{"id":19222,"date":"2021-09-10T15:09:29","date_gmt":"2021-09-10T15:09:29","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=19222"},"modified":"2021-09-10T15:09:32","modified_gmt":"2021-09-10T15:09:32","slug":"are-backups-enough-for-ransomware","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/","title":{"rendered":"Preparing for Ransomware: Are Backups Enough?"},"content":{"rendered":"\n<p><span style=\"font-weight: 400;\">In a year where <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\"><span style=\"font-weight: 400;\">ransomware<\/span><\/a><span style=\"font-weight: 400;\"> has raised the alert levels everywhere, the go-to answer from many is redundancy through offline, remote backups \u2013 but are they enough?<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Backups are a critical component of any enterprise cybersecurity posture, but they are not an airtight strategy. Like any other digital machine, backup systems are vulnerable to data loss and compromise. From the rooftops, industry analysts shout, &#8220;Move your backups offline and away from production environments!&#8221; But access to and confidence in backups alone aren\u2019t enough.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">As ransomware threats loom, we look at where backups fall short, and what to keep in mind to optimize network and data security.<\/span><\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 ez-toc-wrap-left counter-flat ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-66d6ff4f2e70d\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-66d6ff4f2e70d\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#Why-Are-Backups-Critical\" title=\"Why Are Backups Critical?\">Why Are Backups Critical?<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#Where-Backups-Fall-Short-Against-Ransomware\" title=\"Where Backups Fall Short Against Ransomware\">Where Backups Fall Short Against Ransomware<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#Backups-Dont-Preclude-Expensive-Recovery\" title=\"Backups Don&#8217;t Preclude Expensive Recovery\">Backups Don&#8217;t Preclude Expensive Recovery<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#Ransomware-Grows-More-Dangerous\" title=\"Ransomware Grows More Dangerous\">Ransomware Grows More Dangerous<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#Not-All-Backups-Are-Created-Equally\" title=\"Not All Backups Are Created Equally\">Not All Backups Are Created Equally<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#Implementing-the-Optimal-Backup-Strategy\" title=\"Implementing the Optimal Backup Strategy\">Implementing the Optimal Backup Strategy<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#Going-Beyond-Backups\" title=\"Going Beyond Backups\">Going Beyond Backups<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#Building-a-Network-Ready-for-Ransomware\" title=\"Building a Network Ready for Ransomware\">Building a Network Ready for Ransomware<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Why-Are-Backups-Critical\"><\/span><span style=\"font-weight: 400;\">Why Are Backups Critical?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Backups are the specialized physical or <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-target-virtual-machines-vms\/\"><span style=\"font-weight: 400;\">virtual machines<\/span><\/a><span style=\"font-weight: 400;\"> built to restore an organization&#8217;s data or systems to a previous state. Whether it&#8217;s a ransomware attack, natural disaster, machine or human error, backups are critical to restoring lost, damaged, and inaccessible resources.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Though this article looks at the shortcomings of relying on backups, the truth remains that backups are one of the best defensive solutions against ransomware if done right.<\/span><\/p>\n\n\n\n<p><b>Read more:<\/b> <a href=\"https:\/\/www.esecurityplanet.com\/threats\/revil-ransomware-group-returns\/\"><span style=\"font-weight: 400;\">REvil Ransomware Group Resurfaces After Two Months Away<\/span><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">The Argument for Backups<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">In today&#8217;s digital ecosystem, organizations&#8217; digital records and systems rely on operational continuity to make a difference in business success. For vendors, downtime caused by disasters can be resource exhaustive, costly, and cause long-term reputational damage.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">For ransomware attacks where network data gets <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/\"><span style=\"font-weight: 400;\">encrypted<\/span><\/a><span style=\"font-weight: 400;\">, backups are the definitive method for restoring network infrastructure. Administrators can start the restoration process and return to the pre-attack state with an offline backup isolated from the impacted network.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Where-Backups-Fall-Short-Against-Ransomware\"><\/span><span style=\"font-weight: 400;\">Where Backups Fall Short Against Ransomware<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Backups aren&#8217;t solely to blame for ransomware recovery failures, but they can be compromised by ransomware attacks if not done right. The following sections speak to how ransomware can affect organizations with backup strategies in place, the implications of advanced <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\"><span style=\"font-weight: 400;\">malware<\/span><\/a><span style=\"font-weight: 400;\">, and why the type of backup solution matters.<\/span><\/p>\n\n\n\n<p><b>Read more:<\/b> <a href=\"https:\/\/www.esecurityplanet.com\/networks\/accenture-ransomware-attack\/\"><span style=\"font-weight: 400;\">Accenture Attack Highlights Evolving Ransomware Threats<\/span><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Backups-Dont-Preclude-Expensive-Recovery\"><\/span><span style=\"font-weight: 400;\">Backups Don&#8217;t Preclude Expensive Recovery<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Even if an organization has an offline backup ready to go, ransomware attacks and the recovery process can still carry quite a cost. The technical approach for restoration, <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/digital-forensics-software\/\"><span style=\"font-weight: 400;\">digital forensics<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/networks\/best-incident-response-tools-services\/\"><span style=\"font-weight: 400;\">incident response<\/span><\/a><span style=\"font-weight: 400;\">, and restoring client services all take time and resources.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">The Restoration Process Takes Time<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">After a ransomware attack, IT personnel attempt to identify the state of network segments and recovery options. With a remote backup available and uncorrupted, the restoration process begins. In addition to restoring data and systems from the backup, network technicians may also have to reimage computers, install new software, set configuration policies, or reapply <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\"><span style=\"font-weight: 400;\">patches<\/span><\/a><span style=\"font-weight: 400;\">. Tasks like rebuilding the <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/network-access-control-solutions\/\"><span style=\"font-weight: 400;\">Active Directory<\/span><\/a><span style=\"font-weight: 400;\"> and configuration management database capabilities can take multiple weeks.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The technical process of restoring the network takes time, and the larger and more complex the backup or network, the longer it will take to recover.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Extended Downtime Can Be Deadly<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">In the event of a ransomware attack, an organization could lose access to part or all of its network data and systems, blocking further work. For service providers, this could mean downtime where client resources are inaccessible for an extended period.<\/span><\/p>\n\n\n\n<p><a href=\"https:\/\/www.coveware.com\/blog\/ransomware-marketplace-report-q4-2020\"><span style=\"font-weight: 400;\">Coveware<\/span><\/a><span style=\"font-weight: 400;\"> reported earlier this year the average downtime for ransomware victims jumped from 15 days in 2019 to 21 days in 2020. The longer the downtime, the higher the chances are of lost revenues, reputational damage, and more. Other direct costs attached to ransomware attacks with a backup or not include:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Decreased productivity without network resources and systems<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Loss of proprietary secrets or customers, directly affecting organization bottom line<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Disaster recovery specialists to assist in digital forensics and incident response (DFIR)<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Higher <\/span><a href=\"https:\/\/www.esecurityplanet.com\/compliance\/cyber-insurers-pull-back-amid-increase-in-cyber-attack-costs\/\"><span style=\"font-weight: 400;\">cybersecurity insurance<\/span><\/a><span style=\"font-weight: 400;\"> premiums to meet the organization&#8217;s <\/span><a href=\"https:\/\/www.cioinsight.com\/it-strategy\/business-continuity-planning-software\/\"><span style=\"font-weight: 400;\">risk<\/span><\/a><span style=\"font-weight: 400;\"> level<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/\"><span style=\"font-weight: 400;\">Retraining<\/span><\/a><span style=\"font-weight: 400;\"> personnel to meet new challenges and avoid aftershock attacks<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The ransom amount paid to avoid the public disclosure of data<\/span><\/li><\/ul>\n\n\n\n<p><span style=\"font-weight: 400;\">Considering these costs, the Sophos State of Ransomware <\/span><a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/pdfs\/whitepaper\/sophos-state-of-ransomware-2021-wp.pdf?cmp=120469\"><span style=\"font-weight: 400;\">white paper<\/span><\/a><span style=\"font-weight: 400;\"> reported the average cost to recover from a ransomware attack had doubled to $1.85 million within the last year. Relative to the average ransom paid for a mid-sized organization ($170,404), the costs add up.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Successful ransomware attacks additionally constitute a data breach that can push organizations into violating their <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/grc-tools\/\"><span style=\"font-weight: 400;\">governance, risk, and compliance<\/span><\/a><span style=\"font-weight: 400;\"> (GRC) obligations. Victim organizations remain liable for regulatory fines and civil penalties for breaching sensitive user data.<\/span><\/p>\n\n\n\n<p><b>Read more:<\/b> <a href=\"https:\/\/www.esecurityplanet.com\/threats\/zero-day-threat\/\"><span style=\"font-weight: 400;\">Zero-Day Threats: Preparation is the Best Prevention<\/span><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ransomware-Grows-More-Dangerous\"><\/span><span style=\"font-weight: 400;\">Ransomware Grows More Dangerous<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Whereas before, ransomware gangs would only encrypt a network&#8217;s data and (maybe) release the decryption key upon payment, today&#8217;s attackers are taking their network access a step further.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Like any malware, ransomware enters the network through attack vectors like <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/phishing-attacks\/\"><span style=\"font-weight: 400;\">phishing emails<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/social-engineering-attacks\/\"><span style=\"font-weight: 400;\">social engineering<\/span><\/a><span style=\"font-weight: 400;\">, software and remote desktop protocol (RDP) vulnerabilities, and malicious websites. Ransomware\u2019s success in the last two years has been exacerbated by COVID-19, with a <\/span><a href=\"https:\/\/abcnews.go.com\/Health\/wireStory\/latest-india-reports-largest-single-day-virus-spike-70826542\"><span style=\"font-weight: 400;\">600% increase<\/span><\/a><span style=\"font-weight: 400;\"> in malicious emails during the pandemic.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Once inside the network, sophisticated threat actors can use their access to escalate permissions, move laterally, and encrypt the entire network infrastructure. From on-premises systems to the <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/cloud-security-companies\/\"><span style=\"font-weight: 400;\">cloud<\/span><\/a><span style=\"font-weight: 400;\">, they are at risk if network segments are connected and accessible to a compromised <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/privileged-access-management-pam-software\/\"><span style=\"font-weight: 400;\">privileged user<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Alongside these more <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/advanced-persistent-threat\/\"><span style=\"font-weight: 400;\">sophisticated tactics<\/span><\/a><span style=\"font-weight: 400;\">, ransomware attacks now go beyond just encrypting network data. Most current backups don&#8217;t extend far enough to meet the added threats posed by advanced ransomware attacks.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Beyond Encryption: Exfiltration and Extortion<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Malware constantly evolves to match advancing <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-cybersecurity-software\/\"><span style=\"font-weight: 400;\">cybersecurity<\/span><\/a><span style=\"font-weight: 400;\"> standards and solutions, and ransomware is no exception. Two additional angles added to the ransomware attack tactics include data exfiltration and double extortion.<\/span><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\" style=\"margin-top:-26px;margin-bottom:-18px\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h4 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Data Exfiltration<\/span><\/h4>\n\n\n\n<p><span style=\"font-weight: 400;\">After malware gains access to a network and before encrypting organization systems, threat actors can take steps to exfiltrate data. A secure backup can allow leadership to say &#8220;no thanks&#8221; to the offer of a decryption key. Still, the prospect of exposed proprietary systems or sensitive data pressures the organization to pay the ransom anyway, backup or no backup, so preventing ransomware attacks in the first place remains critical<\/span>.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h4 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Double Extortion<\/span><\/h4>\n\n\n\n<p><span style=\"font-weight: 400;\">Despite making the payment, there is no guarantee attackers act in good faith and respect data in their possession. Several instances show ransomware hackers going against their word and disclosing sensitive data to the public. The prospect of stolen data getting reused for a second ransom is known as double extortion.<\/span><\/p>\n<\/div>\n<\/div>\n\n\n\n<p><span style=\"font-weight: 400;\">Sophisticated tactics, like those used against <\/span><a href=\"https:\/\/www.esecurityplanet.com\/trends\/colonial-pipeline-ransomware-attack\/\"><span style=\"font-weight: 400;\">Colonial Pipeline<\/span><\/a><span style=\"font-weight: 400;\">, JBS Foods, and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/kaseya-breach-underscores-vulnerability-of-it-management-tools\/\"><span style=\"font-weight: 400;\">Kaseya<\/span><\/a><span style=\"font-weight: 400;\">, enable attackers to linger for periods before using their access to inflict damage. Today&#8217;s ransomware gangs deploy advanced malware capable of exposing any number of network <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/\"><span style=\"font-weight: 400;\">vulnerabilities<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n\n\n\n<p><b>Read more:<\/b> <a href=\"https:\/\/www.esecurityplanet.com\/threats\/lemonduck-malware-linux-microsoft\/\"><span style=\"font-weight: 400;\">LemonDuck Shows Malware Can Evolve, Putting Linux and Microsoft at Risk<\/span><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Hackers Target Backups<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Another development in recent ransomware strains has been the automatic detection of backups connected to or within an organization&#8217;s infrastructure.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Because holding offline backups isn&#8217;t a universal practice or <\/span><a href=\"https:\/\/www.esecurityplanet.com\/trends\/biden-cybersecurity-strategy\/\"><span style=\"font-weight: 400;\">publicly mandated<\/span><\/a><span style=\"font-weight: 400;\">, hackers know there&#8217;s the potential to encrypt an organization&#8217;s only viable backup. With knowledge of the most popular backup data files, today&#8217;s ransomware specifically targets backups for encryption.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">For network administrators that haven&#8217;t heard the call for offline backups, they could easily stumble into restoration only to realize hackers encrypted the backup. Multiple airtight copies of data are necessary to protect against corruption of one copy. This also means organizations must be careful only to restore data using a clean, uncorrupted copy.<\/span><\/p>\n\n\n\n<p><b>Read more: <\/b><a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-groups-look-for-inside-help\/\"><span style=\"font-weight: 400;\">Ransomware Groups Look for Inside Help<\/span><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Not-All-Backups-Are-Created-Equally\"><\/span><span style=\"font-weight: 400;\">Not All Backups Are Created Equally<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">So far we&#8217;ve focused on why backups by themselves aren&#8217;t enough in the fight against ransomware, but that&#8217;s not to say there aren&#8217;t plenty of excellent solutions. Like other IT products and services, backups are a part of a growing and competitive marketplace, with many options for different organization requirements and price points.<\/span><\/p>\n\n\n\n<p><b>Read more:<\/b> <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/white-house-says-take-ransomware-threat-seriously\/\"><span style=\"font-weight: 400;\">White House to Corporate America: Take Ransomware Threat Seriously<\/span><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Inadequate or Excessive Redundancy<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">While digital systems become more critical to public and private ecosystems, there remain stragglers in adopting an effective backup strategy. Considerations like whether the existing solution covers part or all of the network and syncs on an hourly, daily or real-time basis determine what changes in coverage might be necessary. For a fast-moving <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/hot-cybersecurity-startups\/\"><span style=\"font-weight: 400;\">startup<\/span><\/a><span style=\"font-weight: 400;\">, losing up to a month of network data would be a nightmare scenario.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">On the other hand, excessive redundancy that throws the kitchen sink at backup solutions but fails to consider their vulnerabilities or cost also causes unnecessary strain. A more practical approach would identify sensitive network segments and deploy priority backups for those segments with a robust syncing schedule. In either case, too little coverage presents added risk, and too much coverage can be challenging to manage and expensive.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Storage Space and Sync Periods<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">When system backups are infrequent, it&#8217;s less likely the network can effectively return to a pre-ransomware attack state. Two considerations for every network when shopping for backup solutions are storage space and the frequency of backup syncs. Between full, differential, and incremental backup solutions, organizations have options that each have their benefits.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Of course, the more an organization duplicates network data, the more storage space is required to hold that backup data. Incremental backups remain a popular enterprise choice, as they restore the last full backup while also storing new gradual changes in a small data load.<\/span><\/p>\n\n\n\n<p><b>Read more:<\/b> <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/\"><span style=\"font-weight: 400;\">Ransomware Evolves as Groups Embrace as-a-Service Models<\/span><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Configuration Management and Malfunction<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Backup systems aren&#8217;t immune to malfunctioning, failing to restore pertinent data, or only partially restoring intended data. Though consistent bugs are less likely with a top backup solution vendor, organizations can fall victim to poor configuration management. Like most software tools, backups work best when configured to meet the network&#8217;s needs, and controls and log activity are visible to administrators.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Implementing-the-Optimal-Backup-Strategy\"><\/span><span style=\"font-weight: 400;\">Implementing the Optimal Backup Strategy<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">A successful backup strategy optimizes syncing periods to reflect real-time business data and uses adequate backup tools to ensure administrators can bring back systems promptly.<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Practice the 3-2-1 principle prescribing that organizations keep three copies of the select data, two types of storage (on-premises and cloud-based), and one off-site copy. And in the age of ransomware, multiple air-gapped copies of your data are desirable.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Deploy multiple backup systems that segment the network and maximize full, differential, and incremental backup strategy.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prioritize the protection of backup catalogs, which contain all the metadata for backups (index, bar codes of tapes, full paths to data content on disk).<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Inventory critical data and systems to enhance visibility into the network infrastructure.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Back up data and business processes, including software, components, dependencies, configurations, monitoring, and more, for business continuity.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Though restoring or rebuilding can be complex, cloud and virtualization technology offer secure, accessible, and cost-effective hot-swap architectures.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">If staying online is critical and downtime could be damaging to continuity, consider the pricier and complete hot backup site for the fastest recovery.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Conduct regular <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-penetration-testing\/\"><span style=\"font-weight: 400;\">penetrating testing<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/breach-and-attack-simulation-bas-vendors\/\"><span style=\"font-weight: 400;\">breach and attack simulation<\/span><\/a><span style=\"font-weight: 400;\"> to ensure backups work as planned and remain secure and accessible during a ransomware attack.<\/span><\/li><\/ul>\n\n\n\n<p><b>Read more: <\/b><a href=\"https:\/\/www.datamation.com\/big-data\/the-data-backup-and-recovery-market\/\"><span style=\"font-weight: 400;\">The Data Backup and Recovery Market<\/span><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Going-Beyond-Backups\"><\/span><span style=\"font-weight: 400;\">Going Beyond Backups<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">There&#8217;s little guarantee an organization can fend off a determined attacker. For network security administrators, the prospect of a ransomware attack should be considered as a &#8220;when,&#8221; not &#8220;if.&#8221;&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">As the most dangerous malware threat, much of the traditional wisdom defending the network at large also applies to guarding against ransomware.<\/span><\/p>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-network-security-tools\/\"><span style=\"font-weight: 400;\">Network cybersecurity solutions<\/span><\/a><span style=\"font-weight: 400;\"> do stellar work identifying and proactively defending the network against malware. Administrators must properly configure these tools, keep software up to date, avoid suspicious executables, and limit risky web content to solidify their impact. But as networks grow larger and more complex, the mindset of protecting the perimeter is shifting toward protecting specific network data.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">The Optimal Defense<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Zero trust continues to be the most sought-after cybersecurity framework on the block, and it&#8217;s easy to see why. When network administrators have a more robust understanding of their protect surfaces (i.e., the most valuable or sensitive network data and systems), they have the agency to prioritize the defenses of those segments.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The network perimeter is growing too large and complex for most organization security operations to manage. Though <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\"><span style=\"font-weight: 400;\">network firewalls<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\"><span style=\"font-weight: 400;\">EDR<\/span><\/a><span style=\"font-weight: 400;\"> remain trusty defense layers, they fail to guard against the advanced insider threat. In addition to walling off your most critical data with zero trust and <\/span><a href=\"https:\/\/www.esecurityplanet.com\/threats\/microsegmentation-zero-trust-security\/\"><span style=\"font-weight: 400;\">microsegmentation<\/span><\/a><span style=\"font-weight: 400;\">, advanced security tools like <\/span><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-user-and-entity-behavior-analytics-ueba-tools\/\"><span style=\"font-weight: 400;\">UEBA<\/span><\/a><span style=\"font-weight: 400;\"> and machine learning-based detection can help you spot more insidious threats.<\/span><\/p>\n\n\n\n<p><b>Read more:<\/b> <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-zero-trust-security-can-protect-against-ransomware\/\"><span style=\"font-weight: 400;\">How Zero Trust Can Protect Against Ransomware<\/span><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Building-a-Network-Ready-for-Ransomware\"><\/span><span style=\"font-weight: 400;\">Building a Network Ready for Ransomware<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">With sufficient offline backup, organizations can restore their data and operations without paying a ransom to cybercriminals. Unfortunately, backups alone don&#8217;t ease the restoration process or mitigate ransomware extortion tactics.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">At this time, the best solution to ransomware is avoiding the initial breach. To prepare, administrators must continue to build a holistic cybersecurity posture that&#8217;s ready for any intruding malware. An intelligent backup strategy can mitigate the effects of ransomware, but it&#8217;s not a cure.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Read more on ransomware news and trends:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/how-dmarc-protects-against-ransomware\/\"><span style=\"font-weight: 400;\">How DMARC Can Protect Against Ransomware<\/span><\/a><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/threats\/lockfile-ransomware-evasion-rechniques\/\"><span style=\"font-weight: 400;\">LockFile Ransomware Uses Unique Methods to Avoid Detection<\/span><\/a><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-group-ragnar-threatens-data-leaks\/\"><span style=\"font-weight: 400;\">Ransomware Group Ragnar Locker Threatens Data Leak if Law Enforcement Contacted<\/span><\/a><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/threats\/common-types-of-ransomware\/\"><span style=\"font-weight: 400;\">Deep Instinct Warns of (Even More) Massive Ransomware Problems<\/span><\/a><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.esecurityplanet.com\/networks\/cisa-fbi-colonial-pipeline-ransomware\/\"><span style=\"font-weight: 400;\">U.S. Issues Ransomware Guidance, Cybersecurity Executive Order<\/span><\/a><\/li><\/ul>\n\n\n<div id=\"ta-campaign-widget-66d6ff4f29e10-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ff4f29e10\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ff4f29e10\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ff4f29e10\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ff4f29e10\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ff4f29e10\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ff4f29e10\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In a year where ransomware has raised the alert levels everywhere, the go-to answer from many is redundancy through offline, remote backups \u2013 but are they enough? Backups are a critical component of any enterprise cybersecurity posture, but they are not an airtight strategy. Like any other digital machine, backup systems are vulnerable to data [&hellip;]<\/p>\n","protected":false},"author":250,"featured_media":19223,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15,16],"tags":[4517,3790,2478],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[477,460,452,479,377,31790,143,147,458,480,379],"class_list":["post-19222","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","category-trends","tag-backup","tag-cybersecurity","tag-ransomware","b2b_audience-awareness-and-consideration","b2b_product-backup-software","b2b_product-cloud-backup","b2b_product-cloud-storage","b2b_product-disk-based-backup","b2b_product-gateway-and-network-security","b2b_product-ransomware","b2b_product-security","b2b_product-storage","b2b_product-storage-management","b2b_product-tape-backup-and-libraries","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Preparing for Ransomware: Are Backups Enough? | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Backups are critical to preserving network data and systems, but are they sufficient for ransomware attacks? Learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Preparing for Ransomware: Are Backups Enough? | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Backups are critical to preserving network data and systems, but are they sufficient for ransomware attacks? Learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-10T15:09:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-10T15:09:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.AreBackupsEnough-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sam Ingalls\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/SamIngalls\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam Ingalls\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/\"},\"author\":{\"name\":\"Sam Ingalls\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\"},\"headline\":\"Preparing for Ransomware: Are Backups Enough?\",\"datePublished\":\"2021-09-10T15:09:29+00:00\",\"dateModified\":\"2021-09-10T15:09:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/\"},\"wordCount\":2212,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.AreBackupsEnough-scaled.jpg\",\"keywords\":[\"backup\",\"cybersecurity\",\"ransomware\"],\"articleSection\":[\"Threats\",\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/\",\"name\":\"Preparing for Ransomware: Are Backups Enough? | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.AreBackupsEnough-scaled.jpg\",\"datePublished\":\"2021-09-10T15:09:29+00:00\",\"dateModified\":\"2021-09-10T15:09:32+00:00\",\"description\":\"Backups are critical to preserving network data and systems, but are they sufficient for ransomware attacks? Learn more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.AreBackupsEnough-scaled.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.AreBackupsEnough-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"An image of two people looking at a set of displays, one with worried eyes. Ransomware attacks can be severe for organizations but luckily backups play a crucial role in restoring lost or stolen network data. Sadly, backups aren't enough to fend off every angle of ransomware.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Preparing for Ransomware: Are Backups Enough?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\",\"name\":\"Sam Ingalls\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"caption\":\"Sam Ingalls\"},\"description\":\"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/singalls\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls\"],\"url\":\"https:\/\/www.esecurityplanet.com\/author\/singalls\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Preparing for Ransomware: Are Backups Enough? | eSecurity Planet","description":"Backups are critical to preserving network data and systems, but are they sufficient for ransomware attacks? Learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"Preparing for Ransomware: Are Backups Enough? | eSecurity Planet","og_description":"Backups are critical to preserving network data and systems, but are they sufficient for ransomware attacks? Learn more.","og_url":"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/","og_site_name":"eSecurity Planet","article_published_time":"2021-09-10T15:09:29+00:00","article_modified_time":"2021-09-10T15:09:32+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.AreBackupsEnough-scaled.jpg","type":"image\/jpeg"}],"author":"Sam Ingalls","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/SamIngalls","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Sam Ingalls","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/"},"author":{"name":"Sam Ingalls","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2"},"headline":"Preparing for Ransomware: Are Backups Enough?","datePublished":"2021-09-10T15:09:29+00:00","dateModified":"2021-09-10T15:09:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/"},"wordCount":2212,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.AreBackupsEnough-scaled.jpg","keywords":["backup","cybersecurity","ransomware"],"articleSection":["Threats","Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/","url":"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/","name":"Preparing for Ransomware: Are Backups Enough? | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.AreBackupsEnough-scaled.jpg","datePublished":"2021-09-10T15:09:29+00:00","dateModified":"2021-09-10T15:09:32+00:00","description":"Backups are critical to preserving network data and systems, but are they sufficient for ransomware attacks? Learn more.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.AreBackupsEnough-scaled.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/09\/ESP.AreBackupsEnough-scaled.jpg","width":2560,"height":1707,"caption":"An image of two people looking at a set of displays, one with worried eyes. Ransomware attacks can be severe for organizations but luckily backups play a crucial role in restoring lost or stolen network data. Sadly, backups aren't enough to fend off every angle of ransomware."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/trends\/are-backups-enough-for-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Preparing for Ransomware: Are Backups Enough?"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2","name":"Sam Ingalls","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","caption":"Sam Ingalls"},"description":"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.","sameAs":["https:\/\/www.linkedin.com\/in\/singalls\/","https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls"],"url":"https:\/\/www.esecurityplanet.com\/author\/singalls\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19222"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/250"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=19222"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19222\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/19223"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=19222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=19222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=19222"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=19222"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=19222"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=19222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}