Cities and government agencies are under attack from RobbinHood

Ransomware continues its reign as one of the most pervasive malware threats to assail businesses, government institutions and consumers in 2019, with new variants appearing almost daily. One particularly nasty new strain of ransomware, dubbed RobbinHood, recently locked up critical IT systems and brought down corresponding public services in two North American cities: Greenville, NC and Baltimore, MD.

Government intelligence organizations confirm a recent trend of ransomware gangsters actively targeting regional and local governments as easy pickings. That’s because cities, counties and states are more likely to pay large extortion fees quickly to unlock their data and get constituent services back online with as little downtime as possible.

WhatsApp gets hacked by spyware

Time to update. WhatsApp, one of the world’s most popular messaging apps, is racing to close a security flaw that could give hackers access to sensitive personal data and real-time communications.

This particular type of attack is dangerous because the spyware is activated regardless of whether or not WhatsApp users answer the call. Once infected, attackers can access, modify, and sell all the personal data stored on your phone or take over control of the microphone and camera. 

Here's the latest and a few tips that will help minimize the threat in the future.

Ransomware Continues to Top Cybercrime

You don’t have to be a tech pro to be aware of how pervasive and destructive criminal cyberattacks on consumers, businesses and public institutions have become these days – with ransomware being first among them. In fact, the latest annual edition of Verizon’s Data Breach Investigations Report (DBIR) reports that ransomware incursions accounted for 75% of the malware-driven security incidents of the past 12 months.

The aggressive and lucrative use of ransomware as a favored cybercrime weapon has long been the focus of Eric O’Neill, the renowned former FBI counter-intelligence and author of the recently-published "Gray Day: My Undercover Mission to Expose America’s First Cyberspy", which recounts his role in unmasking and imprisoning notorious FBI mole Robert Hannsen (which was also told in 2007's "Breach").

A sought-after consultant on cybersecurity issues, O’Neill has been announced a featured speaker at the first annual Acronis Global Cyber Summit in October ... and he’s ready to dive deep.

Acronis banners flying in the historic Fenway Park

The legendary Boston Red Sox, one of the most iconic professional sports teams in the world, has just selected the world leader in cyber protection to protect its data, applications, and systems as part of a multi-year agreement. Learn more about our new technology partnership and find out how Acronis helps the Boston Red Sox ensure peak performance on the field and off.


Acronis Now Offers Backup for G Suite and Cryptomining Protection for Businesses

With two newly released updates, Acronis takes its cyber protection capabilities for businesses to an exciting new level, allowing IT pros and business managers to focus on other priorities and rest even easier knowing their data is safe. The latest updates add integrated G Suite protection to Acronis’ existing backup and recovery services for more than 20+ platforms, plus built-in protection against cryptojacking, one of the fastest-growing malware threats.

Let’s take a closer look at how Acronis strengthened its cyber protection capabilities for businesses that take advantage of Acronis’ cloud offerings, Acronis Backup Service and Acronis Backup Cloud.

A2 Hosting was shut down by a ransomware attack

A2 Hosting, a Windows server host, was attacked on April 22 and has yet to get services back up or even provide an ETA of when a recovery will be possible. In the meantime, all of their business customers are losing money and customers. Learn how this happened and how you can ensure it doesn’t happen to you.

In case you missed it, Microsoft issued a warning last Friday to alert users that they might experience issues with the upcoming May 2019 Update for Windows 10 (version 1903) – and the issues are difficult to avoid. The good news is that Microsoft’s proactive communications means you can take precautions to protect your data before you initiate the update.

Use these seven tips to manage any changes ahead, whether it’s a standard Win 10 update, if your one of the 35% of companies upgrading from Win 7, or you’re coping with any future system update.

Just Opened: Early Access to the Acronis Cyber Platform

Acronis Cyber Platform

Today we announced that we’re opening the Acronis Cyber Platform to give developers, ISVs, OEMs, service providers, and others access to our core platform. This early access is designed to encourage expanded functionality and application integrations by developers while giving them access to Acronis’ large ecosystem.

The Acronis Cyber Platform, which is the foundation of the company’s existing services, features a series of APIs supported by software development kits (SDK) and sample code. With today’s early access, developers can have the kind of access was previously available only to Acronis and select integration partners such as ConnectWise, Microsoft and Google.

Acronis Cyber Platform: Handing the Keys to Developers

Acronis Cyber Protection Platform

In today’s digital world, data is the most valuable asset that your organization has. The data economy and its key driver, the democratization of data, is changing the competitive landscape everywhere. New industries are being built while traditional industries and business models are being destroyed. In addition, the amount of data and the the number of data sources is exploding because there are more apps, more “things”, more analysis of data, and more places to store data.

As a result, most organizations are falling way behind in their ability to manage and protect data.

When transforming to be a “data-driven” digital transformation success story in your market space, it’s critical to remember –  your team, your partners, your investors and your customers depend on your organization to effectively protect data from loss, theft and manipulation. 

Subscriptions vs Perpetual Licenses

Everyone knows that change can be difficult. From minor things like always eating the same food to serious examples like staying at a bad job, our comfort zone makes it difficult to try new things – even when we know the change will be good for us in the long run.

The same is true in the software industry, where companies increasingly are replacing the one-time-purchase license for their product with cloud-based subscriptions. And while some customers might prefer buying a box and keeping the installation CD on the shelf, the benefits users gain from subscriptions are driving the subscription revolution. 

We thought we’d take a look at the differences between traditional one-time purchases (called perpetual licenses) and subscriptions, so you can decide which approach fits your company’s needs when looking at a solution.