Product: Datto SaaS Defense

December 05, 2023

What Is Business Email Compromise (BEC)?

Kelly Kroening

In today’s fast-paced digital world, the threat of business email compromise (BEC) looms larger than ever. Imagine a scenario where […]

Read Now
August 10, 2023

What Is Social Engineering?

Adam Marget

Social engineering is the process of psychologically manipulating individuals to perform certain actions. Learn how this is used maliciously in cybersecurity.

Read Now
October 06, 2022

Miercom’s Competitive Validation Test Shows: Datto SaaS Defense Beats the Competition

Rotem Shemesh

Datto has recently engaged Miercom to conduct an independent, third-party performance assessment of Datto SaaS Defense against comparable advanced threat protection solutions.

Read Now
September 20, 2022

One Phishing Email, Multiple Evasion Techniques

Yuval Ezuz

We have recently come across a phishing email caught by Datto SaaS Defense which utilized multiple evasion techniques, each targeting a different detection mechanism.

Read Now
August 14, 2022

How to Backup Microsoft Office 365 Emails

George Rouse

Discover how to backup Microsoft 365 emails automatically and Datto SaaS Protection can streamline this task.

Read Now
August 10, 2022

Sales Tips for Success: How to Sell Datto SaaS Defense

Erin Stephan

As phishing attempts rise, the risks that you or your clients could fall victim to a malicious attack only increase. So how can Datto protect you and your clients?

Read Now
August 07, 2022

What Is Phishing and How to Defend Your Business?

Ariën van Wetten

With phishing attacks among one of the most common types of scams, we want to help you get ahead of those threats with a guide to the different types of scams and how you can protect yourself.

Read Now
April 04, 2022

What Is SaaS (Software as a Service)?

Erin Stephan

SaaS stands for “Software as a Service” and is a cloud-based IT service.

Read Now
March 31, 2022

What Is Email Spoofing and How to Protect Against It?

Rotem Shemesh

Email spoofing is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.

Read Now