Learning Library

← Back to Library

Four Backup Strategies to Thwart Ransomware

Key Points

  • Backups become critical when ransomware strikes, and there are four primary strategies to consider: local, cloud‑based, air‑gapped, and immutable backups.
  • Local backups (e.g., USB or network drives) are fast but share the same attack surface as the primary data, so if ransomware encrypts the main system it can also corrupt the backup.
  • Cloud‑based backups store copies off‑site, protecting against local ransomware and physical disasters, but they suffer from slower restore times that can take hours or days over the internet.
  • True air‑gapped backups are completely isolated from the production network, making them highly resistant to ransomware spread, though many “air‑gap” claims are ineffective if any network link remains.
  • Immutable backups (not detailed in the excerpt) add another layer of protection by preventing any changes to stored data, ensuring that even if an attacker gains access, the backup remains untampered.

Full Transcript

# Four Backup Strategies to Thwart Ransomware **Source:** [https://www.youtube.com/watch?v=iDdsq_VbeTc](https://www.youtube.com/watch?v=iDdsq_VbeTc) **Duration:** 00:04:59 ## Summary - Backups become critical when ransomware strikes, and there are four primary strategies to consider: local, cloud‑based, air‑gapped, and immutable backups. - Local backups (e.g., USB or network drives) are fast but share the same attack surface as the primary data, so if ransomware encrypts the main system it can also corrupt the backup. - Cloud‑based backups store copies off‑site, protecting against local ransomware and physical disasters, but they suffer from slower restore times that can take hours or days over the internet. - True air‑gapped backups are completely isolated from the production network, making them highly resistant to ransomware spread, though many “air‑gap” claims are ineffective if any network link remains. - Immutable backups (not detailed in the excerpt) add another layer of protection by preventing any changes to stored data, ensuring that even if an attacker gains access, the backup remains untampered. ## Sections - [00:00:00](https://www.youtube.com/watch?v=iDdsq_VbeTc&t=0s) **Untitled Section** - ## Full Transcript
0:00backing up your data is not the most 0:02exciting topic until you really need it 0:04once you've been hit by ransomware 0:06you're going to wish you've done what 0:08I'm going to talk about 0:09there are four different strategies that 0:11we could have for doing backups local 0:13backups cloud-based backups air gapped 0:17backups or immutable backups there's 0:19actually more but I'm going to summarize 0:21it with those four main approaches and 0:23we'll talk about the pros and cons of 0:25those and how they can prepare you so 0:28that when the ransomware attacker 0:29demands money you can thumb your nose at 0:32him and go along your Merry way so the 0:35first I'll talk about is a local backup 0:37in this case I've got my data and I'm 0:40just going to copy it to another data 0:43source maybe it's a USB attached drive 0:45it could be network attached drive but 0:49it's essentially local to my system 0:51and there's advantages and disadvantages 0:53to this the pros are it's pretty fast 0:56because it's a local attachment but the 0:59downside is it's vulnerable to 1:02ransomware if an attacker comes along 1:05and encrypts the main source if they 1:07have access to that because it's locally 1:10attached they probably have access to 1:12the backup as well and if your backup is 1:15encrypted then it's not going to do you 1:17any good at all so the next approach 1:19then would be a cloud-based backup in 1:21this case I've got my local data and I'm 1:25going to send it off to some cloud-based 1:28storage 1:29I don't really know where it is I don't 1:31care but the fact of the matter is the 1:33data is someplace else so that when this 1:36gets encrypted as long as I have 1:38multiple copies back here it doesn't 1:41automatically encrypt elsewhere it's not 1:43part of the locally attached file system 1:45in particular so I have an advantage 1:49here of disaster recovery for instance 1:52if my system goes down if it gets burned 1:56up in a fire if there's some sort of 1:58natural disaster as well I also have the 2:00ability to recover that from the cloud 2:02so that's a big Advantage now there's 2:04other things that could be a 2:06disadvantage and that speed so it's 2:08going to be slower we've got to go 2:10across the internet in order to get the 2:13information if you try to recover an 2:14entire system that way you may be 2:17waiting hours maybe days before you get 2:19all of your information back so that's a 2:22problem 2:22now yet another approach and this is one 2:25I hear a lot of clients talk about is 2:28doing what they refer to as an air gap 2:30in this case 2:32there is some sort of breakage between 2:36the two that's what a true air gap is a 2:38lot of people talk about air gaps but 2:40don't really do them as long as there is 2:42a network connection it's not air gapped 2:45air gap means air that's the only thing 2:47that can be between the two systems so 2:49they have to be on entirely different 2:51networks for that to be the case 2:53now the advantage here is if an attacker 2:57does get to this system and encrypts it 2:59it's not going to encrypt the other 3:01because there's no connection so this 3:03copy is still sitting there pristine 3:06that's an advantage it's more secure 3:08than some of the others I've talked 3:09about what's the disadvantage well 3:12it's not current because there's no 3:15connection there all the time whenever I 3:18update my data then my backup is not 3:22also updated so it falls out of sync 3:25pretty quickly 3:27the fourth approach that I'm going to 3:29talk to you about is called an immutable 3:31backup 3:32an immutable backup is one where I can 3:35write 3:37only one time 3:39so I can take my data and write it over 3:42to the other backup media and once it's 3:45been written it can't be written again 3:48so this is what we also sometimes refer 3:51to as a worm drive or a worm system 3:53write once read many 3:56so I can read it as many times as I want 3:58but no one can override it so if the 4:00ransomware attacker comes along and 4:02encrypts this Source they can't also 4:05encrypt the other because it can't be 4:07overwritten the advantage here then is 4:09it's more secure than some of the other 4:12options I talked about it also has the 4:14advantage of being relatively fast 4:16because it's fairly locally connected 4:19it also has the advantage of not being 4:21vulnerable to ransomware as I just 4:23discussed only real downside may be that 4:27it doesn't do some of the Dr Disaster 4:29Recovery type of scenarios because it is 4:31co-located it's near my system but as as 4:35many people would say two backups equal 4:39really just one backup and one backup is 4:42equal to none you really might want to 4:45use multiples of these strategies so 4:47that you're really prepared in case you 4:48get attacked thanks for watching please 4:51remember to like this video And 4:53subscribe to this channel so we can 4:54continue to bring you content that 4:56matters to you