Discover how Acronis outlines competitors with integrated cyber protection, ensuring unmatched security, backup, and recovery solutions.
When we made the decision a few weeks ago to delay the general availability of Acronis Cyber Protect Cloud, it was because we wanted to incorporate new cyber protection features for remote workers and workloads. After all, an unprecedented number of people were suddenly being forced to work from home, and their data, applications, and systems needed protection. That same day, we got an email from our colleagues at the market research firm DCIG to let us know they just published a blog article about how one of their analysts successfully used Acronis True Image for cyber protection and resilience at his home office following a hardware failure. The timing couldn’t have been more synchronistic.
New cyberattacks continue to roll in the wake of the COVID-19 pandemic, including exploits of the most popular video conferencing service and doubling-down on the DoppelPaymer ransomware strain. Here’s a quick recap of the latest updates to these attacks and the planned responses.
The typical managed service provider (MSP) faces a daunting array of obstacles to building a successful, sustainable and profitable business. To meet these challenges, MSPs must squeeze efficiencies out of their existing tech infrastructure and staff – even as they add new services. Acronis believes the key to this effort is a broad-based leveraging of integration and automation. We’ve outlined the opportunities to MSPs in deploying broader suites of cyber protection services as well and tactics to address the accompanying integration challenges in a new white paper titled The Five Levels of MSP Platform Integration. Here’s a brief preview.
Remote access to business environments has become a vital part of everyday work during the COVID-19 pandemic. One of the common ways an employee like a tech support staffer can connect to a remote employee’s work computer is the Remote Desktop service, which has some well-known security vulnerabilities.