The Infocyte Blog

Infocyte is now a part of Datto

Datto Acquires Cybersecurity Company Infocyte

NORWALK, Conn., January 20, 2022 — Datto Holding Corp. (Datto) (NYSE:MSP), the leading global provider of cloud-based software and security solutions purpose-built for Managed Service Providers (MSPs), today announced that it has acquired threat detection and response company Infocyte, extending Datto’s security capabilities that protect, detect, and respond to cyberthreats found within endpoints and cloud…

Read More »
interview with the founders of a managed detection and response company

Under the Hood of an MDR Company: an Exercise in Innovation [Video]

Running a successful EDR platform and MDR service is never-ending pursuit to stay one step ahead of hackers. As threat actors find creative ways to attempt to circumvent our customers defenses, we are constantly innovating to ensure we can detect and respond to security incidents quickly. Our founders Chris Gerritz and Russ Morris joined me…

Read More »
mdr services concept

EDR vs. MDR Services: Which is Right for You?

Cybersecurity is a topic that keeps many business executives, managers, and IT directors up at night, and with good reason. The average cost of a breach in 2021 is estimated at $4.24 million! As information technology grows in sophistication, so do cyber threats. This week, for example, the Apache Log4j vulnerability has sent security teams…

Read More »

Log4j Security Advisory: The Infocyte Platform is Not Vulnerable

This post was last updated on December 22nd, 2021 at 01:32 pmYou’ve likely heard that a major vulnerability in Apache Log4j was recently disclosed. Our team has been working around the clock to empower our customers to scan their systems for exploits and keep you updated as the situation develops. For more information, please see…

Read More »
ransomware detection concept; laptop, displaying a ransomware attack, analyzed by magnifying glass

Ransomware Detection: How Infocyte Uses the CISA Ransomware Guide

This post was last updated on December 9th, 2021 at 11:14 amLarge organizations and middle-sized businesses dread the ransomware plague as it can paralyze day-to-day operations and expose confidential information to the public. Most organizations have taken some steps toward protecting their business through ransomware detection and protection, but is it enough?  The Cybersecurity and…

Read More »

Managed Detection and Response 101 [Video]

Cyberattacks are at an all-time high. Ransomware is all over the news, and killware is the next big fear. Hackers are growing more competent at detecting gaps and loopholes in corporate security systems. They can obtain access to secured files and data as technology advances, creating a serious cybersecurity concern. Cybercriminals target organizations with some…

Read More »
French headquarters of Microsoft

Microsoft 365: Should Your Organization be Worried About Microsoft 365 Vulnerabilities?

Microsoft 365 hails as the lifeblood of most American (and global) small-medium sized enterprises. Since the wake of the Covid-19 pandemic, cybercriminals and hackers have seemed to up their illegal game by targeting more organizations than ever witnessed before. This year alone, tens of thousands of organizations had the security of their Microsoft 365 systems…

Read More »
A team of government agents executing ransomware protection methods

How Can State and Local Municipalities Protect Themselves from Ransomware?

This post was last updated on November 3rd, 2021 at 09:54 amThe extent of ransomware attacks among government entities was especially revealed when the world, particularly the US, was countering the pandemic. It’s now clear that cybercriminals might continue halting delivery of essential services unless state and local municipalities do something to end the ransomware…

Read More »
Detecting and Responding to Ransomware Attacks

Behind the Scenes: What Happens in a Ransomware Attack? [Video]

This post was last updated on September 27th, 2021 at 12:31 pmThe first step to protecting yourself from a ransomware attack is understanding what it actually is. The behaviors that constitute a threat might individually seem like perfectly normal activity, even to someone who knows what they are looking for. If we put ourselves in…

Read More »

Responding to Kaseya VSA Vulnerability & REvil Ransomware Attack

Infocyte Guide to Responding to Kaseya VSA Vulnerability & Ransomware Attack

Read More »