Category: Protection

Read about various Cybersecurity Protection measures, from antivirus to advanced AI defenses. Understand how these technologies safeguard your IT environment.

Why Taking a Next-Generation Approach to AV Is Essential
January 29, 2024

Why Taking a Next-Generation Approach to AV Is Essential

Amy Gardner

Antivirus (AV) solutions play a crucial role in safeguarding any organization’s networks and data. Traditional, signature-based antivirus solutions have been the norm for decades, but the rise of next-generation antivirus solutions signals a paradigm shift in the approach to combating advanced threats.

Read Now
The Evolution of Antivirus Solutions in Cybersecurity: From Early Guardians to Modern Defenders
January 23, 2024

The Evolution of Antivirus Solutions in Cybersecurity: From Early Guardians to Modern Defenders

Amy Gardner

Computer viruses are one of the oldest cyberthreats and antivirus (AV) solutions are some of the oldest cybersecurity tools

Read Now
Is your organization prepared for cyberattacks? Here’s how to get ready.
December 13, 2022

Is your organization prepared for cyberattacks? Here’s how to get ready.

Amy Gardner

Get tips on preparing a business for a security challenge including insight from Kaseya CISO Jason Manar.

Read Now
How to protect endpoints with a multi-layer security strategy
June 17, 2022

How to protect endpoints with a multi-layer security strategy

Rotem Shemesh

Malware and ransomware infection rates are increasing year-over-year, making it more important than ever for MSPs to take a multi-layer security strategy.

Read Now
Datto RMM’s Integration With Microsoft Defender for Business Is Now Available
May 02, 2022

Datto RMM’s Integration With Microsoft Defender for Business Is Now Available

Luke Walker

Today, we are excited to announce Datto RMM’s integration with Microsoft Defender for Business and Defender Antivirus, an endpoint security solution built to bring enterprise-grade endpoint security to small and medium businesses (SMBs).

Read Now
What Is Email Spoofing and How to Protect Against It?
March 31, 2022

What Is Email Spoofing and How to Protect Against It?

Rotem Shemesh

Email spoofing is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.

Read Now
Cyber Security Compromise Assessments vs Vulnerability Assessments
February 15, 2022

Cyber Security Compromise Assessments vs Vulnerability Assessments

Elizabeth Fichtner

Cyber Security Compromise (Risk) Assessments vs. Vulnerability Assessments: Which Should You Choose First?

Read Now
Best Practices for Preventing, Detecting, and Responding to Cyber Attacks
February 08, 2022

Best Practices for Preventing, Detecting, and Responding to Cyber Attacks

Elizabeth Fichtner

Preventing cyber attacks is a top security concern for most organizations in 2021, and with good reason.

Read Now
Atomic Red Team Part 2: Using Atomic Red Team for Adversary Attack Emulation
October 22, 2021

Atomic Red Team Part 2: Using Atomic Red Team for Adversary Attack Emulation

Cristofer Sochacki

In this blog, we will continue to outline what we discussed in Part 1 of this series and what we demonstrated in our session at DattoCon last week. We will be diving into the technical aspects of the tools used and how they were configured.

Read Now