Blog Acronis je zaměřený na témata kybernetické ochrany, zálohování dat, obnovu systémů a moderní trendy v oblasti IT bezpečnosti. Obsah tvoří články o hrozbách, zranitelnostech, nových technologiích a praktických doporučeních pro firmy i jednotlivce.
Synology and Acronis announced a joint collaboration to enhance customer data security. All Synology BeeDrive, BeeStation, and BeeStation Plus product lines now include a three-year license to Acronis True Image Essentials for one computer*. This partnership enables users to perform full-system computer backups while maintaining complete ownership and control of their data through local storage.
Acronis once again received recognition from Info-Tech SoftwareReviews, this time in the form of an Emotional Footprint Award for extended detection and response (EDR). The latest accolade highlights Acronis’ growing leadership in cybersecurity and its dedication to delivering solutions that managed service providers (MSPs) love.
Manufacturers need a backup and recovery solution that works seamlessly with the SCADA, HMI and IIoT systems that control production environments. And they need one they know they can trust. The recent validation of Acronis as an Inductive Automation technology partner within the Ignition Technology Ecosystem Program confirms that Acronis meets the technical requirements OT environments demand.
Explore the critical differences between Endpoint Detection and Response (EDR) and Managed Detection and Response (MDR). Gain insight to help you make an informed decision on the right cybersecurity solution for your needs.
Dharma ransomware (a.k.a. CrySiS) is used in targeted attacks, and is delivered by cybercriminals manually through Remote Desktop Protocol (RDP) connections, typically by exploiting leaked or weak credentials.
Here's what many businesses don't realize, but managed service providers (MSPs) should know: Microsoft protects its infrastructure, but you must protect your data. IDC found that 60% of business data is stored in email, with much of it not found anywhere else. Protecting your data also involves maintaining identity security, access controls and configuration management.
The importance of cyber resilience is very real and growing due to an accelerating threat landscape for manufacturers that shows no signs of slowing down. The SANS Institute’s 2025 State of ICS/OT Cybersecurity Survey reveals troubling trends that should reshape how manufacturers think about operational security.
Looking for the best patch management software? Read our 2026 guide comparing the top automated patching tools for Windows, macOS, and Linux for MSPs and enterprises.
Endpoint detection and response (EDR) solutions have become the cornerstone of modern cybersecurity strategies. As organizations navigate the complexities of remote work, hybrid cloud infrastructures and increasingly sophisticated cyber threats, choosing the right EDR solution is more critical than ever.
The cybersecurity industry faces a paradox that threatens national security: Artificial intelligence promises to bridge a critical workforce shortage, but it might simultaneously deepen the very crisis it has the potential to solve.
Learn how to detect and prevent ransomware attacks using endpoint protection software in this comprehensive article, which covers understanding ransomware, implementing effective protection measures, recognizing attack signs, incident response, and advanced security practices for mitigating risks.
Spain's flag carrier Iberia Airlines disclosed a significant data security incident in November 2025 that should put all customers on high alert. The breach, which occurred through a compromised third-party supplier, has exposed personal information and created new risks for travelers who have flown with the airline.
Spyware can be a user’s nemesis. Once a user’s device is infected, spyware can collect a variety of personal and sensitive information, depending on the type of spyware. Here is what you need to know about spyware and how to detect it.
Harvard University, Princeton University and the University of Pennsylvania have all disclosed data breaches that compromised sensitive information about alumni, donors, students and faculty members. The incidents underscore a growing threat: Elite educational institutions have become prime targets for cybercriminals seeking access to valuable personal and financial data.
Following the Jaguar-Land Rover disaster, another cyberattack has shaken a major industry. The danger of attacks on the supply chain has never been clearer. The issue now revolves around what organizations can do to protect themselves and their supply chain partners.