What a Robust Data Backup Strategy Looks Like in Practice

man at desk raising his fists

Data backups are one of the top security measures that organizations need to recover from a ransomware attack. Nearly a quarter (24%) of respondents in a 2021 survey cited backups of critical data as a 鈥渕ust-have鈥 ransomware defense. This was followed by user awareness training and endpoint/device protection, wrote聽. In another 2021 report covered by聽, 57% of organizations struck by ransomware revealed that they had recovered their affected information using a backup.聽

The Essential Elements of a Robust Data Backup Strategy聽

For this recovery method to work, organizations need to be strategic about how they maintain their data backups. The聽聽(CISA) noted that organizations can start by following the 3-2-1 rule when it comes to backing up their data. The rule states the following:聽

  • Keep three copies of any file聽鈥撀燨rganizations can count their primary data as one copy. But it鈥檚 important that they don鈥檛 put all their faith聽in聽just one backup. They need to have a second backup in case the other copy fails.聽It鈥檚 important to note here as well that you can鈥檛 rely on SaaS vendors like Microsoft or Google聽to automatically back up the data you store with them. In fact, Microsoft SLA鈥檚 ()聽specifically聽recommends 3rd party backups, 鈥淲e recommend that聽you聽regularly backup your content and data that you store on the services or store using third-party apps and services.鈥澛

  • Keep those files on two media types聽鈥撀燚ifferent hazards require different types of backups. For instance, they can use an external hard drive to restore their desktops if they need to replace a computer that鈥檚 lost or destroyed. Ransomware doesn鈥檛 always necessitate this approach; organizations can use the Volume Shadow Copy Service to restore their files after removing the malware from their infected machines.聽

  • Store one copy offsite聽鈥撀燚ata backups don鈥檛 just help organizations in the event of a ransomware attack. They also help in other instances of data destruction such as when there鈥檚 a fire or other natural disaster. Acknowledging those possibilities, organizations can鈥檛 keep their backups in the same place without risking the loss of their data copies.聽That鈥檚 why they might consider聽backing up their data in the cloud. This will allow them to take daily snapshots of their information and choose a point in time for retrieving the exact data that they want.聽

Once they have those measures in place, organizations need to follow the advice of聽聽and test the viability of their backups. They can do so by creating backup policies that fit within their wider business continuity and disaster recovery plans as well as their data protection strategy. As part of those policies, organizations need to specify a recovery point objective (RPO) for designating how old the most recent backup can be and a recovery time objective (RTO) for specifying how quickly teams must be able to recover their systems.聽

Some聽Important聽Data聽Backup聽Considerations to聽Keep in聽Mind聽

While backups can help them to recover their data, organizations need to keep some considerations in mind. The first is the fact that some ransomware actors changed their tactics to render a victim鈥檚 backups unusable. The聽聽(NCSC) explained what it鈥檚 been seeing back in 2020:聽

We've seen聽a number of聽ransomware incidents lately where the victims had backed up their essential data (which is great), but all the backups were online at the time of the incident (not so great). It meant the backups were also encrypted and ransomed together with the rest of the victim's data.听听

Second, ransomware attackers are using double extortion to steal a victim鈥檚 data before launching their payload鈥檚 encryption routine. This use of聽double extortion聽doesn鈥檛 prevent victims from using their backups to recover their encrypted data.聽But because they don鈥檛 do聽anything to remediate instances of data theft, it means organizations can鈥檛 recover completely from a modern ransomware attack using a backup.聽

These concerns highlight the need for organizations to defend themselves against ransomware in the first place. They can do this by using a security solution to protect themselves against email-based attacks, one of the most common delivery vectors for ransomware. Specifically, they should invest in a solution that鈥檚 capable of analyzing incoming messages for threat indicators while allowing legitimate correspondence to reach their intended destination.聽

Learn how the email threat protection tools of聽秋葵视频色聽| AppRiver can guard your organization against a ransomware attack.听听