Our Blog
Datto. Is your organization prepared for cyberattacks? Here’s how to get ready.
Businesses of all types are facing an increasingly challenging prospect when it comes to cybersecurity….
13 minutes read
Sophos named a Leader in 2022 Gartner®️ Magic Quadrant™️ for Endpoint Protection Platforms
We are thrilled to announce that Sophos has, once again, been named a Leader in…
3 minutes read
Boldon James. Embracing Data Privacy Regulations to Earn Consumer Trust
Trust is one of the most important aspects of business, especially when it comes to…
9 minutes read
New Innovations in Sophos Endpoint Security
Check out the latest enhancements in our market-leading Sophos Intercept X Endpoint solution that protects…
10 minutes read
Top 5 reasons to upgrade to Sophos Firewall v19.5
Sophos Firewall v19.5 was released in November and has been our fastest-adopted release, with over…
2 minutes read
Network vs Endpoint DLP and Data Classification
Data loss is a constant threat to businesses, and the risk it comes with is…
9 minutes read
5 Key Takeaways from the Datto SMB Cybersecurity for MSPs Report
The Datto SMB Cybersecurity Survey for MSPs Report has been released, and it is packed…
5 minutes read
Introducing Sophos Network Detection and Response (NDR)
Sophos NDR identifies rogue assets, unprotected devices, insider threats, and novel attacks to accelerate threat…
8 minutes read
Fortra. What is the Relationship Between Ransomware and Phishing?
Ransomware and phishing are usually put in two separate categories when cyberattack methodologies are discussed….
7 minutes read
Fortra. 3 Reasons to Take a Layered Approach to Offensive Cybersecurity
Reports of cyberattacks continue to plague the news, from attacks on airport computer systems, to…
5 minutes read