Blog

July 03, 2021

Datto Update: Kaseya Device Monitor Available in ComStore for Datto RMM Partners

Ryan Weeks

The Datto Information Security Team is actively monitoring the Kaseya VSA security incident. As soon as there is more information available on the exploit being used and how to detect it, Datto will assess if scripts can be developed to aid partners.

Read Now
June 11, 2021

What is Immutable Cloud Storage?

David Weiss

There are significant differences in cloud design that can have a major impact on reliable backup and recovery of business-critical data.

Read Now
June 09, 2021

Security for MSPs: VDPs, Bug Bounties, and Responsible Disclosure

Justin Bacco

In the year 2021, information security is everyone’s problem.

Read Now
May 28, 2021

Azure Server Protection: Why and How

Andrew Burton

As a managed service provider (MSP), it is imperative to communicate the need for backup and recovery of cloud server workloads to clients. So, let’s take a quick look at the why and how of Azure server protection.

Read Now
May 27, 2021

What is Ryuk Ransomware and How Does it Work?

Rotem Shemesh

Here’s everything MSPs and their clients need to know about Ryuk ransomware.

Read Now
May 19, 2021

Checklist: Hurricane Disaster Recovery Businesses

Kira Pogge

Hurricane season is fast approaching. Here are some steps to take to ensure you are ready to help your clients weather the storm.

Read Now
May 18, 2021

What is Maze Ransomware and How Does it Work?

Rotem Shemesh

Maze Ransomware has been in the headlines non-stop ever since it was first reported in May 2019. It has been used to attack individual companies, governments, and increasingly – and perhaps most worryingly – MSPs.

Read Now

Incremental vs Differential Backup

George Rouse

Differential and incremental backups are different backup strategies with the same purpose: optimize backup time and space.

Read Now
May 13, 2021

How MSPs Can Utilize Datto RMM to Improve Cyber Resilience

Justin Weller

Remote monitoring and management (RMM) platforms play an important role in helping managed service providers (MSPs) reduce client downtime through real-time monitoring and proactively securing and protecting managed devices from known vulnerabilities.

Read Now