With the increase of ransomware attacking vital business processes, Redpoint Cyber suggests strict adherence to the 3-2-1 backup strategy to ensure that, in the event of a data breach, the availability of uncompromised vital business operational data will remain intact. What does this mean?
3 – Have Three Total Copies of Your Data
This includes the primary copy and at least two backups. The primary copy should reside on the local server on the premises.
2 – Two Different Types of Media Storage
Two of your three data copies should reside independently of your local network; one copy should be kept in a secure location locally, such as in a locked drawer on a removable media storage device (external hard drive, USB, etc.).
1 – One Offsite Copy
One copy of your data needs to be located either in a secondary location or in a private cloud. Storing backups in the cloud is often the most efficient and cost-effective option.
Other ways to secure your backup data
Redpoint recommends a hybrid deployment of the offsite and cloud approaches to backups.
The best way to physically secure an offline backup is by disconnecting it from your network. Ransomware cannot encrypt a backup that is disconnected from the network, such as an external hard drive. Additionally, cloud-based backup solutions with low recovery time objectives (RTOs) should be utilized by enterprise administrators. Commercial off the Shelf (COTS) cloud-based solutions offer fast restoration of files, virtual machines (VMs), and NAS applications.
Conducting back-ups on an hourly or daily basis is vital for organizations to properly secure their data and avoid losing vital business data in the event of a breach. By creating a strategy that conforms to the 3-2-1 backup strategy, enterprise administrators can ensure the confidentiality, integrity, and availability of data backups and therefore protect their business’ stakeholders. Implementing this and other proactive threat mitigation strategies are instrumental in preventing excessive business interruptions in the event of a security event.
Email us at email@example.com to learn more about the proactive cybersecurity strategies you can use to protect yourself from cyber attacks.