Blog

April 15, 2022

What Is Cyber Resilience?

Rotem Shemesh

What is cyber resilience and why is it so important?

Read Now
Datto SIRIS Ransomware Detection Screenshot
April 13, 2022

What Is Agent Tesla Spyware and How Does It Work?

Ofir Yaakobi

Agent Tesla is an extremely popular spyware Trojan written for the .NET framework that has been observed since 2014 with many iterations since then.

Read Now
April 05, 2022

What Are Virtual Local Area Networks (VLANs)?

George Rouse

A Virtual Local Area Network is a logically interconnected collection of devices that are partitioned in a group. VLAN group members can be in the same building, different buildings, across campuses, or widely dispersed geographic locations that recognize their peers to be a part of the same Local Area Network.

Read Now

SaaS vs PaaS vs IaaS: What’s the Difference?

Sumiti Narang

IaaS, Paas, and SaaS are three types of cloud-based applications and services. They can help transition your company business from on-site data centers and improve your flexibility and scalability.

Read Now

What Is Infrastructure as a Service (IaaS)?

Sumiti Narang

Infrastructure as a service or IaaS is a type of cloud computing service that offers essential compute, storage, and networking resources.

Read Now

What Is Platform as a Service (PaaS)?

Erin Stephan

Platform as a Service (PaaS) is a type of cloud computing that delivers a platform and environment to allow developers to build applications and services over the Internet.

Read Now
April 04, 2022

What Is SaaS (Software as a Service)?

Erin Stephan

SaaS stands for “Software as a Service” and is a cloud-based IT service.

Read Now
March 31, 2022

Datto’s Response to Spring4Shell

Emilyann Fogarty

On Wednesday, March 30, 2022 news of active exploitation of a previously unknown zero day Remote Code Execution vulnerability (CVE-2022-22965) in a component of java-based software, referred to as Spring4Shell, became widely known. At this time, Datto has not assessed any material exposure to the Spring4Shell vulnerability that would impact the safe use of Datto products. Should this assessment change, we will update Datto partners immediately.

Read Now

What Is Email Spoofing and How to Protect Against It?

Rotem Shemesh

Email spoofing is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they either know or can trust.

Read Now