Skip links

Blog

Category Archive Subtitle

CA Proposes $100 Million Cyber Boost for Community Colleges

Proposed Cybersecurity Funding for Community Colleges From large universities to small grade schools, educational institutions are all too often targets of cyberattacks and ransomware. The pandemic has left schools reallocating budgets to support a mobile workforce and eLearning, leaving little cybersecurity and IT personnel funding.

Defining SCS – There’s More to Our Name Than an Acronym

Acronis SCS. The “SCS” in our company’s name is there for a reason and stands for Sensitive Customer Solutions. So what constitutes a sensitive customer? That’s simple. It’s the US public sector with over 90,000 agencies totaling millions of vulnerable endpoints. From state agencies to

Defining Secure Software Development

Defining Secure Software Development Acronis SCS Cyber Backup 12.5 Hardened Edition From power grids and advanced weapons systems to the telework-enabling apps that have kept us connected, software sits at the heart of nearly everything that keeps America running. But it does not come without

Women’s History Month

Confidence = Empowerment How would you answer this question – “How have you built confidence throughout your career/life?”  For Women’s History Month, we posed this question to several women at Acronis SCS. We kicked off the series on March 8th in honor of International Women’s

Acronis SCS Cyber Protect Cloud Product Announcement

Providing for the Unique Cybersecurity Needs of the US Public Sector  US citizens rely on the public sector, including state and local governments, the criminal justice system, educational institutions, healthcare entities, and nonprofits, to provide essential services. The crucial roles performed by public sector entities

Acronis SCS Cyber Protect Cloud Launch

Certified Cloud Backup & Security Provides MSPs a Superior Offering for US Public Sector Clients  Cybersecurity is a significant concern for the over 90,000 public sector agencies totaling millions of endpoints. Legacy IT systems, lack of network visibility, budget and IT staffing constraints, and access