White Papers: Security

Cyber security is an ever-moving target, particularly as the enterprise’s perimeter becomes more flexible in the mobile era and the threats evolve. Here we offer papers to help the IT security professional.

Beyond Cloud Visibility – Because Discovery is No Longer Enough

The rules have changed, and they keep changing. We’ve moved from Software-as-a-Service to Just-abouteverything-as-a-Service, and security professionals are struggling to keep pace. A significant milestone that passed almost unnoticed during 2017, for example, was that for the first time, hacking wasn’t the top cause of exposed data records. That prize now goes to accidental online leaking […]

GDPR Made MSPeasy: The MSP Opportunity

As a managed service provider (MSP), you are positioning yourself as an IT expert, the go-to person for all things tech and data. As of 2018, this expertise now includes the Global Data Protection Regulations, or GDPR for short. Daunting as this might seem, for many MSPs, these new data regulations have served to bring […]

Datto’s 2018 State of the MSP Report

2018 MSP Challenges and Trends, Stat-by-Stat Datto surveyed roughly 2,300 managed service providers (MSPs) worldwide about their day-to-day lives. The result: a wealth of statistics about the state of today’s MSPs, including everything from basic demographics and media consumption preferences to business goals and challenges. With Datto’s Global State of the MSP Report, we aim […]

Navigating the new GDPR privacy landscape

What should organizations do before and after the May 2018 deadline to comply with the GDPR The GDPR in a Nutshell The EU General Data Protection Regulation – in short, the GDPR – will be applied from May 2018. The directive marks the biggest change in EU data privacy laws in more than 20 years, […]

IT Staffing Made MSPeasy

Find Quality Employees to Grow Your Business Hiring qualified employees is crucial for all businesses, which is why those that can afford to do so, invest heavily in recruiting. However, smaller businesses, like MSPs, don’t typically have the resources to dedicate to such efforts as do larger companies. As a result, many MSPs struggle with […]

Break-Fix to MSP

Tips from MSPs who successfully made the leap Moving your business model from break-fix to managed services can feel daunting. It can be a tough sell to your current clients, who are used to paying for services on an hourly basis, rather than by subscription. It also requires a cultural shift within your organisation, which […]


Mitigating the Top Security Risks Facing Organisations in the Cloud The last few years have presented hackers with an even bigger opportunity. The cloud. The move from server-based to service-based thinking is changing the way traditional IT departments design and deliver the technology that supports their businesses. Internet-accessed systems, software and applications have become massively […]

Datto’s State of the Channel – Ransomware Report EUROPE

ABOUT THIS REPORT With survey findings gathered from 150 Managed Service Providers (MSPs) serving nearly 1.1M small-to-mid-sized businesses (SMBs) across Europe, Datto’s State of the Channel Ransomware Report provides unique visibility into the state of ransomware from the perspective of the European IT Channel and their clients who are dealing with these infections on a […]

Protecting against the insider threat: Preventing the accidental send

This white paper is about the sinking feeling you get when you realise you’ve sent an email to the wrong person, attached the wrong file, or uploaded the wrong document to a file sharing site. Whether they admit it or not, the majority of people will have experienced this head in hands moment at some […]

Where ZoneFox Can Support Your Security Ecosystem

Robust information security is not delivered by a single product or vendor-provided technology. It is established through a combination of technical solutions, a clearly defined process, and employee awareness and training – all working together to provide defence against the full spectrum of threats, from advanced malware to social engineering attacks. In information security, one size does not […]