You are on United States + Canada website. Select another region to view location-specific content
United States + Canada
English
Select another region
Choose region and language
Americas
  • Brasil Português
  • Mexico Español
  • United States + Canada English
Asia-Pacific
  • Chinese Simplified 简体中文
  • Chinese Traditional 繁體中文
  • Japan 日本語
  • Korea 한국어
  • Singapore English
  • India हिन्दी
Europe, Middle East and Africa
  • Bulgaria Български
  • Czech Čeština
  • Europe English
  • France Français
  • Germany + Switzerland Deutsch
  • Israel עברית
  • Italy Italiano
  • Poland Polski
  • Romania Română
  • Spain Español
  • Sweden Svenska
  • Türkiye Türkçe
  • United Kingdom English
  • Hungary Magyar
  • Netherlands Dutch
  • Americas
    • Brasil Português
    • Mexico Español
    • United States + Canada English
  • Asia-Pacific
    • Chinese Simplified 简体中文
    • Chinese Traditional 繁體中文
    • Japan 日本語
    • Korea 한국어
    • Singapore English
    • India हिन्दी
  • Europe, Middle East and Africa
    • Bulgaria Български
    • Czech Čeština
    • Europe English
    • France Français
    • Germany + Switzerland Deutsch
    • Israel עברית
    • Italy Italiano
    • Poland Polski
    • Romania Română
    • Spain Español
    • Sweden Svenska
    • Türkiye Türkçe
    • United Kingdom English
    • Hungary Magyar
    • Netherlands Dutch
  • Contact sales
  • Contact support
  • Contact renewals
  • Acronis Account Log in to manage business or home Acronis software products
  • Cloud Console For SPs: Log in to access and manage your client solutions in Acronis Cyber Protect Cloud
  • Partner Portal All partner-related resources and tools at your fingertips
  • Connect Console Sign in to Acronis Connect Console

Acronis Blog

Acronis Blog
Cyber protection

All stories in Cyber protection

Follow us on
15 April 2025  — 17 min read
Acronis
15 April 2025  — 17 min read
Astaroth unleashed
Astaroth, also known as Guildma, is a sophisticated piece of malware that first emerged in 2018 and has since undergone significant evolution, adapting to new security measures and refining its attack methodologies.
12 March 2014  — 1 min read
Acronis
12 March 2014  — 1 min read
Why Affordable, Simple Technologies Top SMB IT Needs
The substantial pressures affecting IT departments — think more cloud, more mobile and more data, to name a few — can be especially difficult for small and medium-sized businesses to handle. SMB IT departments often lack the scale and deep pockets of their enterprise IT counterparts, yet they still need to make strategic technology decisions that satisfy business needs and give employees the tools they need to get work done.
11 March 2014  — 1 min read
Acronis
11 March 2014  — 1 min read
High-Profile Data Breaches Spur Debate on Consumer Notification
The fallout continues from last year's major data breaches at Target and Neiman Marcus. The U.S. Congress, state agencies, retailers and consumer advocacy groups are now locked in a larger debate about data security and consumers' right to know when their data may be at risk — and if a national notification standard makes sense, according to the Associated Press.
10 March 2014  — 1 min read
Acronis
10 March 2014  — 1 min read
Why BYOD Isn’t to Blame for Compromised Data
The rise of mobile technologies has undoubtedly complicated IT. But despite the benefits, including lower costs and increased employee productivity, there's lingering suspicion among IT pros about whether these technologies, and what trends like BYOD leave in their wake, put sensitive company data at risk. The anxiety is understandable — data protection, after all, is top of mind for IT managers — but that anxiety is often misplaced.
07 March 2014  — 3 min read
Acronis
07 March 2014  — 3 min read
The Lingering Shadow IT Menace & New Generation Data Protection: Weekly Roundup
Data production is growing at an exponential rate, a trend that's challenging IT departments large and small to protect the loads of additional bits and bytes under their care. But the more things change, the more they seem to stay the same. From new data center technologies to the next battle royale in IT, here's a look at the stories data-crazed IT pros need to know from the web this week:
05 March 2014  — 1 min read
Acronis
05 March 2014  — 1 min read
Are You Showing Your Age? 3 Ways IT Pros Can Stay Hip To New Trends
Does the old adage, "You can't teach an old dog new tricks," ring true in today's increasingly digital workplace? Not necessarily, especially in the IT industry where skills, not age, matter most. That according to Rick Gillis, a consultant and career search expert, who tells CIO that, "Most IT firms want to know one of two things: Can you make them money or can you save them money? Then they'll want to hire you, regardless of your age."
04 March 2014  — 1 min read
Acronis
04 March 2014  — 1 min read
Introducing Acronis Access: Easy and Intuitive Enterprise-Level Mobile File Access, Syncing and Sharing
Today, we’re excited to unveil Acronis Access, the industry’s first comprehensive solution to help employees work and collaborate from anywhere — without sacrificing security or control. We built Acronis Access with enterprise IT departments in mind by combining mobile content management (MCM) and controlled file sync and share. Now, IT departments can enable their employees to work and collaborate the way they want — remotely, across any device…
03 March 2014  — 3 min read
Acronis
03 March 2014  — 3 min read
Mobility Cheat Sheet: From COIT to MDM, The Acronyms You Need to Know
Every job has a language all (or at least partly) its own. IT pros, however, must be multilingual to understand the slew of acronyms of all types, from data backup and protection to virtualization and mobility. The mobile workplace and BYOD trend — or, as some call it, COPE or BYOA — produces new acronyms every day, it seems. Confused already? Don't fret. Here's a cheat sheet of all the enterprise mobility acronyms you need to know:
28 February 2014  — 2 min read
Acronis
28 February 2014  — 2 min read
The Mobile World Congress Trends IT Needs to Know & Rogue Cloud Apps vs. IT: Weekly Roundup
Mobility experts from around the globe gathered in Barcelona this week for Mobile World Congress, the annual confab to showcase the latest in mobile gadgetry. Flashy consumer devices always get the headlines, you shouldn't be surprised by the other buzz this year: enterprise mobility and the blurred lines between our working and personal lives. Here's a look at what the conference revealed for the future of mobile tech in the workplace, and other stories IT…
26 February 2014  — 2 min read
Acronis
26 February 2014  — 2 min read
Behind the Music: How One Band Protects its Demos, Data and Livelihoods
Data backup and protection is typically seen as a must for businesses, but they aren't the only ones that have a lot to lose when it comes to data. Musicians, videographers, photographers and other professionals depend on data protection to keep their passions (and careers) running smoothly.
25 February 2014  — 2 min read
Acronis
25 February 2014  — 2 min read
IT Pros: To Protect Against 'Bit Rot,' Ask Cloud Vendors the Right Questions
Decay is a fact of life that applies to digital bits and bytes, as well as those leftovers in the shared company kitchen. When it comes to data, that decay, or "bit rot," can threaten the piles of business-critical information that IT departments increasingly trust cloud vendors to manage, store and protect. How can IT pros determine whether their cloud vendors will adequately protect data? It starts by asking the right questions.
24 February 2014  — 1 min read
Acronis
24 February 2014  — 1 min read
Introducing Acronis AnyData: Data Protection for Any Data, Any Environment, Any Location
Today, we are excited to unveil Acronis AnyData, a next generation data protection technology. Developed over the past 10 years, AnyData offers easy, complete and safe backup, disaster recovery and secure access capabilities across any and all environments and locations.
21 February 2014  — 2 min read
Acronis
21 February 2014  — 2 min read
Wearables in the Workplace, SMBs Embrace BYOD & People-Centric IT: Weekly Roundup
There's never a dull day in the IT world: Just as IT pros get used to BYOD, so-called wearable technologies enter the picture. What's the best way to handle the data storage and security implications of wearables? Here's a look at that question — and other looming IT challenges — from around the web this week:
1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
91 92 93 94 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
108
Engage with Acronis

Tips, news and promo offers

Loading

© 2003–2025 Acronis International GmbH.
  • Legal information
  • Privacy policy
  • Cookie Notice
  • Notice of collection
  • Choose region and language
    Americas
    • Brasil Português
    • Mexico Español
    • United States + Canada English
    Asia-Pacific
    • Chinese Simplified 简体中文
    • Chinese Traditional 繁體中文
    • Japan 日本語
    • Korea 한국어
    • Singapore English
    • India हिन्दी
    Europe, Middle East and Africa
    • Bulgaria Български
    • Czech Čeština
    • Europe English
    • France Français
    • Germany + Switzerland Deutsch
    • Israel עברית
    • Italy Italiano
    • Poland Polski
    • Romania Română
    • Spain Español
    • Sweden Svenska
    • Türkiye Türkçe
    • United Kingdom English
    • Hungary Magyar
    • Netherlands Dutch
    • Americas
      • Brasil Português
      • Mexico Español
      • United States + Canada English
    • Asia-Pacific
      • Chinese Simplified 简体中文
      • Chinese Traditional 繁體中文
      • Japan 日本語
      • Korea 한국어
      • Singapore English
      • India हिन्दी
    • Europe, Middle East and Africa
      • Bulgaria Български
      • Czech Čeština
      • Europe English
      • France Français
      • Germany + Switzerland Deutsch
      • Israel עברית
      • Italy Italiano
      • Poland Polski
      • Romania Română
      • Spain Español
      • Sweden Svenska
      • Türkiye Türkçe
      • United Kingdom English
      • Hungary Magyar
      • Netherlands Dutch