You are on United States + Canada website. Select another region to view location-specific content
United States + Canada
English
Select another region
Choose region and language
Americas
  • Brasil Português
  • Mexico Español
  • United States + Canada English
Asia-Pacific
  • Chinese Simplified 简体中文
  • Chinese Traditional 繁體中文
  • Japan 日本語
  • Korea 한국어
  • Singapore English
  • India हिन्दी
Europe, Middle East and Africa
  • Bulgaria Български
  • Czech Čeština
  • Europe English
  • France Français
  • Germany + Switzerland Deutsch
  • Israel עברית
  • Italy Italiano
  • Poland Polski
  • Romania Română
  • Spain Español
  • Sweden Svenska
  • Türkiye Türkçe
  • United Kingdom English
  • Hungary Magyar
  • Netherlands Dutch
  • Americas
    • Brasil Português
    • Mexico Español
    • United States + Canada English
  • Asia-Pacific
    • Chinese Simplified 简体中文
    • Chinese Traditional 繁體中文
    • Japan 日本語
    • Korea 한국어
    • Singapore English
    • India हिन्दी
  • Europe, Middle East and Africa
    • Bulgaria Български
    • Czech Čeština
    • Europe English
    • France Français
    • Germany + Switzerland Deutsch
    • Israel עברית
    • Italy Italiano
    • Poland Polski
    • Romania Română
    • Spain Español
    • Sweden Svenska
    • Türkiye Türkçe
    • United Kingdom English
    • Hungary Magyar
    • Netherlands Dutch
  • Contact sales
  • Contact support
  • Contact renewals
  • Login for service providers Acronis Cyber Protect Cloud
  • Login for business customers Acronis Cyber Protect, Acronis Snap Deploy
  • Login for home users Acronis True Image
  • Login to Partner Portal Acronis Partner Portal
  • Login to Connect Acronis Cyber Protect Connect
  • Products
    For service providers
    Acronis Cyber Protect Cloud
    Empowering service providers with backup, DR, cybersecurity, and endpoint management in one integrated solution.
    Cybersecurity
    Security + XDR Security + EDR Managed Detection & Response (MDR) Data Loss Prevention (DLP)
    Data protection
    Advanced Backup Disaster Recovery File Sync & Share
    Microsoft 365 protection
    Ultimate 365 Backup for Microsoft 365 Security Posture Management Email Security Email Archiving for Microsoft 365 Collaboration App Security for Microsoft 365 Security Awareness Training (SAT)
    MSP operations
    RMM PSA
    • Try it free
    For service providers, telco's and ISPs
    Acronis Cyber Protect Home & Business
    Secure backup and anti-malware solution for small offices and home users.
    For businesses
    Acronis Cyber Protect
    -25%
    The most secure backup and rapid recovery with natively integrated security and endpoint management for reliable business continuity.

    Backup | Security | Endpoint management
    • Buy now
    For enterprise
    Acronis Cyber Protect Enterprise
    The most secure backup and fastest recovery for Enterprise, designed specifically for multi-site, multi-generational and industrial IT.

    Backup | Security | Endpoint management
    • Book a call
    For businesses
    Acronis Snap Deploy
    A user-friendly solution that lets you provision all your workstations and servers like you are provisioning just one.
    • Try it free
    For operational technology
    Acronis Cyber Protect OT
    New
    Leading solution for resilience, continuity and compliance across operational technology (OT) infrastructure.
    • Book a call
    For home
    Acronis True Image
    Formerly Acronis Cyber Protect Home Office, it's the only personal cyber protection solution that delivers easy-to-use, integrated backup and anti-malware in one.
    • Buy now
    For everyone
    Acronis Cyber Protect Connect
    A remote desktop and monitoring solution that enables you to easily access and manage remote workloads and fix any issues – anytime, anywhere.
    • All products
    Looking to update or renew your product or contact us for help?
  • Solutions
    Solutions
    For service providers
    For business
    • Microsoft 365 backup and recovery
    • Ransomware protection
    • Managed anti-malware protection
    • Continuous data protection
    • Endpoint protection
    • Hosting service providers
    • Hybrid disaster recovery
    • MSP patch management
    • Prevention
    • Recovery
    • Managed server backup
    • URL filtering and categorization
    Solutions for service providers
    • Management
    • Automation
    • Security
    • Data Protection
    All integrations

    Environments

    Physical

    Windows Server |
    Linux

    Endpoints

    Windows PC |
    Mac

    Cloud

    Microsoft 365 |
    Azure |
    Google Workspace |
    Amazon EC2 |
    See all

    Virtual

    Hyper-V |
    Citrix XenServer |
    Red Hat Virtualization |
    Nutanix AHV |
    See all

    Applications

    SQL Server |
    SharePoint |
    Oracle Database |
    See all

    Mobile

    Backup Solution |
    Data Recovery and migration

    Compare Acronis

    Veeam Sophos Kaspersky Arcserve Axcient SentinelOne Datto

    Discover how Acronis outlines competitors with integrated cyber protection, ensuring unmatched security, backup, and recovery solutions.

  • Pricing
    • For Service Providers
    • For Businesses & Enterprise
    • For Home
  • Partners
    Acronis Partner Program
    One partner program. Total cyber protection.
    • Join the partner program
    • Partner portal login
    Benefits designed for you
    • Promotions
      Active
    • Service providers
    • Resellers
    • Affiliates
    • OEMs
    Support for your business
    • Find an IT provider
    • Find a distributor
    • Partner Certification
      Partners now have access to all sales and technical training — a $999 annual value per partner
    • MSP Academy
      Vendor-neutral training, covering the A-Z of managing an MSP business
    Go further with cyber protection
    • Acronis Technology Partner Program
      One tiered program to build and promote your custom solution
    • Acronis Developer Network
      Developer community and resources in our Technology Partner Program
    • Acronis MSSP Partner Program
      Accelerate your cybersecurity business with our MSSP Partner Program
  • Support
    Resources
    • Documentation
    • Knowledge Base
    • MSP Academy
    • Product support lifecycle
    Support by category
    • Business environments
    • Managed services
    • Home and individual use
    • Remote work
    • Acronis Advantage Program
    Need more help?
    • Contact sales
    • Customer service and support
    • Renew your product
    • Professional Services
    • Forum
    Logins
    • Cyber Protection Console
      Access and administer your client cloud solutions
    • Partner Certification
      Partners now have access to all sales and technical training — a $999 annual value per partner
  • Resources
    Acronis Resource Center
    Browse through a full list of the latest product documentation, case studies, white papers, eBooks, upcoming and on-demand webinars of Acronis
    • TRU Security - Latest on threats to managed IT service provider security
    • Acronis Blog
    Product resources
    • Datasheets
    • White Papers
    • Case Studies
    • eBooks
    • Analyst reports
    Acronis Academy
    • Partner Certification
      Partners now have access to all sales and technical training — a $999 annual value per partner
    • MSP Academy
      Vendor-neutral training, covering the A-Z of managing an MSP business
    Events, webinars and trainings
    • Upcoming events and webinars
    • On-demand videos
    • Other videos
    • Trainings and certifications
  • Company
    Company
    • About us
    • History
    • Industry Recognition
    • Careers
    • Contacts
    • Press releases
    • Cloud data centers
    Technologies
    • Active Protection
    • AnyData Engine
    • Acronis Notary
    • Universal Restore
    • Anti-malware
    Company policies
    • Trust and security
    • Sustainability and governance
    Special projects
    • Acronis #CyberFit Sports
      See how the world’s leading sports teams use cyber protection to gain a competitive advantage.
    • Acronis Cyber Foundation
      Discover how we can work together to create, spread, and protect knowledge to build a better future.

Acronis Blog

Acronis Blog
Ransomware protection

All stories in Ransomware protection

Follow us on
March 31, 2025  — 3 min read
Acronis
March 31, 2025  — 3 min read
Acronis Cyber Protect Cloud earns Top Product award again in latest AV-TEST evaluation
In the AV-TEST Institute’s January–February 2025 evaluation, Acronis Cyber Protect Cloud delivered a flawless performance again, demonstrating constant and reassuring results.
October 25, 2022  — 3 min read
Acronis
October 25, 2022  — 3 min read
Acronis #CyberFit Summit 2022 sponsor spotlight: Galactic Advisors
We are thrilled to have some of the IT channel’s leading technology providers supporting and sponsoring our Acronis #CyberFit Summit in Miami next month. One of these sponsoring organizations we’re highlighting is Galactic Advisors, whose third-party analysis helps organizations secure data, eliminate vulnerabilities, track fixes and avoid common mistakes.
September 22, 2022  — 9 min read
Acronis
September 22, 2022  — 9 min read
RapperBot: A new threat for IoT devices
On June 22, 2022, CNCERT IoT Threat Research Team and NSFOCUS FuYingLab monitored a new botnet that was attacking IoT devices. Naming the threat ‘RapperBot,’ researchers found more than 5,000 compromised hosts, but no attack commands were spotted. In analyzing samples, cybersecurity analytics found similarities with Mirai Bot, whose source code has been leaked.
August 29, 2022  — 4 min read
Acronis
August 29, 2022  — 4 min read
Acronis Cyberthreats Report: Ransomware dominates the threat landscape
Based on original research by the experts at our Cyber Protection Operation Centers, the Acronis Cyberthreats Report Mid-year 2022 explores key trends in cybersecurity and data protection, and offers actionable advice to help you stay safe against the rising tide of cybercrime activity.
August 25, 2022  — 9 min read
Acronis
August 25, 2022  — 9 min read
SideWinder uses weaponized Word documents to compromise victims’ machines
The SideWinder APT group was first discovered in 2018, and since earlier this year has been actively targeting military, defense and other industries in South Asia. They used to spread phishing emails with Word files that downloaded additional files to decode, drop and start the malware, which collects and uploads victims’ data to remote servers. They've since infected Android devices with malicious apps in Google Play.
August 16, 2022  — 11 min read
Acronis
August 16, 2022  — 11 min read
Hydrox: A new wiper attacks
Hydrox was first spotted by Twitter user Petrovich on July 29, 2022. On August 3, EnigmaSoft described this threat as a harmful malware that actually wipes users' data. This conclusion was made from a “ransom note” which didn’t actually contain any credentials or links for paying the ransom.
August 10, 2022  — 3 min read
Acronis
August 10, 2022  — 3 min read
Acronis Cyber Protect stopped all the threats in the Advanced Protection Test commissioned by AV-Test.org
In their Advanced Protection tests, the famous German testing institute, AV-Test.org, wanted to accent how various products deal with ransomware in reality, and at what stage and how threats are actually detected and stopped. The test was commissioned in February 2022, but the results were published in June.
August 10, 2022  — 4 min read
Acronis
August 10, 2022  — 4 min read
Acronis earns accolades for its security in independent assessments
With the summer of 2022 in full swing, we can look back at a past year of significant growth, community-building and recognition from independent analysts — all of which speak to the importance of the cyber protection approach in the face of modern IT challenges and cyberthreats.
August 08, 2022  — 4 min read
Acronis
August 08, 2022  — 4 min read
Does Linux need antivirus software?
This article is intended for IT professionals who are either new to Linux or are looking to learn more about using third-party antivirus solutions with the Linux OS.
August 03, 2022  — 5 min read
Acronis
August 03, 2022  — 5 min read
What is a whaling attack?
A whaling attack is a type of spear phishing attack targeting high-profile employees and C-suite executives.
July 27, 2022  — 2 min read
Acronis
July 27, 2022  — 2 min read
What’s new in Acronis Cyber Protect Cloud? — July, 2022
As the number of cyberattacks continue to increase and grow more sophisticated in nature, Acronis is committed to making it easy for MSPs to extend their offerings and effortlessly manage Acronis Cyber Protect Cloud to ensure their clients’ systems, applications and data are protected. Check out the numerous improvements in Acronis Cyber Protect Cloud release 22.07 we've released this month.
July 26, 2022  — 8 min read
Acronis
July 26, 2022  — 8 min read
Symbiote: A new stealthy malware for Linux
Symbiote is a new Linux malware that steals users’ data and provides a backdoor to threat actors. It was discovered in June, 2022 and is characterized as a very stealthy malware. It uses a lot of evasion techniques, such as hooking functions, capturing TCP traffic and hiding its own files. It collects users' data and exfiltrates it on DNS servers.
July 22, 2022  — 12 min read
Acronis
July 22, 2022  — 12 min read
CloudMensis: a new macOS threat
In April 2022, ESET researchers found a yet-unknown backdoor on macOS. It was named CloudMensis due to the fact that it uses different public cloud storage for C2 communication. CloudMensis looks for different types of documents, captures keyboard input, searches local emails and can take screen captures.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

Tips, news and promo offers

Engage with Acronis
© 2003–2025 Acronis International GmbH.
  • Legal information
  • Privacy policy
  • Cookie Notice
  • Notice of collection
  • Choose region and language
    Americas
    • Brasil Português
    • Mexico Español
    • United States + Canada English
    Asia-Pacific
    • Chinese Simplified 简体中文
    • Chinese Traditional 繁體中文
    • Japan 日本語
    • Korea 한국어
    • Singapore English
    • India हिन्दी
    Europe, Middle East and Africa
    • Bulgaria Български
    • Czech Čeština
    • Europe English
    • France Français
    • Germany + Switzerland Deutsch
    • Israel עברית
    • Italy Italiano
    • Poland Polski
    • Romania Română
    • Spain Español
    • Sweden Svenska
    • Türkiye Türkçe
    • United Kingdom English
    • Hungary Magyar
    • Netherlands Dutch
    • Americas
      • Brasil Português
      • Mexico Español
      • United States + Canada English
    • Asia-Pacific
      • Chinese Simplified 简体中文
      • Chinese Traditional 繁體中文
      • Japan 日本語
      • Korea 한국어
      • Singapore English
      • India हिन्दी
    • Europe, Middle East and Africa
      • Bulgaria Български
      • Czech Čeština
      • Europe English
      • France Français
      • Germany + Switzerland Deutsch
      • Israel עברית
      • Italy Italiano
      • Poland Polski
      • Romania Română
      • Spain Español
      • Sweden Svenska
      • Türkiye Türkçe
      • United Kingdom English
      • Hungary Magyar
      • Netherlands Dutch