Category: Cybersecurity

Browse our comprehensive Cybersecurity content to learn how to protect your digital assets against evolving threats. Understand the latest security technologies and practices.

October 06, 2022

Miercom’s Competitive Validation Test Shows: Datto SaaS Defense Beats the Competition

Rotem Shemesh

Datto has recently engaged Miercom to conduct an independent, third-party performance assessment of Datto SaaS Defense against comparable advanced threat protection solutions.

Read Now
October 04, 2022

CISA: Cyber Threats Are a Core Risk to Business

David Weiss

U.S. Cybersecurity and Infrastructure Security Agency (CISA) executive director Brandon Wales emphasized that companies must be more proactive when it comes to defending against cyber threats.

Read Now
September 20, 2022

One Phishing Email, Multiple Evasion Techniques

Yuval Ezuz

We have recently come across a phishing email caught by Datto SaaS Defense which utilized multiple evasion techniques, each targeting a different detection mechanism.

Read Now
August 17, 2022

What Is Malware?

George Rouse

There are many different types of malware. Each type of malware has its own specific purpose and method of operation.

Read Now
August 12, 2022

What Is a Supply Chain Attack and How Can I Protect Against It?

Rotem Shemesh

With a 650% surge in supply chain attacks in a single year, this type of attack is a growing concern for MSPs and IT providers.

Read Now
August 07, 2022

What Is Phishing and How to Defend Your Business?

Ariën van Wetten

With phishing attacks among one of the most common types of scams, we want to help you get ahead of those threats with a guide to the different types of scams and how you can protect yourself.

Read Now
August 01, 2022

What Is Port Scanning?

Tobias Geisler Mesevage

Port scanning is one of the most popular forms of reconnaissance ahead of a hack, helping attackers determine which ports are most susceptible.

Read Now
July 29, 2022

Top Tips for Cybersecurity Regulatory Compliance

George Rouse

Cybersecurity regulatory compliance entails adhering to several measures to safeguard data confidentiality, integrity, and accessibility.

Read Now

QBot Malware: What Is It and How Does It Work

Ofir Yaakobi

QBot, also known as Qakbot, QBot, QuackBot, and Pinkslipbot, is a Banking Trojan that was first observed in 2007.

Read Now