Category: Response

Discover effective Cybersecurity Response strategies in our articles. Learn how to handle and recover from security incidents efficiently.

Is your organization prepared for cyberattacks? Here’s how to get ready.
December 13, 2022

Is your organization prepared for cyberattacks? Here’s how to get ready.

Amy Gardner

Get tips on preparing a business for a security challenge including insight from Kaseya CISO Jason Manar.

Read Now
What is Datto EDR? Why MSPs Need Endpoint Detection and Response
November 16, 2022

What is Datto EDR? Why MSPs Need Endpoint Detection and Response

David Weiss

While installing antivirus (AV) on each endpoint used to be sufficient, advanced endpoint threat detection and response (EDR) is now a must to better protect against costly attacks.

Read Now
What is Managed SOC (Security Operation Center)? Why MSPs need MDR
October 17, 2022

What is Managed SOC (Security Operation Center)? Why MSPs need MDR

David Weiss

Managed SOC provides the highest level of threat protection to MSPs and their clients. It combines technology solutions with expert human teams for advanced threat hunting, monitoring and incident response.

Read Now
The Common Types of Data Breaches
July 29, 2022

The Common Types of Data Breaches

George Rouse

With so much confidential and personal information being shared online, it’s not surprising that data breaches have become more common.

Read Now
What Is a Security Data Breach?
July 28, 2022

What Is a Security Data Breach?

George Rouse

Managed service providers (MSPs) can help protect clients from the impact of a data breach by securing their systems and educating clients about how to recognize an attack.

Read Now
What Is Endpoint Detection and Response (EDR)?
May 28, 2022

What Is Endpoint Detection and Response (EDR)?

George Rouse

Endpoint detection and response is a layered, integrated endpoint security solution that monitors end-user devices continuously in addition to collecting endpoint data with a rule-based automated response.

Read Now
10 Considerations Before Buying an Endpoint Detection and Response (EDR) Security Solution – Part 2
February 28, 2022

10 Considerations Before Buying an Endpoint Detection and Response (EDR) Security Solution – Part 2

Elizabeth Fichtner

Part two of a two-part blog series exploring important considerations when purchasing an endpoint detection and response (EDR) security solution or EDR tool for your organization.

Read Now
10 Considerations Before Buying an Endpoint Detection and Response (EDR) Security Solution – Part 1
February 25, 2022

10 Considerations Before Buying an Endpoint Detection and Response (EDR) Security Solution – Part 1

Elizabeth Fichtner

Part one of a two-part blog series exploring important considerations when purchasing an endpoint detection and response (EDR) security solution or EDR tool for your organization.

Read Now
IR Planning: The Critical 6 Steps of Cyber Security Incident Response
February 14, 2022

IR Planning: The Critical 6 Steps of Cyber Security Incident Response

Elizabeth Fichtner

An updated and well-practiced incident response plan is crucial in combatting cyber attackers.

Read Now