Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to detect and stop ransomware attacks using endpoint protection software

At a Glance: Effective Ransomware Defense for MSPs To effectively detect and stop modern ransomware, Managed Service Providers (MSPs) must evolve beyond traditional antivirus to AI-driven Endpoint Detection and Response (EDR). This article details the five stages of a ransomware infection—from initial delivery to extortion—and provides a comprehensive guide on halting them. Core concepts covered include.

Episode 1: Cyber Risk Overview: Navigating Threats in Education

Our opening 30-minute episode dissects the current cyberthreat landscape, illuminating the cyberthreats facing the EMEA region and the highly targeted education sector in particular. Engage with us as we decode the cybersecurity hurdles faced by schools and higher education institutions. Speakers: Chapters: Additional Resources.

Episode 2: How Cyber Criminals were Foiled after Stealing School Data and Demanding Payment

Discover in 30 minutes how public and private sector organisations combined to help a school recover, post-cyberattack. Using a timeline of events, law enforcement officers involved in the incident will discuss decision-making during the event, together with first-hand testimony from the affected school and Acronis, a prominent cyber resilience solution provider, and key partner of the NEBRC. Speakers.

Episode 3: Defensive Tactics: Meeting DfE and NCSC Cybersecurity Standards

This session equips education professionals with strategies and tools to traverse the complexities of cybersecurity. The narrative melds a real incident with the stringent guidelines from the Department for Education and the National Cyber Security Centre. Speakers: Timestamps: Additional Resources.

Episode 4: Risk and Resilience: The Role of Cyber Insurance in Education

Gain insight into the crucial function of cyber insurance for educational institutions. We will explore the pivotal intersection of cyber insurance, regulatory compliance, and cutting-edge solutions in the context of safeguarding educational institutions. Speakers:· Wendy Pattison, CFO and Business Director, Framwellgate School· DI Martin Wilson, Detective Inspector, North East Business Resilience Centre (NEBRC)· Joe Cockcroft, Service and Technology Supervisor, North East Business Resilience Centre (NEBRC)· Edward Renwick, Strategic Partner Executive at Acronis.

Episode 5: Budgeting for Security: Financial Planning for Cyber Compliance

Our bonus episode tackles the vital topic of budgetary planning for cybersecurity compliance within educational institutions. We'll shed light on effective strategies for early communication of cybersecurity requirements within the school, engaging key stakeholders such as bursars, finance teams, and administrators.

Iberia Airlines data breach: What customers need to know

Spain's flag carrier Iberia Airlines disclosed a significant data security incident in November 2025 that should put all customers on high alert. The breach, which occurred through a compromised third-party supplier, has exposed personal information and created new risks for travelers who have flown with the airline.

Ivy League universities under siege: The cyberattacks targeting Harvard, Princeton and Penn

The Ivy League is the promised land for thousands of high school students, but it has also become a target for cyberattackers. Three of the most prestigious universities in the United States suffered sophisticated cyberattacks in fall 2025. Harvard University, Princeton University and the University of Pennsylvania have all disclosed data breaches that compromised sensitive information about alumni, donors, students and faculty members.

The Complete Guide to Patch Management: Closing Security Gaps Before Attackers Find Them

Definition: Patch management is the continuous lifecycle of identifying, acquiring, testing, and deploying code updates to endpoints, servers, and applications to resolve security vulnerabilities and improve stability. The 5-Step Process.

When one vendor falls: The SitusAMC breach and the growing threat of supply chain attacks

Following the Jaguar-Land Rover disaster, another cyberattack has shaken a major industry. The danger of attacks on the supply chain has never been clearer. The issue now revolves around what organizations can do to protect themselves and their supply chain partners. Wall Street spent a tense weekend in late November 2025 when news broke that SitusAMC, a major technology vendor serving hundreds of real estate lenders across the United States, had suffered a significant cyberattack.

DORA compliance checklist: A guide for financial entities and their technology partners

While it shares a name with a popular cartoon character, there’s nothing cute about this DORA. The Digital Operational Resilience Act (DORA) has financial entitles and their service providers scrambling to meet DORA requirements or face fines and penalties. DORA is a cornerstone of the European Union's strategy to strengthen the financial sector against risks related to information and communications technology (ICT), although it has global implications that reach far beyond Europe.

10 smart ways to prevent identity theft

Nowadays, identity theft has become one of the fastest-growing cybercrimes. In 2024, the United States' Federal Trade Commission received over 1.1 million identity theft reports¹, which is an increase of about 9.5% compared to 2023. What's even more disturbing is the fact that more than 47% of the Americans have their personal info exposed². Sometimes one mistaken click or download is all it takes to turn your life upside down.

Why cyber resilience - not just compliance - is critical for manufacturing OT environments

Your manufacturing environment might be compliant, but that doesn't mean it's protected against a cyberattack. Even compliant systems can fall victim to cybercrime. And the consequences can be devastating. The SANS Institute sends a clear message in its 2025 State of ICS/OT Cybersecurity Survey: Regulatory compliance alone is no longer enough in operational technology (OT) environments.

Acronis SIEM Connector 2.0: Seamless Security Integration for MSPs

MSPs often rely on managed detection and response (MDR) integrations, which provides enterprise-grade security capabilities without the need for in-house analysts or complex infrastructure. As MSPs grow into medium-sized businesses, they typically expand into extended detection and response (XDR) integrations, giving greater visibility across multiple security layers (endpoints, networks and cloud) and more control over how they manage and respond to threats.

What is Cyber Resilience? A Complete Guide for MSPs

Blocking every attack is impossible. The real question is this: how fast can your clients recover when one gets through? The reality is that cyberattacks are no longer a matter of “if” but “when.” For managed service providers (MSPs), this shift has redefined client expectations. While strong cybersecurity measures are essential, they are no longer sufficient on their own. What clients need is cyber resilience. Cyber resilience moves beyond prevention to ensure continuity.

Cybersecurity vs. cyber resilience: What's the difference and which do you need?

Modern businesses run on software. That software generates data, and that data is often the most valuable part of your entire business. Businesses rightfully understand that they need to protect that data, but they don’t necessarily know what that really means. If you ask any executive whether they need to invest in cybersecurity, they’ll tell you, of course, they do.

Navigating GDPR compliance: A guide for data-driven organizations

The General Data Protection Regulation (GDPR) isn’t new, yet many organizations still struggle to meet its requirements. Why? It’s in part, at least, because GDPR is just plain hard to follow. As it turns out, meticulously protecting the personal data of 450 million citizens of the European Union (EU) isn’t easy. Most IT professionals, managed service providers (MSPs) and business leaders know what GDPR is. Many know what it requires.

Best server backup solutions: Top five picks for 2025

Today, data is the engine of modern business. Yet, the threats to that engine — from sophisticated ransomware attacks and cloud misconfigurations to simple hardware failures — have never been greater. For organizations of all sizes, a reliable server backup strategy is more than an IT task — it’s a foundation for survival. Without truly reliable server backup solutions, a single incident can lead to catastrophic downtime, regulatory fines and permanent damage to your reputation.

HIPAA checklist: Why your health care clients are at risk (and how to fix it)

The benefits of offering managed services to health care organizations are obvious. The problem? Health care disaster recovery (DR) creates a complex web of compliance requirements that can quickly turn profitable clients into costly liabilities. Health care data breaches average $10.93 million per incident — that's more than double the cost of breaches in other industries. For MSPs serving health care clients, disaster recovery isn't just about getting systems back online.