CVE-2023-27350: Ongoing Exploitation of PaperCut Vulnerability
CVE-2023-27350 is a vulnerability in PaperCut MF/NG software. A patch is available for this vulnerability and should be applied on an emergency basis. (Blog)
Highly adaptable writer and marketer capable of covering technical and business topics with a deep background in backup and disaster recovery, storage, and security technologies (15+ years’ experience). Proven track record of success in creative and leadership roles including Senior Technical Content Manager, Technical Marketing Writer, Executive Editor, Senior Site Editor.
CVE-2023-27350 is a vulnerability in PaperCut MF/NG software. A patch is available for this vulnerability and should be applied on an emergency basis. (Blog)
Rapid7 is tracking CVE-2023-27997, a purportedly critical remote code execution (RCE) vulnerability in Fortigate SSL VPN firewalls. (Blog)
Rapid7 research has found that nearly 19,000 ESXi servers likely remain vulnerable to CVE-2021-21974, which is being exploited in the ESXiArgs campaign. (Ghost written blog)
With employees reluctant to return to the office following the COVID-19 pandemic, the concept of a well-defined network perimeter has become a thing of the past for many organizations. Attack surfaces continue to expand, and as a result, threat intelligence has taken on even greater importance. (Blog)
Recent BitSight research on CVE-2021-41773 and CVE-2021-42013 illustrates the importance of an effective software update and patch management strategy as well as the need for third-party risk management. (Blog)
The purpose of IT disaster recovery testing is to discover flaws in your disaster recovery (DR) plan, so you can resolve them before they impact your ability to restore operations. Regular testing is the only way to be certain you can restore customer operations quickly following an outage. (eBook)
Datto surveyed 1,800+ IT service providers worldwide to learn more about who they are and what they care about. The result: a wealth of data and insights on topics that range from how they run their business, what solutions they plan to offer, and what is driving growth in today’s challenging environment. (Research report)
Based on a survey of more than 1,000 IT service providers around the world, this report provides a wealth of detail on ransomware, including year-over-year trends, frequency, targets, impact, and recommendations for ensuring business continuity in the face of this growing threat. (Research report)
One Datto illustrates how integrated solutions increase efficiency and build MRR. In this video, we show how a fully integrated platform of best-in-class Continuity, SaaS protection, networking, RMM, and PSA solutions combine to streamline a response to a ransomware attack. (Video script)
Becoming cyber resilient is not an overnight endeavor. Security and resilience have been in Datto's culture and built into our technologies from the start. We can help guide your cyber resilience journey. Start the Journey Datto partners with MSPs to build cyber resilience and deliver peace of mind. (Web copy)
The term "cyber resilience" refers to a business's ability to continuously deliver on its intended outcome despite adverse cyber events. In other words, cyber resilience allows businesses to continue normal operations in the event of a cyberattack. (Blog)
These days, ransomware attacks and data breaches are in the news so often, you’d think IT security would be an easy sell to C-level execs. However, many continue to balk at IT spending—especially on technology that doesn’t have a direct impact on driving revenue. (Blog)
It's safe to say server virtualization has had a large impact on the way disaster recovery ( DR) is performed today. The ability to replicate a virtual machine (VM) to a remote site or cloud, and then fail over production to the replica VM in the event of an outage, has changed the way we think about disaster recovery. (Feature)
A recent survey of our readers revealed that nearly 40% of companies are responsible for the data protection of five or more offices, including remote offices/branch offices (ROBOs). Challenges to remote data backup exist for a number of reasons: lack of on-site IT staff, dated or mismatched technologies, and budget constraints. (Feature)