




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
Followuson:
Twitter,
Instagram,
Facebook,
LinkedIn,
YouTube
Subscribetoourblog:
/blog
TableofContents
Introduction
1
HackersAren’tOnlyTargetingSMBs…
14
KeyFindings
2
AlmostHalfOfMSPsPartnerWithMSSPs
15
COVID-19andSecurity
3
WindowsEndpointSystemsApplications
16
MostTargetedbyHackers
AVarietyofMalwareTargetingSMBs
4
RansomwareCreepsIntoSaaSApps
17
RansomwareStillaMajorChallengeforMSPs
5
MostCommonRansomwareRecoveryMethods
18
RansomwareAwareness
7
BCDRClientsAreLessLikelytoExperience
20
RansomwareContinuestoSkirtCybersecurity
8
SignificantDowntime
Efforts
FinalTakeaways
22
SMBsKeepTakingTheBait
9
AdditionalResources
23
TheAftermathofAttacks
10
AbouttheReport
24
DowntimeFarMoreCostlyThanRansom
11
StillLocking(AfterAllTheseYears)
12
IndustriesMostSusceptibletoRansomware
13
Datto’sGlobalStateoftheChannelRansomwareReport ii
Introduction
Datto’sAnnualGlobalStateoftheChannelRansomwareReportcomprisesstatisticspulledfromasurveyofmorethan1,000managedserviceproviders(MSPs)aroundtheworld.Thereportprovidesuniquevisibilityintothestateofransomwarefromtheperspectiveofthe
ITchannelandtheirsmallandmediumbusiness(SMB)clientswhoaredealingwiththeseinfectionsonadailybasis.Thereportprovidesawealthofdetailonransomware,includingyear-over-yeartrends,frequency,targets,impact,andrecommendationsforensuringrecoveryandcontinuityinthefaceofthisgrowingthreat.
Withrespecttothecurrentclimate,thereportalsocoverstheimpactthatCOVID-19andtheincreaseinremoteworkandcloudcomputinghashadonransomwaretrends.
Thegoalofthisreportistohelpshedlightonthecurrentcybersecuritylandscapebusinessesarefacing.AtDatto,webelievethereisnolimittowhatsmallandmediumbusinessescanachievewiththerighttechnology.WehopethattheinformationcompiledhereenablesMSPstoeducatetheirclientsandworkwiththemtomitigatetheriskransomwareposesonbusinesses.
Datto’sGlobalStateoftheChannelRansomwareReport 1
KeyFindings
1Ransomwareisstillthenumberonemalwarethreat.Nearly70%ofMSPsreportransomwareasthemostcommonmalwarethreattoSMBs.
2COVID-19hashadanimpactonsecurity—butnotasmuchasyoumightthink.MSPsweresplitonthesecurityimpactoftheglobalpandemic.
3TheransomwaredisconnectbetweenMSPsandSMBsremains.84%ofMSPsare‘veryconcerned’aboutransomware,
butonly30%reportthattheirclientsfeelthesame.
4SMBsaren’ttheonlybusinessesbeingtargeted.95%ofMSPsagreethattheirownbusinessesareincreasinglybeingtargetedwithattacks.
5Phishingemailstopthesuccessfulattackvectorlist.Lackofcybersecurityeducation,weakpasswords,andpooruserpracticesareamongtheothertopcausesofransomware.
6
7
8
9
10
Theaftermathofanattackisnothingnice.62%ofMSPssaidclients’productivitywasimpactedduetoattacks,and39%saidtheirclientsexperiencedbusiness-threateningdowntime.
Theaverageransomrequestedbyhackersstayedroughlythesameyear-over-year.MSPsreporttheaveragerequestedransomforSMBsis$5,600perincident,comparedto$5,900lastyear.
MSPsreportthattheaveragecostofdowntimeis94%greaterthanitwasin2019.Downtimecostsarenearly50Xgreaterthantheransomrequestedin2020.
91%ofMSPsreportthatclientswithBCDRsolutionsin
placearelesslikelytoexperiencesignificantdowntimeduringaransomwareattack.
92%ofMSPspredictransomwareattackswillcontinueat
current,orworse,rates.
Datto’sGlobalStateoftheChannelRansomwareReport 2
COVID-19andSecurity
AMixedBag
ManyMSPsreportedthatthenumberofransomwareattacksandsecurityvulnerabilitiesincreasedduringCOVID-19duetoanincreaseinremoteworkandcloudcomputing.However,itisworthpointingoutthatitwasn’tanoverwhelmingincrease—moreofanevensplitbetweenthosewhosawanincreaseandthosewhodidnot.
“[Personaldevices]havebeenintroducedtocorporate/businessenvironmentsdespiteobjectionsre:securitypolicies/endpointprotection,etc.Additionally,therearesignificantadditionalremoteworksecuritythreats,fromdevicethefttofamilymembersusingcorporatemachinesforpersonalwork/study,”saidanother.
59%
ofMSPssaidremoteworkduetoCOVID-19resultedinincreasedransomwareattacks.
52%
ofMSPsreportedthatshiftingclientworkloadstothecloudcamewithincreasedsecurityvulnerabilities.
MSPsreporthealthcareasthemostvulnerableindustryduringthepandemic(59%),followedbyfinance/insurance(50%),andgovernment(45%).
NorthAmerica Europe AsiaPacific
IncreasedriskcanbeattributedtousercarelessnessandsecurityvulnerabilitiesassociatedwithBYOD,accordingtorespondents.“Theriskcomesfromusersloweringtheirguardastherearesomanyotherthingsthathavechanged—healthrisks,workingfromhome,etc,”saidoneMSP.
55% 42% 47%
NorthAmericanMSPsaresomewhatmoreconcernedaboutcloudsecuritythantheirEuropeanandAsiaPacificcounterparts.
GEOTRENDS
Datto’sGlobalStateoftheChannelRansomwareReport 3
VarietyofMalwareTargetingSMBs
AmongthemalwarethreatsimpactingSMBs,ransomwareisstillatthetopoftheheap.However,it’sfarfromtheonlythreatontheirplate.Viruses,adware,spyware,andremoteaccesstrojansroundedoutthetopfive.
Cryptojacking,hotlastyear,cooledconsiderably,dropping15percentagepoints.Thistrackswithmainstreamreportsthat
cryptojackingisin
decline
ashackershavegrownimpatientwithslowreturnsoncoinmining.
Inthelasttwoyears,MSPsreportthefollowingtypesofmalwarehaveaffectedclients:
44%
Spyware
13%
Rootkits
15% 11%
Worms Exploitkits
56%
Viruses
68%
Ransomware
16%
Cryptojacking
53%
Adware
19%
Remoteaccess
trojans
11%
Keyloggers
*Surveyrespondentswereabletoselectmultipleanswerchoices.
Datto’sGlobalStateoftheChannelRansomwareReport 4
RansomwareStilla
MajorChallengeforMSPs
RansomwarecontinuestoplagueMSPsandtheSMBstheyserve.However,respondentsreportedaslightdeclineinthefrequencyofattacks.78%ofMSPsreportedattacksontheirclientsinthepasttwoyears,downfrom85%lastyear.Thatbeingsaid,ransomwareis
stillaveryrealthreatwith60%ofMSPsseeingattacksinthefirsthalfof2020.
ItisworthnotingthatthegeneraldisruptionofCOVID-19andresultingeconomicdownturnmayhaveimpactedthefrequencyofattacksontheSMBsthatMSPsserve.Thisispurelyspeculative,andoutsideoftheresearchconductedforthisreport.However,itwillbeinterestingtoseewhetherMSPsreportanuptickinransomwareattacksastheglobaleconomycontinuestorecover.
MSPsbelievethatwillbethecase.Nearlyallrespondentssaidtheyexpectransomwareattackswillriseintheupcomingyear.
78% 92%
ofMSPsreportattacksagainst ofMSPspredictattacks
SMBsinthelasttwoyears willincreaseinthenextyear
60% 11%
ofMSPsreportattacksagainst ofMSPsreportthatclients
SMBsin2020alone sufferedmultipleattacksin
asingleday
NorthAmerica Europe AsiaPacific
77% 85% 79%
EuropeanMSPsreportthattheirclientssufferedmoreattacksthananyotherregion.
GEOTRENDS
Datto’sGlobalStateoftheChannelRansomwareReport 5
Ransomwareisnotgoingaway,butattackersmayhaveshiftedtheirfocustemporarilytootherrevenuestreamsduringCOVID-19.Ifyouthinkofransomwarelikea‘business’thatneedstorespondtochangingmarketconditions,itmakessenseforthoseattackerstofocusonmorestablesourcesofrevenue,likelargerenterprises,duringaneconomicdownturn.Enterprisesbothrepresentalarger‘returnoninvestment’tohackersandaremoreresilienttofluctuationsintheeconomy.Ransomwareisanumbersgame,andlargercompaniessimplyrepresentabettertargetintougheconomictimes.
RyanWeeks
ChiefInformationSecurityOfficer,Datto,Inc.
Datto’sGlobalStateoftheChannelRansomwareReport 6
RansomwareAwareness
SMBsvs.MSPs
ThereisstilladisconnectbetweenSMBsandMSPswhenitcomestoperceptionsaboutransomware.ThemajorityofMSPsbelievebusinessesshouldbe“veryconcerned”aboutthethreatofransomware,butonly30%reporttheirclientsfeelthisway.However,itappearsthatSMBsarebeginningtounderstandhowdamagingransomwareattackscanbe.32%ofMSPsreportclientsare“moderatelyconcerned”and34%sayclientsare“somewhatconcerned”.
30% 84%
ofMSPsreportSMBsare ofMSPsreportSMBsshouldbe
“veryconcerned”about “veryconcerned”about
ransomware ransomware
SMBSecurityBudgetsontheRise
50%
ofMSPssaidtheirclientsincreased
budgetforITsecurityin2020.
Inadditiontothegrowingawarenessabove,increasedITsecurityspendingshowsthatSMBsarebeginningtotakeransomware,andsecurityingeneral,seriously.Theslightdeclineinransomwareattacksthisyearmightalsoindicatethatthesesecurityeffortsarehavingapositiveimpact.
NorthAmerica Europe AsiaPacific
31% 19% 33%
ComparedtotheirNorthAmericanandAsiaPacificcounterparts,fewerEuropeanMSPssaidtheirclientsfeel“veryconcerned”aboutransomwareattacks.
GEOTRENDS
Datto’sGlobalStateoftheChannelRansomwareReport 7
RansomwareContinuestoSkirtCybersecurityEfforts
Despiteincreasedsecurityspending,MSPsreportthatransomwareavertedcybersecurityeffortsincludingemployeeeducation,antivirus,emailfiltering,pop-upblockers,andendpointdetectionsolutions.Ofthem,50%saidransomwareavertedantivirus/anti-malwaresolutions.
Whenaskedaboutwhichantivirus/anti-malwaresolutionsspecifically,
MSPssaid:
59% 24%
Anti-malwarefiltering(email-, Endpointdetection
network-,andweb-based) andresponse
42% 12%
Legacysignature-based NextGenanti-virus
antivirus
Ransomwareisabletogetaroundthesesolutionsbecausethecybercriminalsfrequentlymodifytheirmalwaretoavoiddetection.What’sworse,thesocialengineeringtacticscriminalsusetodupevictimshavebecomeverysophisticatedandhardtodetect—evenwithsecurityeducation(moreonthatbelow).
That’swhyamultilayeredapproachtoransomwarethatincludesbusinesscontinuityissoimportant.Securitysoftwareandtrainingareessentialtopreventattacksbeforetheyhappen.Businesscontinuityenablesorganizationstoresumenormaloperationsquicklyifsecuritymeasuresfail.
Datto’sGlobalStateoftheChannelRansomwareReport 8
SMBsKeepTakingtheBait
Asnotedabove,endusereducationisanessentialpieceofaneffectiveransomwareprotectionstrategy.Thisyear’ssurveyresultsbearthatout:phishing,pooruserpractices,andlackofendusercybersecuritytrainingwerethethreemostcommoncausesofsuccessfulransomwarebreaches.
So,itisimportanttonotethatsecuritytrainingmustgobeyondjusthowtoidentifyphishingattacks.Whilephishingtoppedthelist,weakpasswords,openRDPaccess,andahostofotherusererrorswerealsotoblameforbreaches.
D
9CybersecurityTipsfor
EA
MSPstoBringtotheirClients
R
LeadingcausesofransomwareattacksreportedbyMSPs:
Phishingemails
60
54%
Pooruserpractices/gullibility
27%
Lackofcybersecuritytraining
26%
Weakpasswords/accessmanagement
21%
OpenRDPaccess
20%
Clickbait
17%
Maliciouswebsites
14%
Lost/stolenusercredentials
10%
LackoffundingforITsecuritysolutions
8%
Lackofexecutivebuy-inforadoptingsecuritysolutions
8%
*Surveyrespondentswereaskedtoselectthreeanswerchoices.
Datto’sGlobalStateoftheChannelRansomwareReport 9
TheAftermathofAttacks
Ransomwareattackscanresultinconsiderablebusinessdowntime,becausebreachesarerarelylimitedtoasinglecomputer.Mostoftheransomwareinusetodayisdesignedtocrawlbusinessnetworks,lookingforadditionalmachinestoinfect.Ifthemalwaregoesundetected,itdoesn’ttakelongfornumeroususerdevices,servers,andevendatainSaaSapplicationstobecomeencrypted.Restorescanbetimeconsuming,especiallyusingtraditionalbackuptools.
So,itmakessensethatlossofbusinessproductivityandbusiness-threateningdowntimewereatthetopofthelistofransomwareresults.Italsoexplainswhynearly20%ofMSPsreportedthatSMBswereforcedtopayaransominordertoreturntonormalbusiness.AllofthishighlightstheneedforabusinesscontinuitysolutionthatenablesSMBstoreturntoworkfast.
ConsequencesresultingfromransomwareattacksreportedbyMSPs:
Lossofbusiness
productivity
70
Stolendata
70
62%
13%
Business-threatening
Hackersthreatenedtopublicize
downtime
dataifransomwentunpaid
39%
10%
Ransomwareremained
Lostdataand/ordevice
onsystem,struckagain!
28%
6%
Decreased
Failuretomeet
customerprofitability
SLArequirements
24%
6%
Clientspaidransom
Failuretoachieve
andrecovereddata
regulatorycompliance
19%
4%
Paidaransombut
Damagedreputation
datawasneverreleased
17%
4%
*Surveyrespondentswereaskedtoselectthreeanswerchoices.
Datto’sGlobalStateoftheChannelRansomwareReport 10
DowntimeFarMore
CostlythanRansom
Whenitcomestoransomwareattacks,MSPsreportthecostofdowntimeisnearly50Xgreaterthantheransomrequested.
GEOTRENDS
AverageRansomin...
2018 2019 2020
$4,300 $5,900 $5,600
MSPsreporttheaveragecostofransomstayedroughlythesamein2020asitwasin2019.Sowhiletherehasbeenaslightdeclineinthefrequencyofattacks,hackersarestilldemandingahighransompayment.Wesawabiguptickinaverageransomfrom2018to2019,whenthedemandsincreasedby37%.
2020:Ransomvs.DowntimeCosts
Region
Ransom
Downtime
NorthAmerica
$6,200
$308,900
Europe
$3,500
$185,800
AsiaPacific
$4,400
$257,000
AverageCostofDowntimein...
2018
2019
2020
$46,800
$141,000
$274,200
MSPsreportedthattheaveragedowntimecostperincidenthasincreasedby94%from2019andastaggering486%from2018.
So,whatdoesthismeanexactly?Well,onfacevalueitmeansthatdowntimecostsarehigherthanreportedtwoyearsago,obviously.Thismaymeanthatdowntimecostshaveincreased,oritcouldmeanthatMSPsaregettingbetteratcalculatingtherealcostsofdowntime.Eitherway,it’sclearthatMSPsunderstandthatthedamageassociatedwithbusinessdowntimeisfarmorecostlythantheactualransom.
DowntimecostsvarywidelyamongbusinessesandthesenumbersarebasedonMSPestimates.Tocalculatethecostofpotentialdowntimeforyourbusiness,checkoutour
RecoveryTimeand
DowntimeCostCalculator
.
*AllsurveyrespondentsansweredinU.S.dollars.
Datto’sGlobalStateoftheChannelRansomwareReport 11
StillLocking
(AfterAll
TheseYears)
Forthe5thconsecutiveyearinarow,MSPsreportedCryptoLockerasthetopransomwarevariantimpactingtheirclients(52%).WannaCrywasnextonthelistat26%,followedbyCryptowall(16%)andLocky(13%).
Interestingly,33%ofrespondentssaidtheyweren’tsurewhatkindofransomwaretheydealtwith.Thisisimportanttonotefortworeasons.First,thetypeofransomwareultimatelydoesn’treallymatter—everytypecanresultinbusinessdowntime.Second,themethodsMSPsusetocombatransomwareandrecoverfollowingattacksarethesameregardlessofthestrain.
D
CommonTypes
EA
ofRansomware
R
0
10
20
30
40
50
60
CryptoLocker
52%
WannaCry
26%
Cryptowall
16%
Locky
13%
Emotet
10%
Petya
7%
CryptXXX
7%
TeslaCrypt
6%
notPetya
5%
TorrentLocker
4%
CBTLocker
3%
CoinVault
3%
CrySis 3%
Wallet 2%
Osiris 2%
Notsurewhattype
33%
*Surveyrespondentswereabletoselectmultipleanswerchoices.
Datto’sGlobalStateoftheChannelRansomwareReport 12
IndustriesMost
IndustriesmostsusceptibletoransomwareduetoCOVID-19:
SusceptibletoRansomware
ThisyearweaskedMSPswhatindustriesweremostsusceptibleto
ransomware
attacksduetoCOVID-19
.Perhapsnotsurprisingly,healthcarewasinthetopspot.59%ofMSPssaidtheybelievedhealthcaretobethemostvulnerable.Hackersarewellknownforstagingattacksagainstvictimsthatarealreadycompromisedinsomeway.So,itmakessensethatcybercriminalswouldgoafterhealthcareorganizationsduringaglobalpandemic.
Finance/insurancewasinthesecondslot(50%)andGovernmentinthird(45%).Theseverticalswerealsoseriouslyimpactedbythepandemicforobviousreasons.Outsideofthetopthree,therestofthelistlooksfairlysimilartopreviousyears’results.
Healthcare
Finance/Insurance
Government
Professional
Services
Education
HighTechnology
Legal
Non-Profit
Energy/
Utilities
Retail
Construction/
Manufacturing
RealEstate
Travel/
Transportation
Telecom
Media/
Entertainment
Consumer
Products
Architecture/Design
Other
0 10 20 30 40 50 60 70
59%
50%
45%
41%
36%
35%
35%
29%
29%
27%
25%
23%
22%
22%
22%
18%
17%
7%
*Surveyrespondentswereabletoselectmultipleanswerchoices.
Datto’sGlobalStateoftheChannelRansomwareReport 13
HackersAren’t
OnlyTargetingSMBs…
95%ofrespondentsagreedthatMSPsarebeingincreasinglytargeted
byransomwareattacks.Thisislikelyduetoanumberofhighprofile
attacksonSMBsin
recentmemory
.Inattackslikethese,hackersuse
MSPcredentialstoaccessandspreadransomwaretotheirclients.In
otherwords,bycompromisinganMSP,cybercriminalsgetmorebangfor
theirbuck.
MSPsaretakingthethreatseriously.Morethanhalfarenowusing
passwordmanagementandmulti-factorauthenticationtools,asyou
willseebelow.
2FAandSSOUse
44%reportedthattheyareusinganidentityproviderforSingleSign-on
(SSO).MicrosoftAzureActiveDirectorywasbyfarthetopchoiceofSSO
identityprovidersamongrespondents.47%ofMSPssaidtheyuseAzure
ADforSSO.Ofthat44%,nearly70%usethesameproviderfortwo-factor
authentication(2FA).
Datto’sGlobalStateoftheChannelRansomwareReport 14
AlmostHalfofMSPsPartnerwithMSSPs
46%ofMSPsnowpartnerwithmanagedsecurityserviceproviders(MSSPs)forassistancewithITsecurity—fortheirclientsandtheirownbusinesses.Infact,thenumberonereasonMSPsreporteddoingsowastoimprovetheirownsecuritypreparedness—anothersignthatMSPsaretakingthepossibilityofattacksontheirownbusinessesseriously.
Ultimately,partneringwithanMSSPboilsdowntoaccessingexpertguidance.ITsecurityisabroad,complexdisciplinewhichrequiresspecializationtodevelopexpertise.MSSPshaveit,andMSPsneedit.
46%ofMSPsnowpartner
withMSSPsforassistance
withITsecurity
MSPsthatpartnerwithMSSPscitedthefollowingreasons:
0 10 20 30 40 50 60
Toboostcybersecurity/
ransomware 54%
preparednessatmyMSP
Toreducecyberrisk
47%
tomybusiness
Tobetterunderstand
availableandeffective 45%
securitytechnologies
Forcybersecurity
45%
solutionsales
Toeducatemystaff
throughexperienceand 35%
exposure
Apathwayto
transformingmyMSPto 23%
anMSSP
Tosharecyberriskwith
22%
anotherorganization
Other 10%
*Surveyrespondentswereabletoselectmultipleanswerchoices.
Datto’sGlobalStateoftheChannelRansomwareReport 15
WindowsEndpointSystemsApplicationsMostTargetedbyHackers
91%ofransomwareattackstargetedWindowsPCsthisyear,accordingtoMSPs.ThistrackswithphishingemailsbeingthenumberoneattackvectorandthesheernumberofWindowsPCsinusetoday.Italsohighlightstheneedforendpointprotectionandbackupsolutions.Ransomwareattacksonthesesystemshaveasignificantimpactonuserproductivity,andinturn,abusiness’abilitytogeneraterevenue.Solutionsthatallowemployeestoreturntoworkquicklyfollowingattacksshouldbeconsideredessential.
WindowsServersfollowedat76%.That’sbecauseransomwaremayenteranetworkviaaphishingemail,butasnotedabove,itdoesn’ttakelongbeforethemalwarespreadsacrossnetworkstoinfectothersystems.Abusinesscontinuitysolutionthatcanrecoverserverworkloadslocallyorinthecloudiscriticaltominimizebusinessinterruptionfollowingaransomwareattack.
Endpointsystemsmosttargetedbyransomwareattacks:
WindowsPCs WindowsServer
91% 76%
WindowsTablet AppleMacOS
8% 7%
Android AppleiOS
6% 4%
*Surveyrespondentswereabletoselectmultipleanswerchoices.
Datto’sGlobalStateoftheChannelRansomwareReport 16
RansomwareCreeps
IntoSaaSApps
Nearly1in4MSPsreportedransomwareattacksonclients’SaaS
applications.Ofthem,Microsoftwashitthehardest.Thisisn’t
particularlysurprising,sincesomanyorganizationsrelyonMicrosoft
Itwassomewhatsurprising,however,toseethatmorethanhalfsawransomwareinDropbox.GoogleWorkspaceroundedoutthetopthreeat25%.
64%
54%
25%
ofMSPsreport
ofMSPsreport
ofMSPsreport
attackswithin
attackswithin
attackswithin
Microsoft365
Dropbox
GoogleWorkspace
HumanErrorHappens:
HowSaaSBackupCanHelp
READ
*Surveyrespondentswereabletoselectmultipleanswerchoices.
Datto’sGlobalStateoftheChannelRansomwareReport 17
MostCommon
Ransomware
RecoveryMethods
Re-imagingamachinefromabackupwasthenumberoneransomware
recoverymethodthisyear.Thisisasignificantchangefromlastyear,
whenre-imagingfromdefaulttookthetopspot.Thisyearthatwasin
thethirdspottiedwithvirtualizingthesystemfromabackupimage.
76%
33%
27%
Restoreamachine
Re-image
Runsoftwareto
fromabackup
fromdefault
cleanupthreat
36%
31%
15%
Restorefromfiles
Virtualizethe
Paidransom
systemfroma
backupimage
*Surveyrespondentswereabletoselectmultipleanswerchoices.
Datto’sGlobalStateoftheChannelRansomwareReport 18
I’mpleasedtoseethat‘re-imagingfrombackup’wasthetopmethodMSPsareusingtorecoverfromransomwareattacks.ThisshowsMSPshavematuredtheirrecoverymethods.Twoyearsago,MSPswerestilldealingwiththeshockofransomware,scramblingtoputsomethinginplaceforrecoveryandlargelyre-imagingmachinesfromscratch.Lastyear,theywereintheprocessofchanginghowtheydothings,puttingtherightsolutionsinplacewiththeircustomerstominimizedowntimeanddataloss.Now,wearestartingtoseeresultsofthoseeffortsmanifestinmorematurerecoverymechanisms.
RyanWeeks
ChiefInformationSecurityOfficer,Datto,Inc.
Datto’sGlobalStateoftheChannelRansomwareReport 19
BCDRClientsAreLessLikelyToExperienceSignificantDowntime
91%
ofMSPssaidclientswithBCDRproductsin
placearelesslikelytoexperiencesignificant
downtimefromransomware.
MostEffectiveSolutionsto
CombatRansomware
Businesscontinuityand
disasterrecovery(BCDR)
Employeetraining
Endpointdetectionand
responseplatform
Patchmanagement
Unifiedthreatmanagement
Identityaccess
managementsolution
Antivirus/Anti-malwaresoftware
Email/Spamfilters
Endpoint/Mobile
managementplatform
Browserisolation
Datto’sGlobalStateoftheChannelRansomwareReport 20
WerequireDattoSIRISasaminimumforallourclientsasoneofthesecurity/continuitylayersweputinplace.Tome,it’sju
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 創(chuàng)新團(tuán)隊(duì)課題申報(bào)書
- 高質(zhì)量發(fā)展課題申報(bào)書
- 民間音樂課題申報(bào)書
- 調(diào)研課題申報(bào)立項(xiàng)書格式
- 鹵菜技術(shù)傳授合同范本
- 課題申報(bào)書保障條件
- 員工繳納公積金合同范本
- 個(gè)人承包私活合同范本
- 包銷合同范本版
- 售房補(bǔ)充合同范本
- 接力版六年級(jí)下冊(cè)小學(xué)英語 Lesson 4 Sally is going to Beijing. 第一課時(shí) 教案(教學(xué)設(shè)計(jì))
- 食堂蔬菜品種及質(zhì)量標(biāo)準(zhǔn)
- 《大數(shù)據(jù)分析與應(yīng)用》教學(xué)大綱
- FZW2812F(FDR)型用戶分界真空負(fù)荷開關(guān)安裝使用說明書完
- 2022年中國遠(yuǎn)洋海運(yùn)集團(tuán)有限公司招聘考試題庫及答案解析
- 供應(yīng)鏈管理課件第5章供應(yīng)鏈合作伙伴選擇與評(píng)價(jià)
- 4D現(xiàn)場管理培訓(xùn)ppt課件(PPT 45頁)
- 餐飲店面投資預(yù)算(900平方米)
- 小學(xué)生個(gè)人簡歷WORD模板
- 檢驗(yàn)科危急值管理.
- 五輥研磨機(jī)(課堂PPT)
評(píng)論
0/150
提交評(píng)論