Category: Protection

Read about various Cybersecurity Protection measures, from antivirus to advanced AI defenses. Understand how these technologies safeguard your IT environment.

October 22, 2021

Atomic Red Team Part 2: Using Atomic Red Team for Adversary Attack Emulation

Cristofer Sochacki

In this blog, we will continue to outline what we discussed in Part 1 of this series and what we demonstrated in our session at DattoCon last week. We will be diving into the technical aspects of the tools used and how they were configured.

Read Now
October 18, 2021

Atomic Red Team Part 1: Testing Security Controls Through Attack Emulation

Cristofer Sochacki

Your team has deployed next-gen anti-virus, applied the latest security patches, and your are forwarding all endpoint telemetry to a managed detection and response vendor. The question you have now is – how can you ensure that the deployed defenses are working properly and you will be notified of malicious activity?

Read Now
January 21, 2021

Strengthen Cyber Resilience With Datto RMM Automated Patch Management

Andrew Burton

Many managed service providers (MSPs) recognize patch management as one of the cornerstone capabilities of their service offerings. Learn how Datto RMM can ease patch management.

Read Now
December 11, 2020

What is Patch Management? Best Practices & Benefits

Ona Blanchette

Datto RMM’s built-in patch management software increases MSP efficiency with automated patching.

Read Now
November 04, 2019

What Is Endpoint Protection?

Tobias Geisler Mesevage

Endpoint protection systems detect malicious activity and protect secure networks, including servers, desktops and mobile devices from attack

Read Now
June 20, 2019

What Is a Configuration Vulnerability?

Tobias Geisler Mesevage

Understand what a security configuration vulnerability is and how to avoid vulnerabilities to prevent cyber threats.

Read Now
June 18, 2019

What Is 2FA?

Tobias Geisler Mesevage

Two-factor authentication is a security procedure where a user is required to provide two different authentication factors to verify their identity.

Read Now
May 07, 2019

What Is Data Risk Management?

Tobias Geisler Mesevage

A holistic data risk management system minimizes the ability of data that can be exposed or breached, and also promotes productivity in the workplace.

Read Now
February 09, 2015

5 Workstation Security Best Practices

John DeWolf

The following five practices can help prevent possible problems and increase the security of your workstation.

Read Now