More is less in cybersecurity

Issue 2 2021 Cyber Security

The findings from Acronis’ annual survey, which polled 4400 IT users and professionals in 22 countries across six continents, dispel the myth that simply adding more solutions will solve cybersecurity and data protection challenges.

Not only does investing in more solutions not deliver more protection, in many cases, trying to manage protection across multiple solutions creates greater complexity and less visibility for the IT team, which increases risk, Acronis said.

Acronis said the survey uncovered a disconnect between the need for organisations to keep their data protected and the ineffective investments they’ve made trying to reach that goal.

While 2020 saw companies purchase new systems to enable and secure remote workers during the COVID-19 pandemic, those investments are not paying off. The global survey discovered that 80% of companies now run as many as 10 solutions simultaneously for their data protection and cybersecurity needs, yet more than half of those organisations suffered unexpected downtime last year because of data loss.

“This year’s Cyber Protection Week survey illustrates that more solutions do not deliver greater protection, as using separate tools to address individual types of exposure is complicated, inefficient, and costly,” said Serguei Beloussov, founder and CEO of Acronis. “These findings confirm our belief that the smarter approach is cyber protection, which unifies data protection, cybersecurity and endpoint management in one.”

Knowledge gap contributes to IT challenges

Complicating matters, the significant gap in awareness among users and IT pros of what IT and cybersecurity capabilities are available to them can cause them to lose valuable time, money and security.

68% of IT users and 20% of IT professionals would not know if their data had been modified without their knowledge because their solution makes determining that kind of tampering difficult.

• 43% of IT users don’t know if their anti-malware stops zero-day threats because their solution doesn’t make that information easily available. Having easy access to such cybersecurity insights is critical to ensuring data is protected.

10% of IT professionals don’t know if their organisation is subject to data privacy regulations. If those responsible for ensuring data privacy don’t know, they cannot implement strategies or evaluate the solutions needed to address the requirements. That ignorance puts the business at tremendous risk of major fines for potential compliance violations in 2021.

For anyone using multiple solutions to solve their IT and cybersecurity needs, the lack of transparency into such information only gets worse. Not only must they remember which solution provides a particular data point, they are constantly switching between consoles to find the details they need, leading to inefficiencies and missed insights.

Individuals’ lax approach to protection

The survey also revealed a lax approach to data protection among IT users.

83% of IT users spent more time on their devices last year, yet only half of them took extra steps to protect those devices

• 33% admit to not updating their devices until at least a week after being notified of a patch.

• 90% of IT users reported performing backups, yet 73% have irretrievably lost data at least once, suggesting that they don’t know how to back up or recover properly.

The efforts of individuals to protect their data aren’t keeping pace with threats, which is likely due to false assumptions (such as believing Microsoft 365 backs up their data) or a reliance on automatic solutions.

Solving the knowledge gap organisations face

Acronis said it has long recognised the cost, efficiency and security challenges that arise from using multiple solutions, which is why the company pioneered the field of cyber protection, integrating cutting-edge cybersecurity, best-of-breed backup and endpoint management in a single solution.

To ensure service providers can build their cyber protection service easily, efficiently, securely and profitably, Acronis is introducing a new licencing model for Acronis Cyber Protect Cloud, the company’s unified service provider solution.

With this new licensing, a set of essential cyber protection capabilities (backup, cybersecurity, and management) is included at no cost or on a pay-as-you-go basis, enabling managed service providers (MSPs) to build services at little to no upfront expense, ensuring 100% coverage of clients' workloads with cyber protection. Additional protection packs of Advanced Backup, Advanced Security, Advanced Disaster Recovery and Advanced Management give MSPs the flexibility to further expand their services based on client needs, delivering optimum levels of cyber protection for every workload.

Installed with one agent and managed through one console, the centralised management of Acronis Cyber Protect Cloud ensures MSPs can fully protect their clients without having to juggle multiple solutions. A single pane of glass provides the visibility and control needed to deliver comprehensive cyber protection – from creating local and cloud-based backups to stopping zero-day malware attacks with advanced AI-based anti-malware and antivirus defences that are VB100 certified.

Businesses can gain the same unified capabilities with the company’s on-premises solution, Acronis Cyber Protect 15.

Individual IT users can gain the same integrated cyber protection as MSPs and IT professionals with Acronis True Image 2021, the first personal cyber protection solution that unites AI-enhanced anti-malware and backup in one.

Action items for cyber protection

Acronis said the challenges of protecting and securing data, applications, and systems will continue to grow in the post-pandemic world. To ensure that data is protected, Acronis recommends five simple steps:

Create backups of important data. Keep multiple copies of your backups, with one local copy for fast recovery and one off-site in the cloud to guarantee recovery if disaster destroys on-site copies.

Update operating systems and applications. Outdated systems and apps lack the security fixes that stop cybercriminals from gaining access. Regular patching is required to avoid exploits.

Avoid suspicious emails, links and attachments. Most malware infections are the result of social engineering techniques that trick unsuspecting individuals into opening infected email attachments or clicking on links to websites that host malware.

Install antivirus, anti-malware, and anti-ransomware software while enabling automatic updates so the system is protected against malware.

• Consider adopting a single cyber protection solution to have the central management and integrated protection needed to meet today’s IT requirements.

Find out more at www.acronis.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Cyber resilience is more than cybersecurity
Technews Publishing Cyber Security Integrated Solutions IT infrastructure
Hi-Tech Security Solutions held a round-table discussion focusing on cyber resilience and found that while the resilience discipline includes cybersecurity, it also goes much further.

Read more...
Defining the resilience of cybersecurity
Cyber Security Security Services & Risk Management
Cyber resilience is less buzzword and more critical business strategy as the cybercrime landscape grows in intent and intensity.

Read more...
How to stay cybersafe on business trips
Cyber Security
No matter where you are in the world, tech-savvy criminals are looking for ways to exploit email addresses, social media profiles, passwords, financial data and stored files.

Read more...
The challenge of data safety and availability
Technews Publishing Editor's Choice Cyber Security
Veeam offers backup and recovery software that presents the user with one interface to manage backups to and from almost any platform.

Read more...
How safe are your backups?
Technews Publishing Cyber Security
Immutable backups prevent malware from compromising your data and ensure the right data is restored in an emergency when following a four-step backup process.

Read more...
Growing cyber resilience portfolio
Technews Publishing Cyber Security
Hi-Tech Security Solutions spoke to Richard Frost, who heads up Armata, to find out what the company offers in terms of cyber resilience.

Read more...
Adopting a cyber-secure mindset
Security Services & Risk Management Cyber Security
Adopting a cybersecure mindset is the key to mitigating the risk of falling victim to the growing cybercrime pandemic.

Read more...
Advanced technologies to curb corruption
News Cyber Security IT infrastructure
The use of advanced technology to curb fraud, corruption and cyber-related crimes received a massive boost as the Council for Scientific and Industrial Research (CSIR) and Special Investigation Unit (SIU) agreed to work together.

Read more...
Reversing the hidden risk of permission creep
Cyber Security
Employees can collect a range of access rights to business systems throughout their tenure. It's a phenomenon called 'permission creep': one of the biggest cybersecurity risks for organisations today.

Read more...
Mitigating the risk of zero-day attacks against Microsoft 365
J2 Software Cyber Security
Microsoft 365 servers contain extremely sensitive information and most organisations simply cannot do without it for an extended period of time.

Read more...