Category: Protection

Read about various Cybersecurity Protection measures, from antivirus to advanced AI defenses. Understand how these technologies safeguard your IT environment.

February 29, 2024

What is Advanced Endpoint Protection (AEP)?

Chris McKie

Keeping your business safe from cyberthreats is crucial, especially when it comes to the devices that connect to your network. Advanced endpoint protection (AEP) is like having a security guard for each of these devices

Read Now
CyberSecurityToolkit
January 29, 2024

Why Taking a Next-Generation Approach to AV Is Essential

Amy Gardner

Antivirus (AV) solutions play a crucial role in safeguarding any organization’s networks and data. Traditional, signature-based antivirus solutions have been the norm for decades, but the rise of next-generation antivirus solutions signals a paradigm shift in the approach to combating advanced threats.

Read Now
CyberSecurityToolkit
January 23, 2024

The Evolution of Antivirus Solutions in Cybersecurity: From Early Guardians to Modern Defenders

Amy Gardner

Computer viruses are one of the oldest cyberthreats and antivirus (AV) solutions are some of the oldest cybersecurity tools

Read Now
December 13, 2022

Is your organization prepared for cyberattacks? Here’s how to get ready.

Amy Gardner

Get tips on preparing a business for a security challenge including insight from Kaseya CISO Jason Manar.

Read Now
June 17, 2022

How to protect endpoints with a multi-layer security strategy

Rotem Shemesh

Malware and ransomware infection rates are increasing year-over-year, making it more important than ever for MSPs to take a multi-layer security strategy.

Read Now
May 02, 2022

Datto RMM’s Integration With Microsoft Defender for Business Is Now Available

Luke Walker

Today, we are excited to announce Datto RMM’s integration with Microsoft Defender for Business and Defender Antivirus, an endpoint security solution built to bring enterprise-grade endpoint security to small and medium businesses (SMBs).

Read Now
March 31, 2022

What Is Email Spoofing and How to Protect Against It?

Rotem Shemesh

Email spoofing is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.

Read Now
February 15, 2022

Cyber Security Compromise Assessments vs Vulnerability Assessments

Elizabeth Fichtner

Cyber Security Compromise (Risk) Assessments vs. Vulnerability Assessments: Which Should You Choose First?

Read Now
February 08, 2022

Best Practices for Preventing, Detecting, and Responding to Cyber Attacks

Elizabeth Fichtner

Preventing cyber attacks is a top security concern for most organizations in 2021, and with good reason.

Read Now