Search Results for "wannacry"

The State of the Channel One Year Post-WannaCry

Not ‘if’, but ‘when’ — a year on from WannaCry, the ransomware threat continues to evolve, presenting renewed threats and opportunities for MSPs to deliver value, Datto’s Frederick Drennan explains.

WannaCry: The Perfect Managed Security Services Sales Starter

Although WannaCry malware presents an opportunity to grow an MSP business, it requires a well-planned business strategy. Barracuda Networks explains.

InfoSec 2017: How to Protect Yourself Against the Next WannaCry

Sophos analyzes the WannaCry outbreak and turns lessons into ironclad defenses. Here’s how to protect against the next WannaCry malware.

Microsoft Windows Patch for WannaCry, WannaCrypt Ransomware

These Microsoft Windows patches protect Windows 10 and older versions of the operating system from WannaCry/WannaCrypt ransomware/malware attacks.

Global WannaCry, WannaCrypt Ransomware Cyberattack: 5 Prevention Steps, 3 Recovery Steps

Five steps that could have prevented or mitigated the global cybersecurity attack involving WannaCry / WannaCrypt ransomware. Plus, 3 recovery steps.

Biggest Global Cyber Attack Ever? 10 WannaCry Ransomware Facts

A global cybersecurity attack involving WannaCry ransomware crippled Microsoft Windows computers across the globe today. Here are 10 facts to know.

Defending Against Hafnium: How Channel Partners Can Help

Patch on-premises Exchange servers & take these four steps to protect customers from Hafnium cyberattacks, Sophos says.

HAFNIUM: First of Many Threat Actors to Exploit ProxyLogon

HAFNIUM compromised tens of thousands of organizations by misusing four zero-day vulnerabilities identified by Microsoft.

RMM & Patch Management: Your First Defense Against Cyberattacks

MSPs can bundle patch management with vulnerability assessments, application security testing, compliance management & more. Datto explains why.

Enterprise Cybersecurity: Where do you Begin?

Capgemini’s Samir Khare explains how to develop and implement a proactive and fit-for-purpose cybersecurity posture for your organization.