Discover how Acronis outlines competitors with integrated cyber protection, ensuring unmatched security, backup, and recovery solutions.
To stay competitive and grow today, service providers need to ensure all customers stay #CyberFit. But with everything from insider threats to ransomware and cryptojacking on the rise, not to mention the impact recent data breaches have had – from financial and compliance-related penalties to reputational damage – service providers need the right support to ensure that task is easy and enables growth opportunities. That’s why each new version of Acronis Cyber Cloud improves two things: partner cyber protection capabilities – enhancing some or all of the Five Vectors of Cyber Protection; and partner delivery of cyber protection services to end customers – making managing cyber protection day-to-day easier, more efficient and even more secure. Acronis Cyber Cloud 8.0 is no exception. Here’s a preview of some key enhancements coming via the solution’s core service offerings.
Ransomware is constantly targeting medical companies across the United States. Within the past year, these attacks have led to downtime, lost productivity, and - in some cases - needing to close their doors for good. Learn how Acronis Cyber Protection solutions and the innovative AI-based Acronis Active Protection defense can help to ensure that these same consequences don't hit your organization.
The inaugural Acronis Global Cyber Summit is in the history books. After two and a half days of cyber protection insights, advances, and discussions the cybersecurity experts, CIOs, IT pros, MSPs, value-added resellers, ISVs, and developers that joined us in Miami are on their way back to the corner of the world they call home.
A new ransomware family was discovered in August 2019. Called HILDACRYPT, it is named after the Netflix cartoon “Hilda” because the TV show’s YouTube trailer was included in the ransom note of the original version of the malware. HILDACRYPT camouflages itself as a legitimate XAMPP installer, which is an easy to install Apache distribution containing MariaDB, PHP, and Perl. However, the cryptolocker’s file name ‘xamp’ differs from the legitimate version. Moreover, the ransomware file does not have a digital signature. We took a deep dive into this new cyberthreat to show how it works and how you can help overcome its attack with Acronis Cyber Backup.