More is less in cybersecurity

Issue 2 2021 Information Security

The findings from Acronis’ annual survey, which polled 4400 IT users and professionals in 22 countries across six continents, dispel the myth that simply adding more solutions will solve cybersecurity and data protection challenges.

Not only does investing in more solutions not deliver more protection, in many cases, trying to manage protection across multiple solutions creates greater complexity and less visibility for the IT team, which increases risk, Acronis said.

Acronis said the survey uncovered a disconnect between the need for organisations to keep their data protected and the ineffective investments they’ve made trying to reach that goal.

While 2020 saw companies purchase new systems to enable and secure remote workers during the COVID-19 pandemic, those investments are not paying off. The global survey discovered that 80% of companies now run as many as 10 solutions simultaneously for their data protection and cybersecurity needs, yet more than half of those organisations suffered unexpected downtime last year because of data loss.

“This year’s Cyber Protection Week survey illustrates that more solutions do not deliver greater protection, as using separate tools to address individual types of exposure is complicated, inefficient, and costly,” said Serguei Beloussov, founder and CEO of Acronis. “These findings confirm our belief that the smarter approach is cyber protection, which unifies data protection, cybersecurity and endpoint management in one.”

Knowledge gap contributes to IT challenges

Complicating matters, the significant gap in awareness among users and IT pros of what IT and cybersecurity capabilities are available to them can cause them to lose valuable time, money and security.

68% of IT users and 20% of IT professionals would not know if their data had been modified without their knowledge because their solution makes determining that kind of tampering difficult.

• 43% of IT users don’t know if their anti-malware stops zero-day threats because their solution doesn’t make that information easily available. Having easy access to such cybersecurity insights is critical to ensuring data is protected.

10% of IT professionals don’t know if their organisation is subject to data privacy regulations. If those responsible for ensuring data privacy don’t know, they cannot implement strategies or evaluate the solutions needed to address the requirements. That ignorance puts the business at tremendous risk of major fines for potential compliance violations in 2021.

For anyone using multiple solutions to solve their IT and cybersecurity needs, the lack of transparency into such information only gets worse. Not only must they remember which solution provides a particular data point, they are constantly switching between consoles to find the details they need, leading to inefficiencies and missed insights.

Individuals’ lax approach to protection

The survey also revealed a lax approach to data protection among IT users.

83% of IT users spent more time on their devices last year, yet only half of them took extra steps to protect those devices

• 33% admit to not updating their devices until at least a week after being notified of a patch.

• 90% of IT users reported performing backups, yet 73% have irretrievably lost data at least once, suggesting that they don’t know how to back up or recover properly.

The efforts of individuals to protect their data aren’t keeping pace with threats, which is likely due to false assumptions (such as believing Microsoft 365 backs up their data) or a reliance on automatic solutions.

Solving the knowledge gap organisations face

Acronis said it has long recognised the cost, efficiency and security challenges that arise from using multiple solutions, which is why the company pioneered the field of cyber protection, integrating cutting-edge cybersecurity, best-of-breed backup and endpoint management in a single solution.

To ensure service providers can build their cyber protection service easily, efficiently, securely and profitably, Acronis is introducing a new licencing model for Acronis Cyber Protect Cloud, the company’s unified service provider solution.

With this new licensing, a set of essential cyber protection capabilities (backup, cybersecurity, and management) is included at no cost or on a pay-as-you-go basis, enabling managed service providers (MSPs) to build services at little to no upfront expense, ensuring 100% coverage of clients' workloads with cyber protection. Additional protection packs of Advanced Backup, Advanced Security, Advanced Disaster Recovery and Advanced Management give MSPs the flexibility to further expand their services based on client needs, delivering optimum levels of cyber protection for every workload.

Installed with one agent and managed through one console, the centralised management of Acronis Cyber Protect Cloud ensures MSPs can fully protect their clients without having to juggle multiple solutions. A single pane of glass provides the visibility and control needed to deliver comprehensive cyber protection – from creating local and cloud-based backups to stopping zero-day malware attacks with advanced AI-based anti-malware and antivirus defences that are VB100 certified.

Businesses can gain the same unified capabilities with the company’s on-premises solution, Acronis Cyber Protect 15.

Individual IT users can gain the same integrated cyber protection as MSPs and IT professionals with Acronis True Image 2021, the first personal cyber protection solution that unites AI-enhanced anti-malware and backup in one.

Action items for cyber protection

Acronis said the challenges of protecting and securing data, applications, and systems will continue to grow in the post-pandemic world. To ensure that data is protected, Acronis recommends five simple steps:

Create backups of important data. Keep multiple copies of your backups, with one local copy for fast recovery and one off-site in the cloud to guarantee recovery if disaster destroys on-site copies.

Update operating systems and applications. Outdated systems and apps lack the security fixes that stop cybercriminals from gaining access. Regular patching is required to avoid exploits.

Avoid suspicious emails, links and attachments. Most malware infections are the result of social engineering techniques that trick unsuspecting individuals into opening infected email attachments or clicking on links to websites that host malware.

Install antivirus, anti-malware, and anti-ransomware software while enabling automatic updates so the system is protected against malware.

• Consider adopting a single cyber protection solution to have the central management and integrated protection needed to meet today’s IT requirements.

Find out more at www.acronis.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Stronger cloud protection
Information Security Products & Solutions
Kaspersky has announced the release of an enhanced version of its Kaspersky Cloud Workload Security, delivering advanced protection for hybrid and multi-cloud environments.

Read more...
AttackIQ enters South Africa with key appointment
Information Security News & Events
AttackIQ, a provider of continuous security validation and exposure management, has announced its entry into the South African market with the appointment of Luke Cifarelli as its country manager.

Read more...
Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...
Credential theft surges in South Africa
Information Security
NEC XON issues a critical cybersecurity warning about the dual threat of massive credential theft and AI-powered cyberattacks sweeping across the region, with an increasing number of incidents and evolving threat tactics.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.