Why Patch Management is so important

You’ve seen the news and read the articles. The recent ransomeware attack is being called the largest ransomware attack in internet history. But did you now that the damage could have been avoided if those computers had been properly patched?

What is patch management?

“Patches” are upgrades for software applications and technologies that you have on your computers and network devices. A Patch Management strategy is an ongoing plan for managing patches that can help a business or organization handle the changes efficiently.

Why Patch Management is so important

As more devices and operating systems are introduced into your organization, security and endpoint management of desktops, laptops and mobile devices, become increasingly difficult. With every new connection, the need for more sophisticated patch management and lifecycle management takes on added importance. Figuring out how to manage this expansion of devices has become a huge headache and risk for business today.

Datotel offers an Endpoint Management solution that automates the patching process for devices – both on and off your network. Plus, it provides you with at-a-glance visibility into the patching status of your entire IT environment. Our engineers ensure that your Windows and third-party patches are at a secure level. We monitor for available patches, gather and validate patch data and track patch distribution in real-time

Additionally, our Endpoint Management solution includes managed anti-virus, asset tracking and reporting and remote management.

A regularly maintained network means fewer failures, higher productivity, cost savings and enables you to focus on your core business activities, instead of managing devices and problems. Here is a link to a recent article from a Washington University cybersecurity expert: Preventing WannaCry, other ransomware attacks. I encourage you to make sure your machines are updated and protected. If you would like to learn more about Datotel’s Endpoint Solution, please let us know.

First Name (required)
Last Name (required)
Email (required)
Phone Number
Posted in Endpoint Management, Hardware, Patching, Risk, Security | Tagged , , , , | Leave a comment

Protect your business from ransomware

It seems like everywhere I go this week people are talking about “the worm”. From my Dentist to baseball practice, everyone wants to know how to be protected. If you’ve been out of the loop, last Friday, May 12, unknown hackers carried out one of the biggest cyberattacks to date, spreading of the worm dubbed WannaCry, a “ransomware” that locked up more than 200,000 computers in more than 150 countries. This attack, spread via email, was allegedly stolen from the National Security Agency and it only affects Microsoft Windows systems. Once WannaCry enters a PC or Server, it locks all the files. The attack is particularly dangerous for businesses, as it takes just one employee for the attack to spread in the entire network, without any user interaction. The hackers then asked users to pay hundreds of dollars in ransom to unlock their data.

Our best advice… first, stay skeptical of any unknown or unexpected email and attachments. Education for you and your team is the best first step.

Next, make sure your servers and computers all have the latest updates. The good news on this particular ransomware is that Microsoft has provided a security update that provides protection against this potential attack. If you use their free anti-virus software and have Windows Update enabled, you should be protected. However, if your patching is inconsistent or if you have outdated operating systems, you likely have computers that are vulnerable. Microsoft has taken the “highly unusual” step to provide public patches for Windows operating systems that are in custom support only. This includes specific fixes for Windows XP, Windows 8, and Windows Server 2003.

Lastly, make sure you have implemented a data back-up and recovery plan to maintain copies of your data in a separate and secure location. Backup copies of sensitive data should not be readily accessible from local networks. Test your backups regularly to ensure they work correctly upon use.

So what do you do if you already clicked on a suspicious email? If an attack is suspected or detected in its early stages, unplug and shut down the infected computer. The attack is likely going to warn you not to “disconnect from the Internet or turn off the computer – don’t listen! Unplugging your computer may save some of your files. If you suspect that the attack has been downloaded, remove the infected computer from the network immediately and seek assistance.

Luckily, WannaCry was stopped by a security researcher who found the malware connected to a specific domain that wasn’t registered. He bought the domain for $10, and that effectively activated a kill switch and ended the spread of WannaCry. Nevertheless, we may not have seen the end of WannaCry, we’ve already heard rumblings of variants of WannaCry beginning to make the rounds. Stay vigilant, make sure your patches are updated and call for help if you need it!

Posted in Backup, Datavaulting, Risk, Security | Tagged , , , , , , | Leave a comment

The Datotel Risk Assessment Methodology

Risk assessments come in many forms, but the underlying purpose is to identify and document known risks to a given process or system and identify the consequences if that risk were to occur. With the risks both identified and quantified, an organizational response can be developed to either mitigate the risk from materializing in the first place or proactively putting solutions in place to minimize the negative impact should it occur.

At Datotel, we help our clients through this process of collating the known risks that are typically only found in the heads of their employees and distilling them into a documented form. Once documented, it’s much easier for the organization to address the risk and put plans in place to address them in a proactive manner. We focus predominantly on the data, systems and infrastructure itself to ensure security, confidentiality, data integrity, privacy and availability.

The goals of this process is to place the organization in a more proactive position to manage their risks and minimize their financial and reputation loss to the organization. Of course, this isn’t just a once and done exercise, but rather a methodology that produces ongoing deliverables to be executed to upon a given schedule.

For more information on our approach to risk assessments and how to conduct one at your organization, please contact us.

Posted in Company Info, Risk, Security | Tagged , , , | Leave a comment

New Look. New Logo!

Here at Datotel and the Globe Building, we’ve recently completed some updates that we’re excited to share with you. First, we are excited to share with you the revamped Datotel logo. As our company has evolved and grown over the last decade, we came to realize that the symbolism that represented us in 2004 is not the same that represents us today. So we re-imagined our visual statement with an identity that is sophisticated, hip and modern. At first glance, you may just see Datotel with a funky “E”, but to us it represents power, growth, energy, cloud, colocation and so much more.


When you next visit the Globe Building, you’ll certainly note some of the more cosmetic modernization. From the improved garage lighting and the new parking space layout through to the updated elevator finishes. Likewise, gone are the tiles on the 3rd floor, replaced with the original concrete floor. Modernized and polished to a very hip, cool and shiny finish. We’re glad to have you check out our new look as you come to visit our offices.

But, for as cool as the lobby, floor and lighting are, what’s more important are the items you may not see on every visit. Such as the upgrades in physical security and access control. The common areas and stairwells now have new cage doors and automated access control has been put in place for an additional layer of security and compliance.

The last improvement is one that we are most excited to share. Our building garage has always been available 24×7, but the new automated badge based entry system will allow a more streamlined access for our clients in off hours. No longer will you need to call our NOC for entry after business hours, the secure door will open with your Datotel Security Badge. And I must add that the aesthetics of the new entry ways are now in keeping with the modern look of the building lobby that was updated earlier in the year.

Of course the easiest way to see the improvements are to come and see them in person. We’d love to give you a tour and show you around the building.

Posted in Company Info, Core Values, Industry, Security | Tagged , | Leave a comment
  • Why Patch Management is so important:

    You’ve seen the news and read the articles. The recent ransomeware attack is being called the largest ransomware attack in internet history. But did you now that the damage could have been avoided if those computers had been properly patched? … Continue reading

  • Admin Terms of Use Contact Us