You are on United States + Canada website. Select another region to view location-specific content
United States + Canada
English
Select another region
Choose region and language
Americas
  • Brasil Português
  • Mexico Español
  • United States + Canada English
Asia-Pacific
  • Chinese Simplified 简体中文
  • Chinese Traditional 繁體中文
  • Japan 日本語
  • Korea 한국어
  • Singapore English
  • India हिन्दी
Europe, Middle East and Africa
  • Bulgaria Български
  • Czech Čeština
  • Europe English
  • France Français
  • Germany + Switzerland Deutsch
  • Israel עברית
  • Italy Italiano
  • Poland Polski
  • Romania Română
  • Spain Español
  • Sweden Svenska
  • Türkiye Türkçe
  • United Kingdom English
  • Hungary Magyar
  • Netherlands Dutch
  • Americas
    • Brasil Português
    • Mexico Español
    • United States + Canada English
  • Asia-Pacific
    • Chinese Simplified 简体中文
    • Chinese Traditional 繁體中文
    • Japan 日本語
    • Korea 한국어
    • Singapore English
    • India हिन्दी
  • Europe, Middle East and Africa
    • Bulgaria Български
    • Czech Čeština
    • Europe English
    • France Français
    • Germany + Switzerland Deutsch
    • Israel עברית
    • Italy Italiano
    • Poland Polski
    • Romania Română
    • Spain Español
    • Sweden Svenska
    • Türkiye Türkçe
    • United Kingdom English
    • Hungary Magyar
    • Netherlands Dutch
  • Contact sales
  • Contact support
  • Contact renewals
  • Login for service providers Acronis Cyber Protect Cloud
  • Login for business customers Acronis Cyber Protect, Acronis Snap Deploy
  • Login for home users Acronis True Image
  • Login to Partner Portal Acronis Partner Portal
  • Login to Connect Acronis Cyber Protect Connect
  • Products
    For service providers
    Acronis Cyber Protect Cloud
    Empowering service providers with backup, DR, cybersecurity, and endpoint management in one integrated solution.
    Cybersecurity
    Security + XDR Security + EDR Managed Detection & Response (MDR) Data Loss Prevention (DLP)
    Data protection
    Advanced Backup Disaster Recovery File Sync & Share
    Microsoft 365 protection
    Ultimate 365 Backup for Microsoft 365 Security Posture Management Email Security Email Archiving for Microsoft 365 Collaboration App Security for Microsoft 365 Security Awareness Training (SAT)
    MSP operations
    RMM PSA
    • Try it free
    For service providers, telco's and ISPs
    Acronis Cyber Protect Home & Business
    Secure backup and anti-malware solution for small offices and home users.
    For businesses
    Acronis Cyber Protect
    -25%
    The most secure backup and rapid recovery with natively integrated security and endpoint management for reliable business continuity.

    Backup | Security | Endpoint management
    • Buy now
    For enterprise
    Acronis Cyber Protect Enterprise
    The most secure backup and fastest recovery for Enterprise, designed specifically for multi-site, multi-generational and industrial IT.

    Backup | Security | Endpoint management
    • Book a call
    For businesses
    Acronis Snap Deploy
    A user-friendly solution that lets you provision all your workstations and servers like you are provisioning just one.
    • Try it free
    For operational technology
    Acronis Cyber Protect OT
    New
    Leading solution for resilience, continuity and compliance across operational technology (OT) infrastructure.
    • Book a call
    For home
    Acronis True Image
    Formerly Acronis Cyber Protect Home Office, it's the only personal cyber protection solution that delivers easy-to-use, integrated backup and anti-malware in one.
    • Buy now
    For everyone
    Acronis Cyber Protect Connect
    A remote desktop and monitoring solution that enables you to easily access and manage remote workloads and fix any issues – anytime, anywhere.
    • All products
    Looking to update or renew your product or contact us for help?
  • Solutions
    Solutions
    For service providers
    For business
    • Microsoft 365 backup and recovery
    • Ransomware protection
    • Managed anti-malware protection
    • Continuous data protection
    • Endpoint protection
    • Hosting service providers
    • Hybrid disaster recovery
    • MSP patch management
    • Prevention
    • Recovery
    • Managed server backup
    • URL filtering and categorization
    Solutions for service providers
    • Management
    • Automation
    • Security
    • Data Protection
    All integrations

    Environments

    Physical

    Windows Server |
    Linux

    Endpoints

    Windows PC |
    Mac

    Cloud

    Microsoft 365 |
    Azure |
    Google Workspace |
    Amazon EC2 |
    See all

    Virtual

    Hyper-V |
    Citrix XenServer |
    Red Hat Virtualization |
    Nutanix AHV |
    See all

    Applications

    SQL Server |
    SharePoint |
    Oracle Database |
    See all

    Mobile

    Backup Solution |
    Data Recovery and migration

    Compare Acronis

    Veeam Sophos Kaspersky Arcserve Axcient SentinelOne Datto

    Discover how Acronis outlines competitors with integrated cyber protection, ensuring unmatched security, backup, and recovery solutions.

  • Pricing
    • For Service Providers
    • For Businesses & Enterprise
    • For Home
  • Partners
    Acronis Partner Program
    One partner program. Total cyber protection.
    • Join the partner program
    • Partner portal login
    Benefits designed for you
    • Promotions
      Active
    • Service providers
    • Resellers
    • Affiliates
    • OEMs
    Support for your business
    • Find an IT provider
    • Find a distributor
    • Partner Certification
      Partners now have access to all sales and technical training — a $999 annual value per partner
    • MSP Academy
      Vendor-neutral training, covering the A-Z of managing an MSP business
    Go further with cyber protection
    • Acronis Technology Partner Program
      One tiered program to build and promote your custom solution
    • Acronis Developer Network
      Developer community and resources in our Technology Partner Program
    • Acronis MSSP Partner Program
      Accelerate your cybersecurity business with our MSSP Partner Program
  • Support
    Resources
    • Documentation
    • Knowledge Base
    • MSP Academy
    • Product support lifecycle
    Support by category
    • Business environments
    • Managed services
    • Home and individual use
    • Remote work
    • Acronis Advantage Program
    Need more help?
    • Contact sales
    • Customer service and support
    • Renew your product
    • Professional Services
    • Forum
    Logins
    • Cyber Protection Console
      Access and administer your client cloud solutions
    • Partner Certification
      Partners now have access to all sales and technical training — a $999 annual value per partner
  • Resources
    Acronis Resource Center
    Browse through a full list of the latest product documentation, case studies, white papers, eBooks, upcoming and on-demand webinars of Acronis
    • TRU Security - Latest on threats to managed IT service provider security
    • Acronis Blog
    Product resources
    • Datasheets
    • White Papers
    • Case Studies
    • eBooks
    • Analyst reports
    Acronis Academy
    • Partner Certification
      Partners now have access to all sales and technical training — a $999 annual value per partner
    • MSP Academy
      Vendor-neutral training, covering the A-Z of managing an MSP business
    Events, webinars and trainings
    • Upcoming events and webinars
    • On-demand videos
    • Other videos
    • Trainings and certifications
  • Company
    Company
    • About us
    • History
    • Industry Recognition
    • Careers
    • Contacts
    • Press releases
    • Cloud data centers
    Technologies
    • Active Protection
    • AnyData Engine
    • Acronis Notary
    • Universal Restore
    • Anti-malware
    Company policies
    • Trust and security
    • Sustainability and governance
    Special projects
    • Acronis #CyberFit Sports
      See how the world’s leading sports teams use cyber protection to gain a competitive advantage.
    • Acronis Cyber Foundation
      Discover how we can work together to create, spread, and protect knowledge to build a better future.

Acronis Blog

Acronis Blog
Cyber protection

All stories in Cyber protection

Follow us on
May 20, 2025  — 22 min read
Acronis
May 20, 2025  — 22 min read
From banks to battalions: SideWinder’s attacks on South Asia’s public sector
Acronis Threat Research Unit (TRU) uncovered a new SideWinder APT campaign targeting high-level government institutions in Sri Lanka, Bangladesh and Pakistan.
February 03, 2017  — 2 min read
Acronis
February 03, 2017  — 2 min read
How to Find out If Your Computer Is Protected Against Ransomware
Ransomware is on the hunt for your precious photos and important documents. Is your computer protected? Are you sure that your protection actually works? There is an easy way to check. Find out how!
February 02, 2017  — 3 min read
Acronis
February 02, 2017  — 3 min read
A Series of Unfortunate Backup Events
Gitlab.com is a very popular Software as Service (SaaS) platform for software developers. Recently, they suffered a series of unfortunate events due to incomplete backup practices that resulted in customer data loss and service down time. They are back up and running now (minus some essential client data) and there are a few important lessons we can learn from their backup approach and resulting experience.
January 31, 2017  — 10 min read
Acronis
January 31, 2017  — 10 min read
Osiris Ransomware: New Addition to the Locky Family
Locky ransomware has undergone another facelift, as cyber criminals roll out updates to one of the most common and damaging families of file-encrypting malware. The new ransomware is named Osiris, after the Egyptian god of the afterlife, and comes with improved features designed to attack backups and avoid being detected. It appends the .orisis extension to the end of the encrypted files and follows the standard pattern of ransomware infection: Invade, Encrypt, Extort. Riding on the back of Locky’s success, Osiris is one of the most serious cyber security treats computer users are facing today.
January 30, 2017  — 5 min read
Acronis
January 30, 2017  — 5 min read
Weekly Tech Roundup: January 30
In a world of increasing cyber attacks and data vulnerability, it’s our responsibility to take action and protect ourselves—even though, at times, it seems ever more difficult. Internet of Things (IoT) devices are flooding the market, becoming a major part of our daily lives; ransomware is preying upon innocent individuals and institutions in the hopes of making a quick buck; and dormant threats are coming out of the cracks, striking fear into those looking towards the future. But even with all of these threats, we continue to innovate, finding new and imaginative ways to protect ourselves and our devices. This week in tech saw new ways of thinking about security to combat old yet increasingly devious threats. What did you miss?
January 24, 2017  — 4 min read
Acronis
January 24, 2017  — 4 min read
The Acronis True Image 2017 New Generation NYC Launch Event — Blockchain, Ransomware, and the Race Toward the Future
The Acronis team landed in NYC last week to discuss the global threat of ransomware and present groundbreaking technology that lifts the concept of data protection to a brand new level. The event was packed to capacity with standing room only — hundreds of professionals and media representatives came to hear about the latest developments in the world of cyber security and personal data safety. It was the launch of Acronis True Image 2017 New Generation. Acronis CMO John Zanni and Acronis VP and GM of Consumer Business Gaidar Magdanurov were joined by a former FBI cyber security expert Eric O’Neill  and blockchain expert Alex Tapscott to launch the new product and talk about the ever-evolving technical landscape and our responsibilities in keeping data protected.
January 24, 2017  — 3 min read
Acronis
January 24, 2017  — 3 min read
5 Reasons to Back Up Your Employees’ PCs
IT Infrastructure in your small business is becoming complex. Before you only had servers and generic desktops to deal with, but the world has changed. Now you have virtualization, cloud VMs in IaaS clouds, data in SaaS clouds, and even mobile devices to worry about.
January 23, 2017  — 5 min read
Acronis
January 23, 2017  — 5 min read
Weekly Tech Roundup: January 23
With much of the news revolving around the inauguration of President Donald Trump, it might have been easy to miss the revelations in the world of cybersecurity. A number of new, and old, malware variants were exposed, and the tech world began doing more to protect themselves against attack. With these revelations came new products ready to fight against ransomware, putting data protection at the forefront of cybersecurity. The headlines were endless, but we made it our mission to gather the most relevant and most intriguing, topics of discussion. What did you miss?
January 20, 2017  — 3 min read
Acronis
January 20, 2017  — 3 min read
INDEPENDENT TEST: Acronis True Image 2017 New Generation Outperforms Competitors
The threat of ransomware (a type of malware that hijacks computer systems and demands ransom) is so great that it became paramount for backup vendors to introduce technology to protect backups from such attacks.
January 18, 2017  — 2 min read
Acronis
January 18, 2017  — 2 min read
Acronis True Image 2017 New Generation: Your Ultimate Backup Destination and Protection Against Ransomware
The wait is over! We are excited to announce the immediate availability of Acronis True Image 2017 New Generation, a powerful personal backup software packed with new ground-breaking features designed to pull the world out of the multi-billion-dollar ransomware nightmare. It also has the capacity to certify and verify the data through blockchain technology.
January 18, 2017  — 4 min read
Acronis
January 18, 2017  — 4 min read
Acronis Consumer Survey Exposed the Need for Effective Defense Against Ransomware
A survey conducted by Acronis in December 2016 exposed the lack of awareness and understanding of the imminent danger presented by ransomware  — an increasingly-pervasive form of malware that encrypts the victim’s files, denying access to them until the user pays an online ransom of hundreds or thousands of dollars. Respondents placed high value on personal data, but were not prepared to pay any ransom in case of an attack. The survey revealed that while 71 percent of the respondents worry about the safety of their personal data and 41 percent say they cannot afford to lose any of it, 56 percent have no plan for recovering that data if it is lost or held hostage by cyber criminals.
January 18, 2017  — 6 min read
Acronis
January 18, 2017  — 6 min read
DeriaLock Demands Victims to Pay Ransom by Skype
Recently, BleepingComputers discovered DeriaLock ransomware, and Acronis analysts took a close look at the latest version. DeriaLock ransomware consists of three functional parts: screenlocker, cryptolocker, and a file eraser. This article reviews the cryptolocker and file eraser parts of the ransomware and provides information on how to unlock the affected system.
January 17, 2017  — 3 min read
Acronis
January 17, 2017  — 3 min read
Leveraging Hyper-V 2016 Resilient Change Tracking for Backup
Resilient Change Tracking (RCT) technology simplifies and speeds up the backup and recovery of Windows Server 2016 Hyper-V VMs. Best of all, it is transparent and does not require any additional configuration or management.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109

Tips, news and promo offers

Engage with Acronis
© 2003–2025 Acronis International GmbH.
  • Legal information
  • Privacy policy
  • Cookie Notice
  • Notice of collection
  • Choose region and language
    Americas
    • Brasil Português
    • Mexico Español
    • United States + Canada English
    Asia-Pacific
    • Chinese Simplified 简体中文
    • Chinese Traditional 繁體中文
    • Japan 日本語
    • Korea 한국어
    • Singapore English
    • India हिन्दी
    Europe, Middle East and Africa
    • Bulgaria Български
    • Czech Čeština
    • Europe English
    • France Français
    • Germany + Switzerland Deutsch
    • Israel עברית
    • Italy Italiano
    • Poland Polski
    • Romania Română
    • Spain Español
    • Sweden Svenska
    • Türkiye Türkçe
    • United Kingdom English
    • Hungary Magyar
    • Netherlands Dutch
    • Americas
      • Brasil Português
      • Mexico Español
      • United States + Canada English
    • Asia-Pacific
      • Chinese Simplified 简体中文
      • Chinese Traditional 繁體中文
      • Japan 日本語
      • Korea 한국어
      • Singapore English
      • India हिन्दी
    • Europe, Middle East and Africa
      • Bulgaria Български
      • Czech Čeština
      • Europe English
      • France Français
      • Germany + Switzerland Deutsch
      • Israel עברית
      • Italy Italiano
      • Poland Polski
      • Romania Română
      • Spain Español
      • Sweden Svenska
      • Türkiye Türkçe
      • United Kingdom English
      • Hungary Magyar
      • Netherlands Dutch