Category: Protection

Read about various Cybersecurity Protection measures, from antivirus to advanced AI defenses. Understand how these technologies safeguard your IT environment.

December 13, 2022

Is your organization prepared for cyberattacks? Here’s how to get ready.

Amy Gardner

Get tips on preparing a business for a security challenge including insight from Kaseya CISO Jason Manar.

Read Now
June 17, 2022

How to protect endpoints with a multi-layer security strategy

Rotem Shemesh

Malware and ransomware infection rates are increasing year-over-year, making it more important than ever for MSPs to take a multi-layer security strategy.

Read Now
May 02, 2022

Datto RMM’s Integration With Microsoft Defender for Business Is Now Available

Luke Walker

Today, we are excited to announce Datto RMM’s integration with Microsoft Defender for Business and Defender Antivirus, an endpoint security solution built to bring enterprise-grade endpoint security to small and medium businesses (SMBs).

Read Now
March 31, 2022

What Is Email Spoofing and How to Protect Against It?

Rotem Shemesh

Email spoofing is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.

Read Now
February 15, 2022

Cyber Security Compromise Assessments vs Vulnerability Assessments

Elizabeth Fichtner

Cyber Security Compromise (Risk) Assessments vs. Vulnerability Assessments: Which Should You Choose First?

Read Now
February 08, 2022

Best Practices for Preventing, Detecting, and Responding to Cyber Attacks

Elizabeth Fichtner

Preventing cyber attacks is a top security concern for most organizations in 2021, and with good reason.

Read Now
October 22, 2021

Atomic Red Team Part 2: Using Atomic Red Team for Adversary Attack Emulation

Cristofer Sochacki

In this blog, we will continue to outline what we discussed in Part 1 of this series and what we demonstrated in our session at DattoCon last week. We will be diving into the technical aspects of the tools used and how they were configured.

Read Now
October 18, 2021

Atomic Red Team Part 1: Testing Security Controls Through Attack Emulation

Cristofer Sochacki

Your team has deployed next-gen anti-virus, applied the latest security patches, and your are forwarding all endpoint telemetry to a managed detection and response vendor. The question you have now is – how can you ensure that the deployed defenses are working properly and you will be notified of malicious activity?

Read Now
January 21, 2021

Strengthen Cyber Resilience With Datto RMM Automated Patch Management

Andrew Burton

Many managed service providers (MSPs) recognize patch management as one of the cornerstone capabilities of their service offerings. Learn how Datto RMM can ease patch management.

Read Now