Skip links

Tag: anti-ransomware

Cupid Chip Blog Featured Image Acronis SCS

CyberFit Cupid’s Top Tips to #LoveYourData

Got love on the brain? Let CyberFit Chip’s February alter ego, CyberFit Cupid, guide your googly eyes toward a new valentine – your organization’s data! With data breaches climbing 33 percent last year and ransomware targeting state and local government at record levels, this underappreciated
Acronis SCS Holiday Party Group Shot

The Year in Review: 2019 Highlights

Looking Inward Instilling Core Values As we usher in a new decade – along with all the excitement and growth that will undoubtedly come with it – there’s no better time for reflection. And 2019 has been quite the year for Acronis SCS. When 2019
Blog Banner Vault for Security

Newly Launched Software Changes the Backup & Disaster Recovery Game

Purpose Built for Air Gapped Environments In the backup and recovery software market, there is a troubling gap for US public sector customers  operating in ‘no internet’ environments, including Department of Defense weapons testing sites, development labs / centers, training simulators, deployed tactical elements and
Blog Banner Government Business Woman Acronis SCS

National Security Demands Stronger Cybersecurity

A Thanksgiving State-of-Mind As families across America prepare to gather around the dinner table and nurse some turkey and pumpkin pie-induced food comas in the coming days, our country has much to appreciate. This time of year provides a welcome opportunity to remember the unique
Blog Banner Military In Theater Technology Acronis SCS

The DoDIN APL Certification: A Labor of Love

As the Department of Defense (DoD) and other US federal agencies seek to better protect themselves from pervasive and growing cyber threats, how can they maintain a security-oriented mindset when sourcing commercial off the shelf (COTS) products from outside vendors for use on sensitive networks?
Open Source Backdoors in the Wild Blog Banner Acronis SCS

Open Source Backdoors in the Wild

Open Source Backdoors in the Wild Malicious actors will take advantage of any opportunity to exploit an attack vector for money, personal gain, or fun. For years, hackers have used supply chains to deploy backdoors because trusted software provides a relatively easy entry point. This

Trick or Treat Yo’self to Our Top 5 Cyberfit Tips

As you get your costumes and candy ready for Halloween, here’s another fun October fact – it’s National Cybersecurity Awareness Month! To help celebrate, Cyberfit Chip’s alter ego, Count Chipula, has turned to the good side this month, so he can offer up key tips to help
Blog Banner Suspended Blocks

99 Problems but Backup Firewall Ports Aren’t One

How do I love thee network engineer, let me count the ports. 3, that’s right just 3 ports (okay, maybe 5 if you want automated agent installs) you will need to open on your firewalls to get fantastic, fully functional data protection for your entire