Cyberthreat update from Acronis CPOCs: Week of December 14, 2020

Here at Acronis, we’re always monitoring for dangers to your data, deploying updates to handle newly-discovered vulnerabilities, and issuing alerts and recommendations to help you stay protected. Our global network of Acronis Cyber Protection Operations Centers (CPOCs) continue to work around the clock to proactively detect and defend against the latest cyberthreats.

Part of this work includes video updates to inform you of modern hazards in the digital landscape — such as ransomware attacks on government facilities and the new vulnerabilities in popular business applications. Here’s a look at some of the most recent breaking news and analyses:

GandCrab ransomware is ending after stealing millions

They say crime doesn’t pay, but clearly the architects behind GandCrab ransomware didn’t get that memo. They recently announced they were retiring thanks to the money they’ve made encrypting victims’ computers.

At the beginning of June, operators of the notorious GandCrab strain of ransomware announced that “all good things come to an end” and they are ceasing their operations.

Unfortunately the success they reported will likely provide a roadmap for other cybercriminals that will continue for a long time.

Automate – Simplify your Life. Watch a 4-minute Automation Demo.

Automate, automate, automate. According to Forrester Research (The State of Business Technology Resiliency, Q2 2014), “The complexity we face today in technology is beyond what humans can manage”.

Make the Most of Your IT Budget in Q4

Welcome to the fourth quarter, the time when most IT departments are working hard to tie up loose ends and complete projects before the end of the fiscal year. Economic conditions have caused organizations to do more with less. They are tasked with protecting a growing amount of mission-critical data, often with a shrinking budget.

Now is the time to review and adjust your current technology budget, to make room for investing in new services and new technology. It’s also the time of year when you’ll want to spend any remaining 2012 budget. Failing to do so may result in your budget getting reallocated in 2013. The clock is ticking, so make the most of your 2012 budget in the last quarter. Learn some best practices for technology budgeting:

How to Avoid Hardware/ Software Drift

I’ve been writing about the hidden hazards of do-it-yourself disaster recovery. One of these hazards is hardware/software drift. Since your disaster recovery site represents a working replica of the production environment, it will need to be maintained on an ongoing basis. There are several strategies for how hardware and software are provisioned for your DR site. The strategies you choose will determine the how much maintenance will be needed to keep your DR site running at an optimal level.

There are two main techniques for acquiring hardware for a disaster recovery site, although you may want to use a combination of both. One technique is to replace hardware (i.e. a server) that is no longer covered by warranty with new hardware and use the old hardware for disaster recovery. Another strategy is to buy or lease new equipment to use at the DR site.

Five Things You need to Know to Get Raas Right, Part II

Last time, we looked at the BIG difference between backup and Disaster Recovery. Today, we’ll discuss how to prioritize what to protect, and how to deal with heterogeneous environments…

Prioritize Servers and Applications

The same mentality that leads companies to use backup and forego DR also negatively affects the way they think about prioritizing their protection requirements. Thinking about recovery in terms of which files to protect is the wrong way to go; you end up lost in the weeds and not looking at things systematically.