Data Protection

Frequently Asked Questions: Protection Against Ransomware

What can you do to protect yourself against ransomware? What are the different ransomware types? What is the best way to protect your data? We have answers on some of the most frequently asked questions.

The robots are coming, the robots are coming!

Seriously, there has been an awful lot of discussion in the media about the role of service automation and computerization of business processes.  The reality is that through APIs, machine learning, monitors, sensors and actuators, we are beginning a process by which many workloads formerly handled by people will be accomplished through computers. 

At Acronis we believe in trying to leverage our resellers’ existing billing, control panel and system automation software. We have integrated Acronis Backup Cloud into a number of popular industry service automation software solutions like Odin Automation, WHMCS, Hostbill, and ConnectWise, plus we have great APIs for tying into other systems. 

Office 365 Backup is Your Responsibility

Did you know that Office 365 does not generate backups that you could actually use to restore lost data or keep emails for archiving purposes? While it may include basic protection, like snapshot and undelete features, it does not create proper backups in other clouds, or on-premises. It’s no surprise that up to 80 percent of companies have already experienced data loss using public cloud services, and you don’t want to be one of them. You need to do a little extra to satisfy the regulatory requirements and meet your business continuity needs.

Acronis Backup 12 Now Protects Microsoft Office 365 and VMware vSphere 6.5

We are excited to announce the addition of Microsoft Office 365 backup functionality and support for VMware vSphere 6.5 to the world’s fastest and most complete small business backup solution, Acronis Backup 12. It’s the update you’ve been waiting for! Find out how it can help you protect your valuable data.

Acronis Backup Cloud 7.0 Is Here!

We are excited to announce the release of Acronis Backup Cloud 7.0. The latest update of this powerful hybrid cloud backup solution for service providers brings innovative new features, integration with ConnectWise Manage, and many other improvements.

What’s the Buzz on Acronis True Image 2017 New Generation

We’re a couple of weeks after the launch of Acronis True Image 2017 New Generation, and people have a lot to say about the latest release. What are industry influencers saying about the new product? What new technologies are putting Acronis True Image 2017 New Generation ahead of the competition? What can these new features do for you?

Weekly Tech Roundup— February 6

Disaster struck last week, and the victims ranged from everyday users to large organizations. Valuable data was lost, operations were shut down, and some people were even affected physically after a ransomware attack took control of the electronic locking systems at an Austrian hotel.

This week’s tech roundup is full of stories that detail the horrors of failed data protection. What did you miss?

How to find out if your computer is protected against ransomware

Ransomware is on the hunt for your precious photos and important documents. Is your computer protected? Are you sure that your protection actually works? There is an easy way to check. Find out how!

A Series of Unfortunate Backup Events

Gitlab.com is a very popular Software as Service (SaaS) platform for software developers. Recently, they suffered a series of unfortunate events due to incomplete backup practices that resulted in customer data loss and service down time. They are back up and running now (minus some essential client data) and there are a few important lessons we can learn from their backup approach and resulting experience.

Osiris Ransomware:  New Addition to the Locky Family

Locky ransomware has undergone another facelift, as cyber criminals roll out updates to one of the most common and damaging families of file-encrypting malware. The new ransomware is named Osiris, after the Egyptian god of the afterlife, and comes with improved features designed to attack backups and avoid being detected. It appends the .orisis extension to the end of the encrypted files and follows the standard pattern of ransomware infection: Invade, Encrypt, Extort. Riding on the back of Locky’s success, Osiris is one of the most serious cyber security treats computer users are facing today.