities in a network or system. It helps organizations assess security defenses and address weaknesses before attackers exploit them

Critical Recommendations for Your Company Firewall for 2025 (and beyond)

A company firewall is the first defense against threats to your network, server, and devices. Learn about the new role of company firewalls.

Why Your Business Needs Managed Detection and Response (MDR) in 2025

why your organization needs managed detection and response

As the threat landscape has become more complex (and more destructive), organizations have struggled to keep up. MDR offloads the burden of cybersecurity onto stronger technologies and security experts who can manage threats around the clock.

16 Cybercrime Statistics To Inform Your Security Strategy

cybercrime statistics

Changing trends often provide insights into emerging threats and tactics, so staying on top of the latest numbers in cybercrime helps industry leaders understand the landscape and learn how to defend their businesses.

Permanent Remote Workforce? 14 Questions to Consider ASAP

Cybersecurity in the hybrid work era isn’t for the faint of heart. Here are the questions to consider for a permanent remote workforce.

Zero Trust 101: What You Need to Know

In this post, we’ll break down everything you need to know about zero trust security and which solutions to consider at your organization to avoid a catastrophe.

How Cyber Insurance Protects SMBs and Improves Their Resilience

cyber insurance

Cyber insurance may be the one segment of the insurance industry that doesn’t fit our preconceived notions of the business. Ordinarily, when describing insurance, you might use words such as steady, sedate, or even dull. Policies undergo little change from year to year, predictable claims are submitted, payouts are promptly issued, and insurers earn a good rate of return.

New Cybersecurity Standards for 2024

Cybersecurity Standards

New cybersecurity standards are taking shape resulting from a series of steps taken by the Biden administration in the wake of the Solar Winds, Microsoft Exchange, and Colonial Pipeline cyber incidents. 

Hot cybersecurity trends you absolutely must watch

cybersecurity trends you need to know

One of the biggest challenges in cybersecurity is foreseeing the next new threat. Because, unlike other disaster scenarios, cyberattacks are constantly evolving.

What is Cryptojacking? It’s a Bigger Threat than You Think – Here’s Why

cryptojacking

One of the most intriguing cybersecurity trends of the last year has been the sudden decline in ransomware. The file-encrypting attacks have accounted for only 5% of malware payloads in recent months, down from 60% in early 2017. That’s a huge shift in direction for hackers. But just as quickly as ransomware has declined, a new threat has skyrocketed: cryptojacking.

Chaos, Lawsuits, and Lost Lives: The Crisis of Cybercrime in US Hospitals

cybercrime us hospitals

Just as a new wave of coronavirus infections surged across the globe last month, U.S. cybersecurity agencies released a startling statement: “CISA, FBI, and HHS have credible information of an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers.”

SMB Ransomware: Why Businesses Face Big Risks from Attackers

SMB ransomware is growing condern

Large organizations like the Colonial Pipeline get major media attention when they experience ransomware attacks, while incidents at smaller businesses rarely make headlines. This uneven level of attention might lull many small- and medium-sized business (SMB) owners into a false sense of security. While cyberattacks on major businesses get most of the publicity, SMB ransomware is in some ways a bigger threat. 

Data Loss from Malware: What It Is and How to Stop It

data loss from malware

Data is a valuable commodity, and cyberattackers have refined their techniques for accessing, stealing, and removing it. One of their preferred methods is malicious software, better known as malware, which is designed for the sole purpose of disrupting normal computer, network, and server operations. When a business experiences data loss from malware, it can have far-reaching consequences from a financial, marketing, and even legal standpoint. To mitigate the risk of an attack, it’s important to first understand what malware is and how it works.

How Past Ransomware Statistics Can Guide Your Business in the Future

ransomware_statistics_2016_updated

Do you know all about the ransomware statistics of 2016 to present? They’re frightening. Learn how to keep your business safe.

Why Financial Services Ransomware Is Dangerous

On New Year’s Eve, international travelers encountered a rude surprise when attempting to exchange foreign currency: systems were down—indefinitely. Travelex, the popular currency exchange service, had been hit by ransomware. That meant all 1,200 Travelex stores, kiosks and counters in 70 countries around the world had been knocked offline.

Dangerous Types of Ransomware (and How to Guard Against Them)

Learn the types of ransomware

Ransomware is only one of many forms of potential cyberattacks, but it’s likely to elicit the most dramatic and fearful response. Unfortunately, this reaction isn’t the result of melodrama or overreaction. A quick look at some key disaster recovery statistics shows that businesses are perfectly justified in their concern

Ransomware Prevention: What to Do Before, During & After an Attack

ransomware-prevention

Ransomware prevention has become an urgent issue at organizations across the globe, with businesses racing to find the best way to protect themselves.

Is a Russian Cyberattack Imminent?

Even prior to Russia’s invasion of Ukraine, U.S. officials have repeatedly warned that Russia may launch a cyberattack against its adversaries around the world. Now, military intelligence suggests this threat is greater than ever. The White House recently released a statement warning that “There is now evolving intelligence that Russia may be exploring options for… Continue reading Is a Russian Cyberattack Imminent?

Understanding the Top Data Breaches of 2021

While the final tally for the total number of data breaches for 2021 is not yet in, we do know already that it will be a record year. In its report for Q3 2021, The Identity Theft Resource Center (ITRC), a nonprofit organization established to support victims of identity crime, revealed that the number of… Continue reading Understanding the Top Data Breaches of 2021

Battling with the Grifters–phishing insights that you need to know

phishing insights

Phishing insights can be obtained by viewing the widespread and costly phenomenon of phishing as a field of battle. After all, if we look at the language used when talking about phishing — attackers, invaders, adversaries, weapons, intelligence — we know we are in a war of some sort. From our day-to-day experience and the stories we read in the technology and popular press, we sense that the battle is intensifying and the enemy is becoming more skilled and sinister. 

Ransomware Task Force Update : a Look at the Comprehensive Plan

Ransomware Task Force update

With ransomware having recently made a direct attack on U.S. fuel logistics, the Ransomware Task Force’s long-awaited comprehensive plan couldn’t come at a better time.

Understanding the real danger of social engineering

danger of social engineering

Don’t think your business is at risk of getting scammed by criminals? Understand the real danger of social engineering.

Datto Joins Elite Ransomware Task Force

Ransomware Task Force

As ransomware continues to wreak havoc on organizations of all sizes, a new Ransomware Task Force (RTC) has been formed to combat the threat and has invited Datto to join as a founding member.

12 key findings from Datto’s 2020 Ransomware Report

2020 ransomware

Datto has released its annual ransomware report and, as expected, the numbers continue to paint a grim picture.

Why You Need Cybersecurity Training During COVID-19

Cybersecurity Training During COVID-19

With the onslaught of COVID-19 scams and cybersecurity threats, training your teams on safe practices for email and Internet is crucial.

FBI Urges Vigilance with COVID-19 Scams on the Rise

covid-19 scams

As if you didn’t already have enough to worry about, scammers are exploiting the COVID-19 crisis to infiltrate your business and deceive your employees. In the process, they’re stealing data, personal information and money, in what authorities are calling an “unprecedented” surge in coronavirus-related scams.

Ransomware is Coming After Your NAS, Storage Devices

NAS ransomware

While ransomware detections, overall, have dipped at times over the last year, there are signs that strains like “NAS ransomware” are the new rage among cybercriminals.

What really happened in the Baltimore ransomware attack?

Baltimore ransomware

It’s been more than a month since a nasty ransomware infection hobbled the City of Baltimore, disrupting almost every aspect of the city’s operations, including police communications, court systems and the local property market.

2 cybersecurity flaws you should be freaking out about

cybersecurity flaws

Earlier this month researchers discovered two very dangerous, completely unconnected cybersecurity flaws that put millions of computers at risk. And while some patches are already available, analysts say it’s only a matter of time before these vulnerabilities are exploited – possibly on a massive scale (think WannaCry or NotPetya).

2019 ransomware trends you need to know (and prepare for)

What’s the state of ransomware in 2019 so far? Not great, apparently. Despite signs that some cybercriminal groups are moving away from ransomware to other illegal enterprises, like cryptojacking, a near constant stream of attacks have continued to roil businesses this year. Most recently: ·      A medical practice in Michigan was forced to shutter its doors… Continue reading 2019 ransomware trends you need to know (and prepare for)

2017-2018 Ransomware Statistics: 14 Trends to Watch  

The latest ransomware statistics reveal some encouraging signs that attacks are slowing down a bit. But it’s not time to let your guard down.

New Year’s Resolution: Keep Cyberattacks Behind the Datto Firewall

datto firewall

If this year is anything like the last, you can bet it will be filled with more disastrous cyberattacks, global ransomware infections and other assaults on businesses of all sizes. Now is the time to configure your Datto firewall settings for optimal protection against all of these outside threats.

Is the Uber hack a sign of worse data breaches to come?

uber hack

As news broke last week about the massive 2016 Uber hack (and subsequent cover-up), we couldn’t help but wonder: is anybody’s data safe anymore?
Over the last few years, we’ve witnessed some of the worst data hacks in history.