Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » How to protect backups
Global Security

How to protect backups

AdminBy AdminJune 17, 2025No Comments9 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


The ransom has become highly coordinated and a wide threat, and traditional defense is increasingly fighting for neutralization. Today’s ransomware attacks are initially focused on your last defense line – your backup infrastructure. Before blocking the production environment, cybercrime goes behind backups to cripple your ability to recover, increasing the chances of paying the redemption.

It is noteworthy that these attacks are carefully developed by strike protection. The actors threaten the backup agents, remove the pictures, change the content policy, encrypt backup volumes (especially those available on the net) and use vulnerabilities in integrated reserve platforms. They no longer try to deny your access, but remove the recovery funds themselves. If your reserve environment is not built in view of this develops the threat landscape, it is at high risk of violation.

How can this defend against this? In this guide, we will find weak strategies that leave backups and study effective steps to harden both on the site and cloud reserve copies against extortion. Let’s see how to create a sustainable backup strategy that you can trust on 100% even in complex ransomware attacks.

Common pitfalls that leave backup

Insufficient divisions and lack of running or unchanged copies are one of the most common weaknesses in backup strategies. Shooting or local backups are not enough; If they live in the same environment at the place as the production systems, they can be easily detected, encrypted or removed by attackers. Without proper insulation, the reserve environment is very sensitive to lateral motion, which allows the required program to spread from the impaired system to the backup infrastructure.

Here are some of the most common side attacks used to compromise backup:

  • Active Directory (AD) attacks: Attackers use advertising to escalate privileges and access to reserve systems.
  • Virtual host absorption: malicious subjects use improper configuration or vulnerability in guest tools or hypervisar to control hypervisar and virtual machines (VMS), including backups of hosting.
  • Windows -based software attacks: Threatening actors operate built -in Windows services and known behavior in versions to enter backup and backup.
  • Overall vulnerabilities and exposure (CVE) exploit: Cves with high speed regularly aimed at violation of backup hosts before applying the patches.

Another large pitfall rests on one cloud backup supplier, which creates a single refusal point and increases the risk of total data loss. For example, if you back up Microsoft 365 in Microsoft, your backup infrastructure and source systems share the same ecosystem that makes them easily detect. With stolen credentials or app programming (API), attackers can compromise at once.

Resistance to backup with strategy 3-2-1-0

The 3-2 –1 backup rule was a gold standard for data protection. However, since the ransom is increasingly aiming at the backup infrastructure, this is already not enough. Today’s threat landscape requires a more elastic approach that suggests that attackers will try to destroy your ability to recover.

This is where the strategy is 3-2-1-1-0. This approach is aimed at keeping three copies of your data and store them on two different carriers, with one copy outside the place, one unchanged copy and zero mistakes.

Figure 1: Backup strategy 3-2-1-0

Here’s how it works:

3 copies of data: 1 Production + 2 Backups

When backup, it is very important not to rely solely on backups at the file level. Use backups based on images that fix the full system-operative system (OS), applications, settings and data-for more complete recovery. Look for opportunities such as naked metal recovery and instant virtualization.

For greater insulation and control, use a special backup (physical or virtual) instead of standard backup software. Looking for appliances, consider, built on the tempered Linux to reduce the attack surface and avoid Windows -based vulnerabilities and usually focused file types.

2 different media formats

Keep backups on two different media types – a local disc and cloud storage – to diversify risk and preventing the simultaneous compromise.

1 off -road copies

Make sure that one backup is stored outside the place and geographically separated to protect against natural disasters or attacks on the entire site. Use a physical or logical air store where only this is possible.

1 The unchanged copy

Support at least one copy of the backup in the unchanged cloud repository so that it may not be changed, encrypted by either ransom or Rogue users.

0 errors

Backups should be regularly tested, tested and controlled to make sure they are without errors and can be returned if necessary. Your strategy is not completed until you are complete confidence in recovery.

To make a 3-2-1-0 strategy really effective, it is important to harden the environment where your backup live. Consider the following best practices:

  • Expand the backup server on Wednesday Safe Local Network (LAN) to limit the availability.
  • Limit access using the principle of the least privilege. Use Access Control (RBAC) to provide any local domain accounts that have administrator rights over backup systems.
  • Segmental backup networks without incoming traffic from the Internet. Allow the exit. In addition, only protected systems should be able to communicate with the backup server.
  • Use firewall to implement network access control and using access control lists on the port (ACLS) on the networking port ports.
  • Deployment of encryption at the agent level, so the data written on the backup server is encrypted with a unique key that you can only create from your own password.
  • Disable unused services and ports to reduce the number of potential attack vectors.
  • Include multifactorial authentication (MFA) -In biometric rather than a one-time password (TotP) for all access to the backup environment.
  • Keep backup systems soaked and informed to avoid the impact of known vulnerabilities.
  • Physically safe are all backup devices with blocked housing, access logs and observation measures.

Best Practice to Backup Copies

Ransomware can just as easily focus on cloud platforms, especially when backup live in the same ecosystem. That is why segmentation and isolation are crucial.

Data segmentation and insulation

To create a real air gap in the cloud, the backup data must be in a separate cloud infrastructure with its own authentication system. Avoid any dependence on the mystery or authority stored by production. This department reduces the risk of production conditions that affect your backups.

Use Private Backup Architecture Cloud

Choose the services that move backup data from the original environment and to an alternative cloud environment, such as a private cloud. This creates a logically isolated environment that is protected from the original vectors, providing protection against the air required to confront the modern required program. General conditions make it easier to identify, access to access or destruction of both sources and reserve assets in one company.

Authentication and access control

Cloud backups should use a completely separate identity system. Relection of the Foreign Ministry (preferably biometric), RBAC and warning about unauthorized changes such as deleting agents or detention policy modification. Account data should never be stored in the same ecosystem. Keeping access and secrets by the production environment (such as Azure or Microsoft 365) eliminates any dependence on them to restore the backup.

As Datto BCDR provides backups for 100% trust recovery

Even with the right strategy, the stability eventually depends on the tools you choose. This is where the Datto platform stands out for continuity and resumption of disaster (BCDR). Datto BCDR offers unobstructed local and cloud continuity that operates from Siris and Alto devices and the unchanged Datto BCDR Cloud. This ensures that your backups can always be restored, even in the worst scenarios.

Fig. 2: How Datto BCDR provides the continuity of the business

Here’s how Datto BCDR provides guaranteed recovery:

  • Local and cloudy excess: Datto BCDR provides reliable backups that have doubled as local recovery purposes. You can run workloads and applications directly on your device while refusing. When Prem system systems are broken, the recovery is unobstructed to the Datto BCDR cloud for virtual operations, providing business continuity without violations.
  • The power of unchanged datto -bcdr cloud: Built -in purposeful for backup and recovery of accidents, the Datto BCDR cloud provides unmatched flexibility, safety and performance. This goes beyond the main shelter to offer multi -layered protection, making critical data both safe and instantly restored.
  • Effective redemption protection: DATTO devices work on quenched Linux architecture to soften the vulnerabilities that are usually focused on Windows systems. They also include the built -in detection of ransomware, which is actively scanning the threat before recovery.
  • Automated, tested backup test: Automated Datto screenshot check confirms that VMS can boot from backup. It also conducts checking at the application level to ensure the proper work of the load after recovery, helping IT team confirm the recovery without assumptions.
  • Lightning recovery options to make recovery unobstructed inclusion:
    • Functions such as Recovery of emergency disasters per 1 kmol (1 click DR) that make up the following consequences.
    • Safe backups based on images to restore the complete system.
    • Cloud Defense ™ for instantly restore deleted cloud shots, whether random or malicious.

Is it time to rethink the backup strategy?

Cyber ​​-Resistance begins with backup safety. Before applying baked bite, ask yourself: Do your backups are separated from your production systems? Is it possible to remove them or encrypts from the violated accounts? When did you last testing their testing?

Now it’s time to evaluate a backup strategy through a risk lens. Identify the blanks, strengthen the weak points and make a restoration of certainty.

Learn how Datto BCDR can help you implement safe, sustainable backup architecture built for real world threats. Get prices today.

Found this article interesting? This article is a contribution to one of our esteemed partners. Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

Silver Fox Apt has on target Taiwan with sophisticated GH0Stcringe and Holdinghands Rats Malicious Programs

June 17, 2025

Google warns about scattered spider attacks focused on IT -commander by US insurance firms

June 17, 2025

Password “B” in Sitecore XP Sparks Sparks Erriss RCE when deploying businesses

June 17, 2025

Are you forgotten accounts of advertising services that leave you risk?

June 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025

Silver Fox Apt has on target Taiwan with sophisticated GH0Stcringe and Holdinghands Rats Malicious Programs

June 17, 2025

Google warns about scattered spider attacks focused on IT -commander by US insurance firms

June 17, 2025

Password “B” in Sitecore XP Sparks Sparks Erriss RCE when deploying businesses

June 17, 2025

Are you forgotten accounts of advertising services that leave you risk?

June 17, 2025

New Flodrix Botnet Option Operates Langflow Ai Server RCE BUG to launch DDOS ATTACKS

June 17, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.