Acronis
  • Acronis Account
  • Partner Cloud Console
  • Partner Portal
  • Connect Console

Acronis Blog

Acronis Cyber Protection Center →
Cyberthreats and cybersecurity insights
Acronis Blog
Threat detection

All stories in Threat detection

Follow us on
June 14, 2022 — 4 min read
Acronis
June 14, 2022 — 4 min read
Best practices for securing, backing up, and restoring MariaDB
It’s not always clear what choices you should make to maximize your security and best protect your company’s assets. To help, this article highlights many best practices and specific recommendations for critical parts of your MariaDB configuration.
May 24, 2022 — 6 min read
Acronis
May 24, 2022 — 6 min read
Cyber resilience: Software for business continuity
Today’s security service providers and IT professionals need to assume that data is constantly under attack. So, it’s essential that cyber resilience must include the ability to continue operations while under attack and to recover from attacks. Cyber resilience creates an end-to-end approach to threat management encompassing information security, business continuity, and disaster recovery.
April 27, 2022 — 2 min read
Acronis
April 27, 2022 — 2 min read
Easily access and manage remote workloads with Acronis Cyber Protect Connect
Acronis Cyber Protect Connect is a remote desktop and monitoring solution that enables businesses and individuals to easily access and manage remote workloads and fix any issues ― anytime, anywhere.
February 18, 2022 — 4 min read
Acronis
February 18, 2022 — 4 min read
Top Takeaways from the Acronis #CyberFit Summit Singapore
That’s a wrap on the Acronis #CyberFit Summit World Tour 2021. Our fourth and final stop went live simultaneously at the Acronis headquarters in Singapore and virtually around the world, offering an engaging and insightful opportunity for MSPs, resellers, distributors, HSPs and more looking to make their IT channel business more productive and profitable. Here are some of the top takeaways from the Acronis #CyberFit Summit
December 7, 2021 — 4 min read
Acronis
December 7, 2021 — 4 min read
Acronis Cyberthreats Report 2022 unveils cyberthreat predictions
At this year’s Acronis #CyberFit summit in Dubai, held December 8 and 9, Acronis will release its 2022 cyberthreats report. The report focuses on the increasing number and severity of cyberattacks during 2021, and provides the outlook for 2022.
October 12, 2021 — 3 min read
Acronis
October 12, 2021 — 3 min read
Acronis #CyberFit Summit - Miami Tech Innovation Track Highlights
With the Acronis #CyberFit Summit kicking off in just 13 days on Oct. 25, 2021, we’re taking a sneak peek at each of our event tracks: Highlighting the can’t-miss sessions and panels, the exciting speaker line-up attendees can look forward to seeing, and the business benefits that you can expect by registering and attending these events. Today: Tech Innovation at the Acronis #CyberFit Summit.
September 16, 2021 — 5 min read
Acronis
September 16, 2021 — 5 min read
IT in the age of AIOps
MSPs have a lot to gain from AIOps, including reduced costs, superior service delivery, and better cybersecurity. Let's explore the benefits this new technology enables, and how Acronis Cyber Protect Cloud delivers AIOps as part and parcel of its products and solutions
June 24, 2021 — 5 min read
Acronis
June 24, 2021 — 5 min read
What is anti-malware software and how does it work?
Cybercriminals are using the most advanced technologies to gain access to your system(s) and steal your sensitive and private data for financial gain. To keep up, cybersecurity vendors are working hard to incorporate these same technologies to stop these modern-day attacks. Whether you are a consumer or business, this article will help you better understand what malware is and what you can do to stop these continued attacks.
June 4, 2021 — 2 min read
Acronis
June 4, 2021 — 2 min read
Shlayer malware Analysis and Detection
The first examples of the Shlayer malware family were discovered in February 2018. Since then, it has become the most popular macOS first-stage trojan-downloader. Shlayer remotely installs other malicious or potentially unwanted applications such as Cimpli, Bnodlero, Geonei, and Pirrit adware for macOS X desktops and laptops, mostly targeting US-based users. Once installed, the adware collects the victim’s personal data and tracks browsing activities that can be used to target additional ads. This newest version of the trojan leverages a Python script for stealthier execution of the malicious payload and employs data encryption for communications with its external command and control (C&C) server. The Python script and crypto library are delivered inside of the trojan’s DMG installer.
June 1, 2021 — 4 min read
Acronis
June 1, 2021 — 4 min read
What is an email cyberattack?
It is another workday, and one of your client’s users is perusing through their inbox and sees an email from the U.S. Internal Revenue Service (IRS). Her first thought is, “Why would the IRS be contacting me?” Without thinking further, she quickly opens the email, clicks on the link and BAM! Next thing she sees on her screen is a message telling her that her files have been encrypted and she must pay a ransom to get the key to decrypt them.
May 20, 2021 — 6 min read
Acronis
May 20, 2021 — 6 min read
3 Ways to avoid malware infection in software patches
The objective of a software patch is to eliminate a vulnerability or fix a software flaw that is identified after the software is released, add new functionality or improve performance. Timely installation of newly released patches is an important maintenance step. It keeps your systems current and stable, optimizes performance, and mitigates the threat of new malware infection.
May 20, 2021 — 5 min read
Acronis
May 20, 2021 — 5 min read
How much can data loss really cost your business?
Data can be lost for a variety of reasons and the cost of data loss varies depending on the event type, the industry, and the location
April 21, 2021 — 5 min read
Acronis
April 21, 2021 — 5 min read
How to prepare for a cyber security audit?
If your organization is preparing for a cyber security audit, you will want to read on to learn about best practices to optimize the value of the audit. External audits performed by third parties, can be expensive so it is best to be as prepared as possible by following these best practices.
Acronis
© 2003–2022 Acronis International GmbH. All rights reserved.
  • Legal information
  • Privacy policy