Business Continuity Plan

As many as 25% of businesses who lose access to their data never reopen their doors.  This startling fact means that service providers practically have a moral obligation, if not a revenue incentive, to make sure that their customers have a business continuity plan.  Even in times when total outages are not occurring, employee productivity, customer satisfaction and company reputation can be affected.

Business continuity is the process of making sure the business information services are resilient to accidental, intentional or natural disruptions to their data.  Sometimes, the business continuity issue is simply human error. Perhaps someone deletes a key file from a system which causes it to break.  Other times, device failures or even natural disasters will require the implementation of the protocols in the business continuity plan. What do you need to consider when developing a business continuity plan? Read on to find out!

Weekly Tech Roundup — February 27, 2017

When it comes to cyber threats, the future is here—malware attacking new devices in new ways and jumping on popular technology trends to do it. Phones aren’t safe, computers aren’t safe, and in some instances, it doesn’t even take clicking on the wrong link or attachment to become a victim of an attack. Keeping up with these threats is becoming a full-time job, and it’s imperative that we do whatever it takes to keep our data safe.

With each week looking slightly different from the last, what tech headlines did you miss?

Scuderia Toro Rosso STR12

Scuderia Toro Rosso has revealed its 2017 Formula 1 challenger, the STR12, at the pit lane outside the garage at the Barcelona-Catalunya Circuit. 

Eric O’Neil: Ransomware Attacks Home Users

Frank Jablonski, Acronis Vice President of Global Product Marketing, talks about cyber security with Eric O’Neill, an accomplished public speaker and security expert, who lectures internationally about espionage, cyber security, fraud, and hacking.

What are the top 3 recommendations you would make to consumers to protect their data from security threats?

Security threats are certainly coming after consumers, not just enterprises. We tend to think of it as a problem for business or government, as we see so many hacks and attacks that go after the offices like the Office of Personnel Management, and different government agencies and businesses, like Sony. But the fact of the matter is that most of the malware is affecting the grandparents and parents and just the person with an email account and a computer. And so, if the regular consumers have to protect themselves, they have to do something. There are three good steps:

  1. Technology. You have to have a solution that gives you a preventative defence that you need. Something that is going to search out the malware, something that is going to stop it before it infects you.
  2. Good cyber hygiene.  If you don’t have that, if you’re not smart about how you access things online, if you’re not being careful with your social media, if you’re clicking those links that you get in those emails that don’t really come from your friends — but they are spear phishing attacks, then you’re going to get hit by something like ransomware and lose all your data (unless you pay some hacker sitting somewhere else in the world).
  3. Good backup. Even the best solution can sometimes miss the attack, just because the attackers are that good. So you have to have a good backup that is efficient and quick. It will protect you and let you recover your data in case you get attacked.

Alex Tapscott: Blockchain Will Impact Consumers in Every Industry

Frank Jablonski, Acronis Vice President of Global Product Marketing, talks about blockchain with Alex Tapscott, a co-author of Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World.

Alex Tapscott: Blockchain technology started in the world of financial services, and it’s unsurprising, because in many respects, every part of the industry is due for some form of reinvention. Financial services were really just a start. But what I think blockchain’s lasting legacy will be is the impact that it will have on every single company and the nature of the firm in the future. Because what blockchain does in many respects, is reducing the transaction cost and the need for trust in interactions in business between different entities, whether it’s consumers and companies, or companies and companies, or companies and somebody else. And that’s going to mean a big change to a lot of different industries.

VMware Host Backup. Do You Need It?

How to back up ESXi host configuration

How much time do you think you need to rebuild a VMware ESXi host? If you think it’s fast and easy, think again. When a system crashes bringing down your entire business operations, every second matters. Why spend hours restoring a virtual host server when you can easily recover it with Acronis Backup 12?

Weekly Tech Roundup — February 20

It’s becoming apparent that our dedication to data protection needs to become more resolute. We need to be smarter when it comes to our data, because cybercriminals are certainly getting sneakier. We’ve seen first-hand how innovative ransomware can be, and research shows that it’s only going to get worse—doing more damage and causing more harm. Malware is taking advantage of existing vulnerabilities and if we don’t start upping our security game, our data will be increasingly at risk. What threats are headed your way? Last week’s biggest tech headlines say it all.

Frequently Asked Questions: Protection Against Ransomware

What can you do to protect yourself against ransomware? What are the different ransomware types? What is the best way to protect your data? We have answers on some of the most frequently asked questions.

The robots are coming, the robots are coming!

Seriously, there has been an awful lot of discussion in the media about the role of service automation and computerization of business processes.  The reality is that through APIs, machine learning, monitors, sensors and actuators, we are beginning a process by which many workloads formerly handled by people will be accomplished through computers. 

At Acronis we believe in trying to leverage our resellers’ existing billing, control panel and system automation software. We have integrated Acronis Backup Cloud into a number of popular industry service automation software solutions like Odin Automation, WHMCS, Hostbill, and ConnectWise, plus we have great APIs for tying into other systems. 

Weekly Tech Roundup — February 13

As the weeks roll on, ransomware continues to dominate most cyber security headlines. But it wasn’t just stories of data loss and malware attacks that made the front page. Hackers continued to take advantage of the growing number of data vulnerabilities that permeate our digital world today—but some of them took it upon themselves to fight fire with fire, exposing some particularly harmful websites to the kind of attack they themselves perpetuate.

This week’s tech roundup is full of stories that detail the horrors of cyber-attacks. What did you miss?