Acronis backup

VMware Host Backup. Do You Need It?

How to back up ESXi host configuration

How much time do you think you need to rebuild a VMware ESXi host? If you think it’s fast and easy, think again. When a system crashes bringing down your entire business operations, every second matters. Why spend hours restoring a virtual host server when you can easily recover it with Acronis Backup 12?

Office 365 Backup is Your Responsibility

Did you know that Office 365 does not generate backups that you could actually use to restore lost data or keep emails for archiving purposes? While it may include basic protection, like snapshot and undelete features, it does not create proper backups in other clouds, or on-premises. It’s no surprise that up to 80 percent of companies have already experienced data loss using public cloud services, and you don’t want to be one of them. You need to do a little extra to satisfy the regulatory requirements and meet your business continuity needs.

Acronis Backup 12 Now Protects Microsoft Office 365 and VMware vSphere 6.5

We are excited to announce the addition of Microsoft Office 365 backup functionality and support for VMware vSphere 6.5 to the world’s fastest and most complete small business backup solution, Acronis Backup 12. It’s the update you’ve been waiting for! Find out how it can help you protect your valuable data.

5 Reasons to Back Up Your Employees’ PCs

IT Infrastructure in your small business is becoming complex. Before you only had servers and generic desktops to deal with, but the world has changed. Now you have virtualization, cloud VMs in IaaS clouds, data in SaaS clouds, and even mobile devices to worry about.

However, one very important area of your company operations tends to be ignored when it comes to data protection and business continuity — Windows PCs and laptops. Here are five reasons why you should include personal computers of your employees into your data protection strategy.

INDEPENDENT TEST: Acronis True Image 2017 New Generation Outperforms Competitors in Self-Protection Against Ransomware

Acronis True Image 2017 New Generation received the Gold Self-Protection Award from Anti-Malware Testing Lab, being recognized for its capacity to protect itself and its backups from ransomware (Acronis Active Protection™).

The threat of ransomware (a type of malware that hijacks computer systems and demands ransom) is so great that it became paramount for backup vendors to introduce technology to protect backups from such attacks.

Acronis True Image 2017 New Generation: Your Ultimate Backup Destination and Protection Against Ransomware

The wait is over! We are excited to announce the immediate availability of Acronis True Image 2017 New Generation, a powerful personal backup software packed with new ground-breaking features designed to pull the world out of the multi-billion-dollar ransomware nightmare. It also has the capacity to certify and verify the data through blockchain technology.

Acronis Consumer Survey Exposed the Need for Effective Defense Against Ransomware

A survey conducted by Acronis in December 2016 exposed the lack of awareness and understanding of the imminent danger presented by ransomware  — an increasingly-pervasive form of malware that encrypts the victim’s files, denying access to them until the user pays an online ransom of hundreds or thousands of dollars. Respondents placed high value on personal data, but were not prepared to pay any ransom in case of an attack.

The survey revealed that while 71 percent of the respondents worry about the safety of their personal data and 41 percent say they cannot afford to lose any of it, 56 percent have no plan for recovering that data if it is lost or held hostage by cyber criminals.

DeriaLock Demands Victims to Pay Ransom by Skype

Recently, BleepingComputers discovered DeriaLock ransomware, and Acronis analysts took a close look at the latest version. DeriaLock ransomware consists of three functional parts: screenlocker, cryptolocker, and a file eraser. This article reviews the cryptolocker and file eraser parts of the ransomware and provides information on how to unlock the affected system.

Leveraging Hyper-V 2016 Resilient Change Tracking for Backup

Resilient Change Tracking (RCT) technology simplifies and speeds up the backup and recovery of Windows Server 2016 Hyper-V VMs. Best of all, it is transparent and does not require any additional configuration or management.

Weekly Tech Roundup: January 16

Weekly Tech Roundup: January 16

Security was a major theme throughout this week’s news cycle. Malicious ransomware attacks increased and their tactics continued to evolve; predictions cast a gloomy outlook on the state of cybersecurity, projecting that data will become increasingly vulnerable as the year continued; and new cybersecurity innovations were set in motion in the hopes of protecting data across many different sectors.

The week was full of tech headlines, but we handpicked some stories we thought might be interesting to you. What did you miss?