More is less in cybersecurity

Issue 2 2021 Information Security

The findings from Acronis’ annual survey, which polled 4400 IT users and professionals in 22 countries across six continents, dispel the myth that simply adding more solutions will solve cybersecurity and data protection challenges.

Not only does investing in more solutions not deliver more protection, in many cases, trying to manage protection across multiple solutions creates greater complexity and less visibility for the IT team, which increases risk, Acronis said.

Acronis said the survey uncovered a disconnect between the need for organisations to keep their data protected and the ineffective investments they’ve made trying to reach that goal.

While 2020 saw companies purchase new systems to enable and secure remote workers during the COVID-19 pandemic, those investments are not paying off. The global survey discovered that 80% of companies now run as many as 10 solutions simultaneously for their data protection and cybersecurity needs, yet more than half of those organisations suffered unexpected downtime last year because of data loss.

“This year’s Cyber Protection Week survey illustrates that more solutions do not deliver greater protection, as using separate tools to address individual types of exposure is complicated, inefficient, and costly,” said Serguei Beloussov, founder and CEO of Acronis. “These findings confirm our belief that the smarter approach is cyber protection, which unifies data protection, cybersecurity and endpoint management in one.”

Knowledge gap contributes to IT challenges

Complicating matters, the significant gap in awareness among users and IT pros of what IT and cybersecurity capabilities are available to them can cause them to lose valuable time, money and security.

68% of IT users and 20% of IT professionals would not know if their data had been modified without their knowledge because their solution makes determining that kind of tampering difficult.

• 43% of IT users don’t know if their anti-malware stops zero-day threats because their solution doesn’t make that information easily available. Having easy access to such cybersecurity insights is critical to ensuring data is protected.

10% of IT professionals don’t know if their organisation is subject to data privacy regulations. If those responsible for ensuring data privacy don’t know, they cannot implement strategies or evaluate the solutions needed to address the requirements. That ignorance puts the business at tremendous risk of major fines for potential compliance violations in 2021.

For anyone using multiple solutions to solve their IT and cybersecurity needs, the lack of transparency into such information only gets worse. Not only must they remember which solution provides a particular data point, they are constantly switching between consoles to find the details they need, leading to inefficiencies and missed insights.

Individuals’ lax approach to protection

The survey also revealed a lax approach to data protection among IT users.

83% of IT users spent more time on their devices last year, yet only half of them took extra steps to protect those devices

• 33% admit to not updating their devices until at least a week after being notified of a patch.

• 90% of IT users reported performing backups, yet 73% have irretrievably lost data at least once, suggesting that they don’t know how to back up or recover properly.

The efforts of individuals to protect their data aren’t keeping pace with threats, which is likely due to false assumptions (such as believing Microsoft 365 backs up their data) or a reliance on automatic solutions.

Solving the knowledge gap organisations face

Acronis said it has long recognised the cost, efficiency and security challenges that arise from using multiple solutions, which is why the company pioneered the field of cyber protection, integrating cutting-edge cybersecurity, best-of-breed backup and endpoint management in a single solution.

To ensure service providers can build their cyber protection service easily, efficiently, securely and profitably, Acronis is introducing a new licencing model for Acronis Cyber Protect Cloud, the company’s unified service provider solution.

With this new licensing, a set of essential cyber protection capabilities (backup, cybersecurity, and management) is included at no cost or on a pay-as-you-go basis, enabling managed service providers (MSPs) to build services at little to no upfront expense, ensuring 100% coverage of clients' workloads with cyber protection. Additional protection packs of Advanced Backup, Advanced Security, Advanced Disaster Recovery and Advanced Management give MSPs the flexibility to further expand their services based on client needs, delivering optimum levels of cyber protection for every workload.

Installed with one agent and managed through one console, the centralised management of Acronis Cyber Protect Cloud ensures MSPs can fully protect their clients without having to juggle multiple solutions. A single pane of glass provides the visibility and control needed to deliver comprehensive cyber protection – from creating local and cloud-based backups to stopping zero-day malware attacks with advanced AI-based anti-malware and antivirus defences that are VB100 certified.

Businesses can gain the same unified capabilities with the company’s on-premises solution, Acronis Cyber Protect 15.

Individual IT users can gain the same integrated cyber protection as MSPs and IT professionals with Acronis True Image 2021, the first personal cyber protection solution that unites AI-enhanced anti-malware and backup in one.

Action items for cyber protection

Acronis said the challenges of protecting and securing data, applications, and systems will continue to grow in the post-pandemic world. To ensure that data is protected, Acronis recommends five simple steps:

Create backups of important data. Keep multiple copies of your backups, with one local copy for fast recovery and one off-site in the cloud to guarantee recovery if disaster destroys on-site copies.

Update operating systems and applications. Outdated systems and apps lack the security fixes that stop cybercriminals from gaining access. Regular patching is required to avoid exploits.

Avoid suspicious emails, links and attachments. Most malware infections are the result of social engineering techniques that trick unsuspecting individuals into opening infected email attachments or clicking on links to websites that host malware.

Install antivirus, anti-malware, and anti-ransomware software while enabling automatic updates so the system is protected against malware.

• Consider adopting a single cyber protection solution to have the central management and integrated protection needed to meet today’s IT requirements.

Find out more at www.acronis.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security
Cyberattackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Multiple IoT devices targeted
Information Security Residential Estate (Industry)
Mirai remains one of the top threats to IoT in 2025 due to widespread exploitation of weak login credentials and unpatched vulnerabilities, enabling large-scale botnets for DDoS attacks, data theft and other malicious activities.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Sophos launches advisory services to deliver proactive cybersecurity resilience
Information Security News & Events
Sophos has launched a suite of penetration testing and application security services, designed to identify gaps in organisations’ security programs, which is informed by Sophos X-Ops Threat Intelligence and delivered by world-class experts.

Read more...
Kaspersky highlights biometric and signature risks
Information Security News & Events
AI has elevated phishing into a highly personalised threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Stronger cloud protection
Kaspersky Information Security Products & Solutions
Kaspersky has announced the release of an enhanced version of its Kaspersky Cloud Workload Security, delivering advanced protection for hybrid and multi-cloud environments.

Read more...
AttackIQ enters South Africa with key appointment
Information Security News & Events
AttackIQ, a provider of continuous security validation and exposure management, has announced its entry into the South African market with the appointment of Luke Cifarelli as its country manager.

Read more...
Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.