Cybersecurity Blog Posts

Filter By:
12/20/2024
8 min read
Monthly Threat Brief: November 2024
It’s here! Explore the new edition of our Monthly Threat Brief blog series to learn more about the MSP cyberthreat landscape in November 2024.
security general icon
Cybersecurity
12/17/2024
10 min read
Phishing prevention tips: 8 ways MSPs and SMBs can prevent attacks
Discover essential phishing prevention tips for MSPs and SMBs. Learn how to stop phishing attacks and protect sensitive data with these expert strategies from ConnectWise.
security general icon
Cybersecurity
12/03/2024
11 min read
How to help your clients with their cybersecurity budget for next year
Guide your clients in crafting an effective cybersecurity budget for 2025. Learn about risk assessment, resource allocation, and cost estimation.
security general icon
Cybersecurity
11/26/2024
8 min read
The importance of comprehensive SIEM data collection
Learn more about the risks associated with partial data collection and why a comprehensive SIEM is critical for your business.
security general icon
Cybersecurity
11/25/2024
8 min read
The dark side: How threat actors are using AI
Dive into the dark side of artificial intelligence (AI)! See how this powerful tool is exploited by bad actors and get tips to better defend your business.
security general icon
Cybersecurity
11/22/2024
10 min read
Monthly Threat Brief: October 2024
It’s time for the next installment of our Monthly Threat Brief blog series! See how the MSP cyberthreat landscape stood in October 2024.
security general icon
Cybersecurity
10/31/2024
9 min read
The top endpoint detection and response solutions
Evaluating EDR solutions? Read this blog to explore key criteria you can use to evaluate your options. We'll discuss three recommendations and how ConnectWise MDR can help you manage it all.
security general icon
Cybersecurity
10/30/2024
5 min read
Understanding XDR vs SIEM
Security information and event management (SIEM) and extended detection and response (XDR) are two of the most prominent solutions for adding visibility to attacks in progress and shortening their timelines. Discover the differences.
security general icon
Cybersecurity

Browse Other Blog Categories