Blog

November 22, 2021

Datto BCDR: Immutable Backup and Recovery for the Ongoing Threat

John Maxwell

When it comes to data security, backup solutions are of the utmost importance when ensuring data can be recovered, no matter how dire the situation.

Read Now
November 18, 2021

What is Bazar Loader and How to Prepare?

Rotem Shemesh

Bazar Loader is a fileless attack that downloads through the backdoor allowing attackers to install additional malware, often used for ransomware attacks. Since its inception in April 2020, Bazar Loader has attacked a wide variety of organizations in North America and Europe.

Read Now
November 17, 2021

Strong Supply Chain Security Starts with Secure Software

Emilyann Fogarty

In the past year or so, supply chain attacks have become more prevalent than ever, making vendor security a top-of-mind concern for many organizations.

Read Now
November 16, 2021

Datto Windows Agent 3.0: The Next Generation of Windows Backup

Bjorn Leenen

We are proud to announce the release of a new version of the Datto Windows Agent. DWA 3.0.3 is live and available on downloads.datto.com.

Read Now
November 09, 2021

How CapEx and OpEx Changes Affect Cloud BCDR Costs

David Weiss

As managed service providers (MSPs) support clients and their workloads, it’s helpful to review the differences in cloud resources costs and payment models when compared to on-premises infrastructure.

Read Now
November 04, 2021

Infrastructure as a Service (IaaS) and Shared Responsibility for MSPs

David Weiss

The shift to Infrastructure as a Service (IaaS) is building momentum as it allows businesses to avoid CapEx spending on hardware and software.

Read Now
November 02, 2021

The Cloud-Based, Remote-Enabled Future of MSPs

Sitima Fowler

Why Iconic IT’s partnership with Datto is creating more opportunities than ever.

Read Now
October 27, 2021

Simplifying Cloud Management for Azure

David Weiss

Building a cloud practice with Microsoft Azure presents many possibilities for innovation, flexibility, and enhancements for workloads and processes.

Read Now
October 22, 2021

Atomic Red Team Part 2: Using Atomic Red Team for Adversary Attack Emulation

Cristofer Sochacki

In this blog, we will continue to outline what we discussed in Part 1 of this series and what we demonstrated in our session at DattoCon last week. We will be diving into the technical aspects of the tools used and how they were configured.

Read Now