More is less in cybersecurity

Issue 2 2021 Information Security

The findings from Acronis’ annual survey, which polled 4400 IT users and professionals in 22 countries across six continents, dispel the myth that simply adding more solutions will solve cybersecurity and data protection challenges.

Not only does investing in more solutions not deliver more protection, in many cases, trying to manage protection across multiple solutions creates greater complexity and less visibility for the IT team, which increases risk, Acronis said.

Acronis said the survey uncovered a disconnect between the need for organisations to keep their data protected and the ineffective investments they’ve made trying to reach that goal.

While 2020 saw companies purchase new systems to enable and secure remote workers during the COVID-19 pandemic, those investments are not paying off. The global survey discovered that 80% of companies now run as many as 10 solutions simultaneously for their data protection and cybersecurity needs, yet more than half of those organisations suffered unexpected downtime last year because of data loss.

“This year’s Cyber Protection Week survey illustrates that more solutions do not deliver greater protection, as using separate tools to address individual types of exposure is complicated, inefficient, and costly,” said Serguei Beloussov, founder and CEO of Acronis. “These findings confirm our belief that the smarter approach is cyber protection, which unifies data protection, cybersecurity and endpoint management in one.”

Knowledge gap contributes to IT challenges

Complicating matters, the significant gap in awareness among users and IT pros of what IT and cybersecurity capabilities are available to them can cause them to lose valuable time, money and security.

68% of IT users and 20% of IT professionals would not know if their data had been modified without their knowledge because their solution makes determining that kind of tampering difficult.

• 43% of IT users don’t know if their anti-malware stops zero-day threats because their solution doesn’t make that information easily available. Having easy access to such cybersecurity insights is critical to ensuring data is protected.

10% of IT professionals don’t know if their organisation is subject to data privacy regulations. If those responsible for ensuring data privacy don’t know, they cannot implement strategies or evaluate the solutions needed to address the requirements. That ignorance puts the business at tremendous risk of major fines for potential compliance violations in 2021.

For anyone using multiple solutions to solve their IT and cybersecurity needs, the lack of transparency into such information only gets worse. Not only must they remember which solution provides a particular data point, they are constantly switching between consoles to find the details they need, leading to inefficiencies and missed insights.

Individuals’ lax approach to protection

The survey also revealed a lax approach to data protection among IT users.

83% of IT users spent more time on their devices last year, yet only half of them took extra steps to protect those devices

• 33% admit to not updating their devices until at least a week after being notified of a patch.

• 90% of IT users reported performing backups, yet 73% have irretrievably lost data at least once, suggesting that they don’t know how to back up or recover properly.

The efforts of individuals to protect their data aren’t keeping pace with threats, which is likely due to false assumptions (such as believing Microsoft 365 backs up their data) or a reliance on automatic solutions.

Solving the knowledge gap organisations face

Acronis said it has long recognised the cost, efficiency and security challenges that arise from using multiple solutions, which is why the company pioneered the field of cyber protection, integrating cutting-edge cybersecurity, best-of-breed backup and endpoint management in a single solution.

To ensure service providers can build their cyber protection service easily, efficiently, securely and profitably, Acronis is introducing a new licencing model for Acronis Cyber Protect Cloud, the company’s unified service provider solution.

With this new licensing, a set of essential cyber protection capabilities (backup, cybersecurity, and management) is included at no cost or on a pay-as-you-go basis, enabling managed service providers (MSPs) to build services at little to no upfront expense, ensuring 100% coverage of clients' workloads with cyber protection. Additional protection packs of Advanced Backup, Advanced Security, Advanced Disaster Recovery and Advanced Management give MSPs the flexibility to further expand their services based on client needs, delivering optimum levels of cyber protection for every workload.

Installed with one agent and managed through one console, the centralised management of Acronis Cyber Protect Cloud ensures MSPs can fully protect their clients without having to juggle multiple solutions. A single pane of glass provides the visibility and control needed to deliver comprehensive cyber protection – from creating local and cloud-based backups to stopping zero-day malware attacks with advanced AI-based anti-malware and antivirus defences that are VB100 certified.

Businesses can gain the same unified capabilities with the company’s on-premises solution, Acronis Cyber Protect 15.

Individual IT users can gain the same integrated cyber protection as MSPs and IT professionals with Acronis True Image 2021, the first personal cyber protection solution that unites AI-enhanced anti-malware and backup in one.

Action items for cyber protection

Acronis said the challenges of protecting and securing data, applications, and systems will continue to grow in the post-pandemic world. To ensure that data is protected, Acronis recommends five simple steps:

Create backups of important data. Keep multiple copies of your backups, with one local copy for fast recovery and one off-site in the cloud to guarantee recovery if disaster destroys on-site copies.

Update operating systems and applications. Outdated systems and apps lack the security fixes that stop cybercriminals from gaining access. Regular patching is required to avoid exploits.

Avoid suspicious emails, links and attachments. Most malware infections are the result of social engineering techniques that trick unsuspecting individuals into opening infected email attachments or clicking on links to websites that host malware.

Install antivirus, anti-malware, and anti-ransomware software while enabling automatic updates so the system is protected against malware.

• Consider adopting a single cyber protection solution to have the central management and integrated protection needed to meet today’s IT requirements.

Find out more at www.acronis.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The year of the agent
Information Security AI & Data Analytics
The dominant attack patterns in Q4 2025 included system-prompt extraction attempts, subtle content-safety bypasses, and exploratory probing. Indirect attacks required fewer attempts than direct injections, making untrusted external sources a primary risk vector heading into 2026.

Read more...
AI cybersecurity predictions for 2026
AI & Data Analytics Information Security
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors.

Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
Securing the smart fleet
Information Security Transport (Industry) Logistics (Industry) IoT & Automation
Contributing around 10 to 12% of South Africa’s GDP, the transport and logistics sector supports almost every part of the country’s economic activity. The stakes for keeping these systems secure are higher than ever before.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.