Category: Cybersecurity

Browse our comprehensive Cybersecurity content to learn how to protect your digital assets against evolving threats. Understand the latest security technologies and practices.

CyberSecurityToolkit
January 23, 2024

The Evolution of Antivirus Solutions in Cybersecurity: From Early Guardians to Modern Defenders

Amy Gardner

Computer viruses are one of the oldest cyberthreats and antivirus (AV) solutions are some of the oldest cybersecurity tools

Read Now
CyberSecurityToolkit
January 05, 2024

What Is Secure Access Service Edge (SASE)?

Chris McKie

In today’s rapidly evolving digital landscape, where remote work, cloud computing, cyberattacks and the Internet of Things (IoT) are becoming increasingly prevalent, traditional network security models no longer suffice.

Read Now
CyberSecurityToolkit
December 22, 2023

What Is Security Service Edge (SSE)? Capabilities, Benefits and How It Works

Chris McKie

Cybercriminals are always on the move to achieve their personal, malicious goals, disrupting businesses and individuals in the process.

Read Now
December 05, 2023

What Is Business Email Compromise (BEC)?

Kelly Kroening

In today’s fast-paced digital world, the threat of business email compromise (BEC) looms larger than ever. Imagine a scenario where […]

Read Now
October 25, 2023

Ensure Your Security Bases Are Covered This Cybersecurity Awareness Month

Amy Gardner

Cybersecurity Awareness Month is the perfect time to make sure that you’ve got all your bases covered with these tips!

Read Now
September 14, 2023

Embracing Zero Trust Network Access (ZTNA) With Datto Secure Edge: Paving the Way for the Future of IT Management

Bill Welch

With cyberthreats becoming increasingly sophisticated and remote work becoming the norm, security and networking are more important than ever and Zero Trust Network Access (ZTNA) is emerging at the forefront of this transformation.

Read Now
August 10, 2023

What Is Social Engineering?

Adam Marget

Social engineering is the process of psychologically manipulating individuals to perform certain actions. Learn how this is used maliciously in cybersecurity.

Read Now
July 11, 2023

Ransomware Rollback Now Included With Datto Endpoint Detection and Response

Chris McKie

New ability recovers files typically lost to ransomware attacks.

Read Now
June 07, 2023

5 Key Takeaways from the Datto SMB Cybersecurity for MSPs Report

Amy Gardner

These 5 key takeaways from the Datto SMB Security for MSPs Report give MSPs a glimpse at SMB security decision-making.

Read Now