Jul 29, 2022
Cybersecurity regulatory compliance entails adhering to several measures to safeguard data confidentiality, integrity, and accessibility.
Feb 09, 2022
Since 2012, Cobalt Strike has been utilized as a proactive way of testing network defenses against advanced threat actor tools, tactics, and procedures (TTPs).
Feb 08, 2022
Preventing cyber attacks is a top security concern for most organizations in 2021, and with good reason.
Feb 07, 2022
With phishing attacks among one of the most common types of scams, we want to help you get ahead of those threats with a guide to the different types of scams and how you can protect yourself.
Feb 03, 2022
Agent-based backup or agentless backup? It’s an important decision for managed service providers (MSPs) to weigh, and determine which is the best fit for your clients.
Feb 02, 2022
A unified professional services automation (PSA) and remote monitoring and management (RMM) experience each hold key functionality in helping an MSP run their business efficiently and successfully.
Feb 01, 2022
Expanding into cybersecurity can dramatically increase your revenue, but if not done carefully, it could also increase your expenses significantly or damage your reputation.
Jan 31, 2022
The complexity and variety of cyber attacks is ever increasing. Here we look at 10 of the most common types of cybersecurity attacks.
Jan 27, 2022
The Datto Threat Research Unit recently analyzed a new phishing technique that our MSP partners should be aware of.
Jan 16, 2022
Discover how to backup Google Drive data as a one off or as an automated process for reliable data protection.
Jan 12, 2022
“How can I protect my clients’ data?” It’s a key question for MSPs — one that’s grown increasingly complicated to answer.
Jan 06, 2022
To provide access to data as fast as possible with maximum precision, we have built an integrated logging mechanism that will optimize context and elevate search capabilities.
Jan 05, 2022
Based on a published article reporting the findings of a ransomware group named ‘Conti’, the Datto Information Security Team recommends all MSPs evaluate their devices/endpoints for Atera agent activity and determine its legitimacy if necessary.