Blog Cyber Security

04.22.2022 11:58 am

The most common reasons for losing data: there are many ways to doom

Using widespread surveys, Acronis regularly records how individuals and companies handle their digital data. The picture they paint is not particularly rosy; neglecting data backups tends to be the rule rather than the exception for both user groups. In the most recent survey fully 68% of private users admitted that they have lost data due […]

Show Post ›
04.20.2022 08:30 am

Menacing Crash Landing Instead of Soaring Career Opportunity

Above-average salaries, varied tasks, and excellent career opportunities make Lockheed Martin Corporation one of the most attractive employers in the United States. So, if a job offer from the sought-after employer lands in someone’s personal inbox, only a few of those chosen to receive the email would refrain from taking a look at it. This […]

Show Post ›
04.11.2022 11:30 am

Acronis stops all activities in Russia

Alongside most of humanity we at Acronis are also outraged and deeply concerned by the Russian attack on Ukraine. We support the people in this country fighting for its freedom and call for peace to return to the region. At the same time we have joined the sanctions that have been imposed and are stopping […]

Show Post ›
04.07.2022 10:37 am

On the differences between toasters and mass storage – some backup issues

Mass storage and toasters have one thing in common: they break down occasionally. But if such an issue befalls your toaster it at worst results in a less tasty breakfast, but the consequences of a hard drive or SSD crash can be incomparably more dramatic. In the very worst case scenario irreplaceable data is lost […]

Show Post ›
01.18.2022 09:02 am

Acronis Cyber Threats Report, Part 3: Chronology of an Attack

Abstract data and figures can illustrate the magnitude of the threat posed by cyber attacks. However, examining a specific case in detail really brings home exactly what’s at stake during a cyber attack and which precise steps can be taken to minimise the damage. In the following example, taken from the Acronis Cyber Threats Report, […]

Show Post ›
01.18.2022 08:58 am

Acronis Cyber Threats Report, Part 2: Social Engineering – People as a Vulnerability

According to the Cyber Threats Report, social engineering was one of the most commonly used attack vectors in the first half of this year. Before examining some of the most significant examples and the techniques used in these cases, let’s take a look at the term “social engineering” itself. The concept of social engineering was […]

Show Post ›
11.29.2021 01:22 pm

Numbers and facts from the Acronis Cyber Threats Report 1st six months 2021

In order to effectively protect the sensitive data of companies and end users from cyber attacks, continuous observation of and research on the global threat is of essential importance. With the aid of such a global radar screen, the strategies and tactics of new and known cyber-criminals, their attack targets and vectors as well as […]

Show Post ›
11.29.2021 11:42 am

How Acronis Cyber Protection would have prevented the MediaMarkt incident

A few days ago, we posted about the unfortunate incident of the successful ransomware attack on Europe’s largest consumer electronics retailer, the MediaMarktSaturn Retail Group. Although the company has its own Security Operations Centre (SOC) and only introduced its new security strategy in 2015, implementing over 30 specific measures for improving security and minimising risks, […]

Show Post ›
11.23.2021 09:51 am

Almost forgotten but yet back again

In January this year, there was a notification of success that caused numerous companies, public authorities and hospitals to relax a little. The latter two of these institutions were then the focus of attention for malware, that according to the Federal Criminal Police Office (BKA) and Attorney General could have cooked their goose: Emotet. The […]

Show Post ›
11.17.2021 10:22 am

The latest example of why effective cyber protection is indispensable

In a recent blog post, we wrote that a backup solution alone is not enough to guarantee effective protection against the ever-growing risk of ransomware attacks. Not only can the period of downtime until the affected data and systems are fully restored still be extremely costly, but it is also impossible to eliminate the risk […]

Show Post ›