Since ransomware attacks are targeted on data, therefore a straightforward solution to neutralize these assaults is to increase the protection and security of important data sets. We have repeatedly discussed the importance of data backups to ensure that the affected organizations and individuals don’t have to exhaust their budgets on ransomware removal measures. In addition, data backups considerably weaken the position of ransomware operators in ransom bargaining.
With time, different practices of data backups have been developed. Here, we will discuss the 3-2-1 data backup regimen that provides layered protection to data from the shenanigans of ransomware operators. The term ‘3-2-1’ is an easy way to remember what this data backup regimen entails.
Keep 3 Copies of Critical Data
So, 3-2-1 data back practices require companies to have at least 2 secondary copies of the original set of data. Having two extra copies will make it certain that you don’t have to pay the attackers for ransomware removal even if they infiltrate any one of your back-ups.
Use 2 Different Media for Backups
In the midst of ransomware removal activities, no organization wants to face the issue of data backup failure. Using more than one media to store data is, therefore, another way to reduce the downtime following any cryptovirological event.
For instance, if an organization has their primary data saved on internal hard disks then they must use any other (second) medium for data storage. Second data storage medium option can be a cloud, external hard disks, optical disks etc. By using 2 media options, you can rule out the risk of getting stuck due to backup failure.
Keep 1 copy of Data Backup Copy Offsite
A ransomware activity accompanied with any other malicious cyber activity or a natural disaster can result in data blackout in the affected facility. Therefore, to ensure organizations can access their data regardless of the magnitude of the damage, one data copy should be kept offsite.
With the implementation of 3-2-1 data backup management, organizations can neutralize cryptovirological attacks and avoid playing into the hands of perpetrators for ransomware removal.