You are on United States + Canada website. Select another region to view location-specific content
United States
English
Select another region
Choose region and language
Asia-Pacific
- Americas
- Asia-Pacific
- Europe, Middle East and Africa
Formerly Acronis Cyber Protect Home Office
Over 5.5 million users rely on Acronis True Image every day
Ransomware is the malicious software that encrypts your files, blocks access to your device, and demands a ransom for the encryption key.
Below are the most common malicious files detected:
• Viruses: Viruses are malicious programs that attach themselves to legitimate files or programs and spread when those files are executed. They can corrupt or delete data, spread to other files, and damage a computer's functionality.
• Worms: Worms are standalone malicious programs that replicate and spread across networks without requiring user interaction. They can spread rapidly, consuming network resources and causing damage.
• Trojans: Trojans are deceptive programs that appear harmless but contain malicious code. They often trick users into executing them by disguising themselves as legitimate software. Trojans can steal data, provide unauthorized access to a system, or create backdoors for attackers.
• Ransomware: Ransomware encrypts a victim's files or entire system, rendering them inaccessible. Attackers then demand a ransom in exchange for providing the decryption key. Paying the ransom is not recommended, as it encourages further criminal activity.
Use Active Protection of Acronis True Image. For more information, see the procedures for Windows and for Mac.
Active Protection constantly monitors your computer, providing real-time protection against ransomware, cryptomining malware, and other suspicious processes. It uses behavior analysis and exploit prevention to detect new threats and protects your files, backups, and drives. Additionally, the web filtering feature blocks access to potentially harmful websites, ensuring comprehensive protection for your computer.
Yes, we offer 30-days free trial.
Yes, it does. The dedicated cybersecurity software can detect, stop and block malicious activity and quickly restore any affected files. Moreover, you can use Acronis True Image to protect files and documents in real time, get notified about the critical software patching, and create multiple complete system backups to ensure full recovery even if a zero-day attack occurs.
Yes. You can use Acronis True Image product, allowing you to protect up to 5 machines. If you would like to protect more than 5 machines, you can use our solution for businesses - Acronis Cyber Protect.
Yes. Anti-ransomware protection monitors in real time the processes running on your computer. When it detects a third-party process that tries to encrypt your files, the service informs you about it. In this way, the potentially harmful ransomware processes are blocked before they encrypt your device.
Sorry, your browser is not supported.
It seems that our new website is incompatible with your current browser's version. Don’t worry, this is easily fixed! To view our complete website, simply update your browser now or continue anyway.