More is less in cybersecurity

Issue 2 2021 Information Security

The findings from Acronis’ annual survey, which polled 4400 IT users and professionals in 22 countries across six continents, dispel the myth that simply adding more solutions will solve cybersecurity and data protection challenges.

Not only does investing in more solutions not deliver more protection, in many cases, trying to manage protection across multiple solutions creates greater complexity and less visibility for the IT team, which increases risk, Acronis said.

Acronis said the survey uncovered a disconnect between the need for organisations to keep their data protected and the ineffective investments they’ve made trying to reach that goal.

While 2020 saw companies purchase new systems to enable and secure remote workers during the COVID-19 pandemic, those investments are not paying off. The global survey discovered that 80% of companies now run as many as 10 solutions simultaneously for their data protection and cybersecurity needs, yet more than half of those organisations suffered unexpected downtime last year because of data loss.

“This year’s Cyber Protection Week survey illustrates that more solutions do not deliver greater protection, as using separate tools to address individual types of exposure is complicated, inefficient, and costly,” said Serguei Beloussov, founder and CEO of Acronis. “These findings confirm our belief that the smarter approach is cyber protection, which unifies data protection, cybersecurity and endpoint management in one.”

Knowledge gap contributes to IT challenges

Complicating matters, the significant gap in awareness among users and IT pros of what IT and cybersecurity capabilities are available to them can cause them to lose valuable time, money and security.

68% of IT users and 20% of IT professionals would not know if their data had been modified without their knowledge because their solution makes determining that kind of tampering difficult.

• 43% of IT users don’t know if their anti-malware stops zero-day threats because their solution doesn’t make that information easily available. Having easy access to such cybersecurity insights is critical to ensuring data is protected.

10% of IT professionals don’t know if their organisation is subject to data privacy regulations. If those responsible for ensuring data privacy don’t know, they cannot implement strategies or evaluate the solutions needed to address the requirements. That ignorance puts the business at tremendous risk of major fines for potential compliance violations in 2021.

For anyone using multiple solutions to solve their IT and cybersecurity needs, the lack of transparency into such information only gets worse. Not only must they remember which solution provides a particular data point, they are constantly switching between consoles to find the details they need, leading to inefficiencies and missed insights.

Individuals’ lax approach to protection

The survey also revealed a lax approach to data protection among IT users.

83% of IT users spent more time on their devices last year, yet only half of them took extra steps to protect those devices

• 33% admit to not updating their devices until at least a week after being notified of a patch.

• 90% of IT users reported performing backups, yet 73% have irretrievably lost data at least once, suggesting that they don’t know how to back up or recover properly.

The efforts of individuals to protect their data aren’t keeping pace with threats, which is likely due to false assumptions (such as believing Microsoft 365 backs up their data) or a reliance on automatic solutions.

Solving the knowledge gap organisations face

Acronis said it has long recognised the cost, efficiency and security challenges that arise from using multiple solutions, which is why the company pioneered the field of cyber protection, integrating cutting-edge cybersecurity, best-of-breed backup and endpoint management in a single solution.

To ensure service providers can build their cyber protection service easily, efficiently, securely and profitably, Acronis is introducing a new licencing model for Acronis Cyber Protect Cloud, the company’s unified service provider solution.

With this new licensing, a set of essential cyber protection capabilities (backup, cybersecurity, and management) is included at no cost or on a pay-as-you-go basis, enabling managed service providers (MSPs) to build services at little to no upfront expense, ensuring 100% coverage of clients' workloads with cyber protection. Additional protection packs of Advanced Backup, Advanced Security, Advanced Disaster Recovery and Advanced Management give MSPs the flexibility to further expand their services based on client needs, delivering optimum levels of cyber protection for every workload.

Installed with one agent and managed through one console, the centralised management of Acronis Cyber Protect Cloud ensures MSPs can fully protect their clients without having to juggle multiple solutions. A single pane of glass provides the visibility and control needed to deliver comprehensive cyber protection – from creating local and cloud-based backups to stopping zero-day malware attacks with advanced AI-based anti-malware and antivirus defences that are VB100 certified.

Businesses can gain the same unified capabilities with the company’s on-premises solution, Acronis Cyber Protect 15.

Individual IT users can gain the same integrated cyber protection as MSPs and IT professionals with Acronis True Image 2021, the first personal cyber protection solution that unites AI-enhanced anti-malware and backup in one.

Action items for cyber protection

Acronis said the challenges of protecting and securing data, applications, and systems will continue to grow in the post-pandemic world. To ensure that data is protected, Acronis recommends five simple steps:

Create backups of important data. Keep multiple copies of your backups, with one local copy for fast recovery and one off-site in the cloud to guarantee recovery if disaster destroys on-site copies.

Update operating systems and applications. Outdated systems and apps lack the security fixes that stop cybercriminals from gaining access. Regular patching is required to avoid exploits.

Avoid suspicious emails, links and attachments. Most malware infections are the result of social engineering techniques that trick unsuspecting individuals into opening infected email attachments or clicking on links to websites that host malware.

Install antivirus, anti-malware, and anti-ransomware software while enabling automatic updates so the system is protected against malware.

• Consider adopting a single cyber protection solution to have the central management and integrated protection needed to meet today’s IT requirements.

Find out more at www.acronis.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Get proactive with cybersecurity
Information Security
The ability to respond effectively to a cybersecurity breach is critical, but the missing piece of the puzzle is a thorough, proactive evaluation to ascertain weaknesses and identify any hidden threats.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
How to securely manage your digital footprint
Information Security Training & Education
Managing your online presence is critical to safeguarding your privacy and security. It is imperative to take a proactive approach, including using robust cybersecurity best practices.

Read more...
The state of code security in 2024
Information Security
The 2024 State of Code Security survey reveals that organisations have continued to shore up application security defences over the last year, according to OpenText Premier Partner iOCO Application Management.

Read more...
What is the level of safety and integrity of the software supply chain?
Information Security IoT & Automation
Organisations are embracing AppSec practices and focusing on their software security posture. However, they highlight that insufficient funding and security resources, plus a disconnect between developers and security teams, remain major roadblocks.

Read more...
Cybercriminals target financial service providers to get at sensitive client data
Information Security
According to Ryan van de Coolwijk, Product Head for cyber at iTOO Special Risks, hackers target financial service providers because they hold sensitive client information that unauthorised individuals could use for fraudulent activities.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...