![]() ![]() But taking into account the increasing frequency of ransomware attacks and their tendency to become more backup-oriented, backups require additional protection. Until recently, the 3-2-1 rule was the industry standard companies who cared about their data were following this rule and considered themselves to be fine. The Difference Between the 3-2-1 and 3-2-1-1-0 Backup Rules The 3-2-1-1-0 rule is about not keeping all your eggs in one basket, so that in any case you are able to make your omelette. Two different storages and three copies guarantee that at least one will be available somewhere to help you to get back to work. If one copy is off-site, then you can use it in the event of any disaster in your office. If one copy is offline, no malware can reach it via the Internet. If your backups have zero errors, you can restore your data and continue working. This strategy provides you with the highest data recoverability and, thus, offers the best protection from ransomware. ![]() Your backups should have completed with 0 errors.At least 1 copy should be kept offline or, if you prefer to use clouds, be immutable (immutability means that this copy cannot be modified in any way, under any circumstances).At least 1 of the copies should be kept off-site, in case your machines are physically damaged.At least 2 different storage media should be used for instance, a tape and a cloud storage.You should have at least 3 copies of your data, including the production copy.The 3-2-1-1-0 backup rule calls for five conditions to be met: One such method is the 3-2-1-1-0 backup rule. New methods of keeping your data secure should be implemented. ![]() This means that even gold standards of data protection might be not enough to actually protect the data. Most likely, these attacks will affect backups, as intruders prefer to make sure that you can’t just restore your data without paying the ransom. The Gartner experts predict that by 2025, up to 75% of IT companies will become the target of one or more ransomware attacks. The number of cyberattacks is constantly growing they happen more and more often, and hackers are inventing more and more methods to reach companies’ sensitive data in order to make profit from it. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |