Mar 02, 2023
Ariën van Wetten
NIS2 is an update to the original NIS EU cybersecurity directive regarding mandated cybersecurity practices, essential suppliers, and breach reporting.
Feb 15, 2022
Cyber Security Compromise (Risk) Assessments vs. Vulnerability Assessments: Which Should You Choose First?
Feb 14, 2022
Knowing the risks posed by open-source software — going into the development process — will help you avoid pitfalls associated with sharing crowd-sourced code.
An updated and well-practiced incident response plan is crucial in combatting cyber attackers.
Feb 11, 2022
Is your organisation prepared to respond to a security breach or cyber attack? According to many security experts, it’s a matter of “when” and not “if” your company will experience a serious cybersecurity incident.
Feb 10, 2022
Cybersecurity is a lucrative business. The growing risk of being hit by a cyber attack makes it a no brainer for organisations of all sizes to adopt cybersecurity solutions.
Feb 09, 2022
Since 2012, Cobalt Strike has been utilised as a proactive way of testing network defenses against advanced threat actor tools, tactics, and procedures (TTPs).
Feb 08, 2022
Preventing cyber attacks is a top security concern for most organisations in 2021, and with good reason.
Feb 03, 2022
Agent-based backup or agentless backup? It’s an important decision for managed service providers (MSPs) to weigh, and determine which is the best fit for your clients.
Feb 02, 2022
A unified professional services automation (PSA) and remote monitoring and management (RMM) experience each hold key functionality in helping an MSP run their business efficiently and successfully.
Feb 01, 2022
Expanding into cybersecurity can dramatically increase your revenue, but if not done carefully, it could also increase your expenses significantly or damage your reputation.
Jan 31, 2022
The complexity and variety of cyber attacks is ever increasing. Here we look at 10 of the most common types of cybersecurity attacks.
Jan 27, 2022
The Datto Threat Research Unit recently analysed a new phishing technique that our MSP partners should be aware of.