Discover how Acronis outlines competitors with integrated cyber protection, ensuring unmatched security, backup, and recovery solutions.
When was the last time you received an email with an attachment from a stranger? Did you open it? A new phishing campaign rocketed around the world this week, and it wasn’t the only attack on personal data. Evolutions in old ransomware variants and innovative new ones were also looking for weaknesses in your data protection plans. Find out what’s next for your data in this week’s tech roundup.
Acronis Backup 12.5 Advanced allows users to automate detailed and visual reporting in order to comply with corporate regulations.
You can’t predict ransomware attacks, and your attempts to avoid them may fail. You can follow computer backup best practices, but even then there is no guarantee that devious cyber criminals won’t uncover your weaknesses. That’s why Acronis True Image 2017 New Generation integrates ransomware protection technology in the form of Acronis Active Protection. Independent IT security research company MRG Effitas tested eight consumer backup products against ten ransomware families with some surprising results!
Have you ever seen a Word document embedded inside a PDF? There may be one already sitting in your inbox. Ransomware criminals keep coming up with new ways to bypass malware detection, for example, by embedding multiple files inside each other, and it’s proving to be very effective. Find out how this works, plus other news, in this edition of our Weekly Tech Roundup.