Product: Datto Managed SOC

CyberSecurityToolkit
April 03, 2024

What Is Security Awareness Training?

Chris McKie

As cyberthreats continue to evolve and increase in sophistication, the significance of security awareness training cannot be overstated. It has […]

Read Now
CyberSecurityToolkit
February 20, 2024

What Is SOC 2 Compliance?

George Rouse

As businesses increasingly move to cloud-based solutions, ensuring the privacy and security of customer data has become paramount.

Read Now
December 13, 2022

Is your organization prepared for cyberattacks? Here’s how to get ready.

Amy Gardner

Get tips on preparing a business for a security challenge including insight from Kaseya CISO Jason Manar.

Read Now
October 17, 2022

What is Managed SOC (Security Operation Center)? Why MSPs need MDR

David Weiss

Managed SOC provides the highest level of threat protection to MSPs and their clients. It combines technology solutions with expert human teams for advanced threat hunting, monitoring and incident response.

Read Now
October 04, 2022

CISA: Cyber Threats Are a Core Risk to Business

David Weiss

U.S. Cybersecurity and Infrastructure Security Agency (CISA) executive director Brandon Wales emphasized that companies must be more proactive when it comes to defending against cyber threats.

Read Now
August 17, 2022

What Is Malware?

George Rouse

There are many different types of malware. Each type of malware has its own specific purpose and method of operation.

Read Now
August 12, 2022

What Is a Supply Chain Attack and How Can I Protect Against It?

Rotem Shemesh

With a 650% surge in supply chain attacks in a single year, this type of attack is a growing concern for MSPs and IT providers.

Read Now
August 01, 2022

What Is Port Scanning?

Tobias Geisler Mesevage

Port scanning is one of the most popular forms of reconnaissance ahead of a hack, helping attackers determine which ports are most susceptible.

Read Now
July 29, 2022

The Common Types of Data Breaches

George Rouse

With so much confidential and personal information being shared online, it’s not surprising that data breaches have become more common.

Read Now