TechRepublic on Flipboard

2022-07-30 03:23:40 By : Mr. Lubo Trailer

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Invalid email/username and password combination supplied.

An email has been sent to you with instructions on how to reset your password.

By registering, you agree to the Terms of Use and acknowledge the data practices outlined in the Privacy Policy.

You will also receive a complimentary subscription to TechRepublic's News and Special Offers newsletter and the Top Story of the Day newsletter. You may unsubscribe from these newsletters at any time.

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Acronis Cyber Protect Home Office: The full image backup tool to meet today’s demanding needs

Your email has been sent

Jack Wallen tests the Acronis Cyber Protect Home Office app, a disaster recovery tool anyone can use to create a full disk clone of crucial systems with ease.

Regardless of whether you’re a parent, small business owner or IT manager for a mid-sized company, when it comes to your data you need to take measures to ensure there’s always a backup.

Within the realm of backups, you can take two similar yet distinctive paths: Folder-level backup or machine-level backup. Folder-level backups are exactly what they sound like — backing up only the folders that contain the important data your organization needs. The machine-level backup takes this one step further and creates an image of your entire drive. Machine-level backups are a good option for many because they back up everything (including the operating system), so should something go wrong, you could easily return that machine to a working state.

SEE: Power checklist: Troubleshooting hard drive failures (TechRepublic Premium)

Acronis Cyber Protect Home Office offers a robust imaging tool that walks you through the process of creating a full image of your running machine and gives you a choice of destinations to house the image. With this same tool, you can also create an emergency boot disk on the off-chance you need to restore a system that refuses to boot.

Sounds complicated, doesn’t it? Fear not: Even if you’re not the most adept at using technology, you can successfully create an image of your system with Acronis Cyber Protect Home Office. The process goes a little something like this:

Acronis has removed a lot of the complications from the process such that anyone can create a full image backup or create an active disk clone to help you migrate all of your data to a larger or faster disk — all while enjoying their anti-malware protection.

I tested the cloning process on a MacBook Pro running macOS Monterey and a simple USB external drive. Once the drive was detected by the macOS, Acronis Cyber Protect Home Office was ready to clone (Figure A).

The process of cloning the drive will format and erase the destination drive. Do not attempt to use an external drive with the hopes of retaining any data; either use a brand new external drive or one that houses nothing important.

There are two caveats to this. First, I discovered that creating a disk image doesn’t seem to work with any destination drive that is not directly attached to the host. No SMB share or NAS location the MacBook could access were valid destinations for the image. With that in mind, you’ll definitely need an external USB drive for the task. Second, the restore process built into Acronis Cyber Protect Home Office only works when copying the image back to the original machine. Yes, that machine could have a new drive installed, but everything else will need to remain the same.

Should you need to restore the image to a completely different machine, you’ll need to download and install another utility called Acronis Universal Restore, which creates a specific rescue disk that will allow you to copy the cloned image from one machine to another so long as the internal drive is either equal in size or larger than the original.

The process of creating the cloned image does take some time. This is a job you’ll want to let run overnight when you don’t need to use the machine.

In this vein, another tiny gripe I have is that Acronis Cyber Protect Home Office failed to actually calculate the time remaining. Instead of even giving me an estimate, the text “Calculating time remaining” never changed (even as the cloning process was a quarter of the way complete — Figure B). I don’t hold this against Acronis because the inability to calculate the time for such actions is pretty universal.

In the end, the single most important aspect of Acronis Cyber Protect Home Office is that of disk imaging, and I cannot remember the last time I used a tool that made this task so easy. This came as a surprise to me, given I used to have to deal with the older Acronis tools that required the skills of an IT admin to use. For those without those skills, who really want to ensure they have the ability to clone their hard drives in case of an emergency, you’d be hard-pressed to find a better solution.

For those who are less experienced in the field of IT, but still want to enjoy the security that comes with having a full machine backup, Acronis Cyber Protect Home Office is the tool to use. And given that piece of mind can be had for only $89.99/year (on sale now for $53.99/year), this might be just the tool you need for your home office disaster recovery plan.

Subscribe to TechRepublic’s How To Make Tech Work on YouTube for all the latest tech advice for business pros from Jack Wallen.

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices.

Acronis Cyber Protect Home Office: The full image backup tool to meet today’s demanding needs

Your email has been sent

Your message has been sent

TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.

TechRepublic contributing writers ranked the best tech in multiple categories, including VPNs, password managers, and headsets, as well as AI/ML companies.

Meta's new front-end, back-end, mobile and database development courses prepare entry-level professionals for development careers in less than eight months.

With so many project management software options to choose from, it can seem daunting to find the right one for your projects or company. We’ve narrowed them down to these nine.

Learn about the new features available with iOS 16, and how to download and install the latest version of Apple’s mobile operating system.

IDEs are essential tools for software development. Here is a list of the top IDEs for programming in 2022.

IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...