The Week in Breach News: 08/02/23 – 08/08/23

The Week in Breach News: 08/02/23 – 08/08/23

In this #WeekInBreach: The biggest medical cyberattack of the year, MOVEit keeps snagging companies, two new infographics explaining the benefits of managed SOC and why opting for managed detection and response (MDR) is a smart choice.


No alt text provided for this image

Added Intelligence

  • Powered Services Pro offers MSPs incredible resources to help them grow their businesses, like these two new campaigns.
  • Graphus: Simple, Automated & Affordable Email Security?– This campaign aims to help you sell services using Kaseya’s Graphus product.?GET IT>>
  • Employee Cybersecurity Training: Building a Cyber-Ready Workforce?– Show how security awareness training minimizes the risk of employee-targeted cyberattacks by keeping employees up to date with the latest cyber risks and the best practices to defend against them.?GET IT>>
  • Did you miss…?the?EDR + Managed SOC is a Game Changer?product brief??GET IT>>


What is Managed Detection & Response (MDR)

Managed detection and response (MDR), also known as managed SOC, gives MSPs and businesses access to a remote security operations center featuring expert consultants without adding security personnel to their team. The primary function of a managed SOC is to rapidly analyze, detect and respond to cyber threats that bypass traditional cybersecurity tools. Comprehensive MDR will cover:?

Endpoint Security?– Protect your endpoints with Windows and MacOS event log monitoring, advanced breach detection, malicious files and processes, threat hunting, intrusion detection, 3rd party next-gen AV integrations and more.?

Network Security?– Gain new levels of network protection with firewall and edge device log monitoring integrated with real time threat reputation, DNS information and malicious connection alerts.?

Cloud Security?– Secure the cloud with Microsoft 365 security event log monitoring, Azure AD monitoring, Microsoft 365 malicious logins and overall Secure Score.?

  • Get the scoop on 5 of the worst email-based attacks plus tips to protect businesses from them.?GET INFOGRAPHIC>>


Kaseya’s Security Suite Gives IT Professionals the Tools That They Need to Strengthen Cyber Resilience?

Get powerful protection and must-have tools for keeping businesses out of cybersecurity trouble with Kaseya’s Security Suite.

  • Dark Web ID?— Our award-winning dark web monitoring solution is the channel leader for a good reason: it provides the greatest amount of protection around with 24/7/365 human and machine-powered monitoring of business and personal credentials, including domains, IP addresses and email addresses.?
  • BullPhish ID?— This effective, automated security awareness training and phishing simulation?solution provides critical training that improves compliance, prevents cyberattacks and reduces an organization’s chance of experiencing a cybersecurity disaster by up to 70%.?
  • Graphus?— Automated email security is a cutting-edge solution that puts three layers of AI-powered protection between employees and phishing messages. It works equally well as a standalone email security solution or supercharges your Microsoft 365 and Google Workspace email security.?
  • Kaseya Managed SOC powered by RocketCyber?— Our managed cybersecurity detection and response solution is backed by a world-class security operations center that detects malicious and suspicious activity across three critical attack vectors: endpoint, network and cloud.?
  • Datto EDR?— Detect and respond to advanced threats with built-in continuous endpoint monitoring and behavioral analysis to deliver comprehensive endpoint defense (something that many cyber insurance companies require).?


How Managed SOC Services Fit into Security Best Practices

Managed SOC is a key component of ensuring that a company is following cybersecurity best practices, including:?

  1. Taking defense-in-depth approach?– An organization practicing this tactic will have a variety of security tools and controls layered throughout their network, creating a more resilient barrier between cybercriminals and a company’s systems and data.?


  1. Using a cybersecurity framework?– Using one of the standard cybersecurity frameworks (CSF) is an easy and effective way to ensure that a company is covering all of its bases, especially if that company faces compliance requirements around information security. Some frequently used security frameworks include NIST, HIPAA and GDPR.?


Events & Webinars

August 15:?Kaseya + Datto Connect Local Detroit?REGISTER NOW>>

August 15:?Kaseya + Datto Connect Local Malaysia MSP?REGISTER NOW>>

August 17:?Kaseya + Datto Symposium Long Branch?REGISTER NOW>>

August 17:?Kaseya + Datto Connect Singapore?REGISTER NOW>>

August 22:?Kaseya + Datto Connect Local Kansas City?REGISTER NOW>>

August 29:?Kaseya + Datto Connect Local San Diego?REGISTER NOW>>

August 29:?Kaseya + Datto Connect Local Denmark?REGISTER NOW>>

August 31:?Kaseya + Datto Connect Local Sweden?REGISTER NOW>>

September 7: Kaseya + Datto Connect Local Netherlands?REGISTER NOW>>

September 14:?Kaseya + Datto Connect Local San Antonio?REGISTER NOW>>

September 21:?Kaseya + Datto Connect Local Nashville “Building the Business” Series?REGISTER NOW>>

September 26:?Kaseya + Datto Connect Local Sugarland Sales & Marketing Series?REGISTER NOW>>

September 28:?Kaseya + Datto Connect Local Charlotte?REGISTER NOW>>

October 2 – 4:?Kaseya DattoCon in Miami?REGISTER NOW>>


Don't forget to follow us on social media for news, events, product updates, and more!


要查看或添加评论,请登录

ID Agent的更多文章

社区洞察

其他会员也浏览了