cybersecurity

Acronis Backup Solutions for VMware Deployments – A Modern Approach with 15-Second RTOs

VMware’s annual conference, VMworld, is underway with thousands of IT professionals gathering in San Francisco to share and discuss the innovations that help businesses deliver speed, flexibility, and security to meet modern IT demands.

Learn how Acronis backup solutions fit into this conversation and pave the way for organizations increasingly shifting to the cloud to succeed.

Is your organization CyberFit

News of security breaches, data loss, and data theft is sadly a daily occurrence. Almost every industry and every size of organization have been hit — including governments, retailers, universities, and healthcare systems. What’s worse, affected businesses suffer both financial and reputational losses while being dragged into the news cycles.

It’s clear that organizations and employees are not CyberFit enough to meet today’s data security and privacy challenges. Let’s look at how the landscape has changed and what organizations need to do to become CyberFit.

Hard Lessons from the Catastrophic Attack on VFEmail.com

Imagine yourself as a service provider who wakes up one day, pours a cup of coffee, and checks email, Facebook, Instagram and Twitter – only to discover a flurry of panicky messages from customers about your service being unavailable. You rush to your management console to find that nothing is working; your entire operating environment is an unresponsive black hole. Racing to your data center, you discover a faceless attacker has wiped out every bit of data you own and maintain on behalf of your customers, erasing every hard drive on the premises.

What’s worse is they have also managed to destroy your backup servers. You have no recovery options.

That’s not an imaginary worst-case scenario. That’s what happened earlier this week to VFEmail.net, a US-based provider of secure email services.

Acronis joins AMTSO

Acronis joined the Anti-Malware Testing Standard Organization (AMTSO) earlier this year to ensure its solutions adhere to the highest standards of security and help shape the evaluation criteria of future technologies. Acronis is happy to take part in establishing these protocols and procedures for the next generation of cyber protection and to help improve security testing practices overall within the industry.

One important step towards this collaboration was to approve and adopt AMTSO’s Testing Protocol Standard, a process that demanded years of development, trials, and consultation before final approval. It was finally adopted at the end of May, marking a major step for the industry. Here’s why it matters.

The Trump-Kim Summit missed addressing cyber warfare

Now that the U.S. and North Korean officials have left Singapore, the pundits are debating the effectiveness of the recent nuclear weapons summit between U.S. President Donald Trump and North Korean Chairman Kim Jong-un. Yet despite the multiple areas of concern covered during the summit, there’s one security topic that wasn’t addressed by either side – cyber warfare.

In fact, just three days after the summit, North Korea was again accused of launching a new attack as the Typeframe malware strain was uncovered.

Given our role as a global leader in cyber protection, Acronis was hopeful that the negotiations would address these concerns. The experts at Acronis’ Singaporean Security Research Centre consider cyber warfare an unfortunate omission from these talks.

CloudLinux Backup

There’s strength in numbers, which is why so many techies enjoy working with collaborative, open-source systems like Linux. Bouncing a good idea between several people can usually improve it more quickly than if one person had to refine it on their own.

The same can be true for a company that’s looking to enhance its offering. Sometimes getting to the next level means developing an alliance that will allow the company to leapfrog what they otherwise would have had to spend time and resources developing independently.

Recently, CloudLinux found it was ready to take another big step to improve its offerings and determined that the right partner could add even more value. Let’s take a look.

Spectre and Meltdown

New security research has been made public revealing the Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753 and CVE-2017-5715) vulnerabilities in modern processors. These vulnerabilities allow programs to break the isolation between applications, which means malicious applications could access the memory of another program running on the same machine. (For a detailed attack description, please visit https://spectreattack.com/ or https://meltdownattack.com/.)

It is important to note that these vulnerabilities can only be exploited locally, meaning a malicious actor must be able to run code on the system in order to exploit these vulnerabilities.