<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

MDR Service Delivery Options

Organizations of all sizes rely on managed security service providers (MSSPs) to deliver managed detection and response (MDR) and additional cybersecurity services at scale. Understanding the various service options can save your organization money and resources.

What is Microsoft Defender for Endpoint and How Does it Work?

Microsoft Defender for Endpoint, formerly known as Microsoft Defender Advanced Threat Protection, provides enterprise-level protection to endpoints to prevent, detect, investigate, and respond to advanced threats.

What is the Zero Trust Framework?

Zero Trust security concept is a model and framework developed by former Forrester analyst John Kindervag in 2010. Since then, the Zero Trust model is widely adopted, with leading researchers at Gartner, Microsoft, and Google all developing and implementing their variations of Zero Trust frameworks while keeping the core concept intact.

Behavioral Indicators of Insider Threat Activity

Contrary to popular beliefs, an insider threat is not always a security risk within an organization's immediate perimeter. Current employees and managers aside, an insider threat could be a former employee who had access to specific information, a third-party consultant, or a business partner.

Why User Education is #1 in Cyber Resilience

Statistical data shows that over one-third, or 36 percent, of ransomware infections happen due to a lack of cybersecurity training across organizations across all industry verticals. Another 30 percent of the ransomware infections worldwide materialize because of weak user passwords, while 25 percent are due to poor user practices, according to managed service providers (MSPs) surveyed.

2021: The Year of Security Decisiveness

The case for Google Chronicle in a Supply Chain Attack

In light of the recent SolarWinds Orion “SUNBURST” Supply Chain attack, there is a strong use case for deploying Google Chronicle to protect your network and organization against a similar attack.

Security Advisory - SolarWinds Orion "Sunburst" Supply Chain Attack

On December 13th, 2020, SolarWinds released a statement along with FireEye about a current and ongoing supply chain compromise surrounding the SolarWinds Orion products. This impacts SolarWinds Orion software versions 2019.4 through 2020.2.1, released between March 2020 and June 2020. SolarWinds has pushed out a hotfix that will resolve the affected product.

Why having a SIEM is Essential for Remote Work

The share of the workforce working remotely and the percentage of freelancing workers was steadily rising worldwide, even before the spread of the COVID-19 virus. Working entirely from home or performing specific tasks remotely is already a routine across organizations of all sizes and all industry verticals. The spread of the coronavirus only speeds up the process of shifting toward a more flexible work environment in which work from home plays an increasingly important role.

Top 5 Remote Work Tips from Datashield

At Datashield, we pride ourselves on our ability to protect our clients, especially during the pandemic. Our security experts have compiled a list of the top five tips for those looking to increase their security in a remote work environment.

  • 3 min read
  • Dec 9, 2020 1:00:22 PM

    Related Posts