
What Is Business Email Compromise (BEC)?
Kelly Kroening
In today’s fast-paced digital world, the threat of business email compromise (BEC) looms larger than ever. Imagine a scenario where […]
Read Now
Kelly Kroening
In today’s fast-paced digital world, the threat of business email compromise (BEC) looms larger than ever. Imagine a scenario where […]
Read Now
Adam Marget
Social engineering is the process of psychologically manipulating individuals to perform certain actions. Learn how this is used maliciously in cybersecurity.
Read Now
Rotem Shemesh
Datto has recently engaged Miercom to conduct an independent, third-party performance assessment of Datto SaaS Defense against comparable advanced threat protection solutions.
Read Now
Yuval Ezuz
We have recently come across a phishing email caught by Datto SaaS Defense which utilized multiple evasion techniques, each targeting a different detection mechanism.
Read Now
George Rouse
Discover how to backup Microsoft 365 emails automatically and Datto SaaS Protection can streamline this task.
Read Now
Erin Stephan
As phishing attempts rise, the risks that you or your clients could fall victim to a malicious attack only increase. So how can Datto protect you and your clients?
Read Now
Ariën van Wetten
With phishing attacks among one of the most common types of scams, we want to help you get ahead of those threats with a guide to the different types of scams and how you can protect yourself.
Read Now
Erin Stephan
SaaS stands for “Software as a Service” and is a cloud-based IT service.
Read Now
Rotem Shemesh
Email spoofing is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.
Read Now