What Is Business Email Compromise (BEC)?
Kelly Kroening
In today’s fast-paced digital world, the threat of business email compromise (BEC) looms larger than ever. Imagine a scenario where […]
Read NowKelly Kroening
In today’s fast-paced digital world, the threat of business email compromise (BEC) looms larger than ever. Imagine a scenario where […]
Read NowAdam Marget
Social engineering is the process of psychologically manipulating individuals to perform certain actions. Learn how this is used maliciously in cybersecurity.
Read NowRotem Shemesh
Datto has recently engaged Miercom to conduct an independent, third-party performance assessment of Datto SaaS Defense against comparable advanced threat protection solutions.
Read NowYuval Ezuz
We have recently come across a phishing email caught by Datto SaaS Defense which utilized multiple evasion techniques, each targeting a different detection mechanism.
Read NowGeorge Rouse
Discover how to backup Microsoft 365 emails automatically and Datto SaaS Protection can streamline this task.
Read NowErin Stephan
As phishing attempts rise, the risks that you or your clients could fall victim to a malicious attack only increase. So how can Datto protect you and your clients?
Read NowAriën van Wetten
With phishing attacks among one of the most common types of scams, we want to help you get ahead of those threats with a guide to the different types of scams and how you can protect yourself.
Read NowErin Stephan
SaaS stands for “Software as a Service” and is a cloud-based IT service.
Read NowRotem Shemesh
Email spoofing is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.
Read Now