Everyone has backups. Almost nobody tests restores. And the difference between those two things is the difference between recovering from a ransomware attack in hours and paying a seven-figure ransom because your “backups” were encrypted right alongside everything else. Backups are not a checkbox. They’re your last line of defense when everything else has failed — when the attacker has encrypted your servers, when the datacenter floods, when somebody drops the production database at 2 AM on a Friday. If your backups don’t work, nothing else matters.

The question isn’t whether you have backups. The question is: can you restore your critical systems to a known-good state, within a defined timeframe, right now? If you can’t answer that with certainty, keep reading.

DO / DON’T

DO:

DON’T:

Define RPO and RTO

Before you design anything, answer two questions for each critical system:

Recovery Point Objective (RPO)

How much data can you afford to lose?

RPO defines the maximum acceptable age of data to restore. If your RPO is 4 hours, you need backups at least every 4 hours. If your RPO is zero, you need real-time replication.

RPO Meaning Backup Method
Near zero No data loss acceptable Synchronous replication, continuous data protection (CDP)
1-4 hours Minimal data loss acceptable Frequent snapshots, transaction log backups
24 hours One business day of data loss acceptable Daily backups
48-72 hours Multiple days acceptable Daily or twice-weekly backups

Recovery Time Objective (RTO)

How long can the system be down?

RTO defines the maximum acceptable downtime. If your RTO is 1 hour, you need hot standby infrastructure. If your RTO is 48 hours, you can restore from cold backups.

RTO Meaning Recovery Method
Minutes Near-zero downtime Hot standby, automatic failover, load-balanced redundancy
1-4 hours Minimal downtime Warm standby, pre-staged recovery environment, VM snapshots
24 hours One business day Restore from recent backups to existing or cloud infrastructure
48-72 hours Extended downtime acceptable Restore from offsite/offline backups, hardware procurement

RPO and RTO drive your backup architecture, your infrastructure investment, and your testing requirements. Define them with business stakeholders, not IT alone. The CFO and the operations lead need to agree on what “acceptable” means because they’ll live with the consequences. NIST SP 800-34 Rev. 1 provides the framework for contingency planning, including RPO/RTO definition.

The 3-2-1 Rule (and Beyond)

3-2-1

The classic rule:

This protects against hardware failure (multiple copies), media-specific failures (different types), and site-level disasters (offsite copy).

3-2-1-1-0

The modern extension for the ransomware era:

The extra “1” is the ransomware answer. An offline copy that’s physically disconnected from the network, or an immutable copy on storage that prevents modification or deletion even by administrators, is the only backup that ransomware can’t reach.

Immutable Backups

Why Immutability Matters

Modern ransomware operators don’t just encrypt production data. They target backup infrastructure specifically. Groups like BlackCat, LockBit, and Cl0p actively search for and destroy backups before deploying encryption. If your backup server is domain-joined and your backup storage is accessible via the same credentials, the attacker will encrypt your backups too.

How to Achieve Immutability

Object lock / WORM storage:

Air-gapped backups:

Backup account isolation:

CISA’s Ransomware Guide explicitly recommends maintaining offline, encrypted backups and testing restoration regularly.

Backup Scope

What to Back Up

The obvious answer is “everything,” but that’s expensive and ignores priority. Back up in priority order:

Critical (daily or more frequently):

Important (daily):

Standard (weekly):

What Not to Back Up

Testing Restores

Why Testing Matters

The backup succeeded. The job completed. The log shows “success.” None of that means the restore will work. Backup verification failures are discovered at the worst possible time — when you actually need the data.

How to Test

Automated verification:

Restore tests:

Test Type Frequency What It Proves
File-level restore Monthly Individual files can be recovered from backup
System-level restore Quarterly A complete system (OS, applications, data, configuration) can be rebuilt from backup
Full DR exercise Annually The entire recovery procedure works end-to-end, including documentation, personnel, and infrastructure

For each test, measure:

Document every test: date, scope, results, issues discovered, and corrective actions. This documentation serves as evidence for compliance audits and as input for improving the process.

Ransomware-Resistant Architecture

Designing specifically for ransomware resilience:

Monitoring Backups

Don’t wait for a disaster to discover your backups have been failing.

If It Already Happened

If you need to restore and your backups are inadequate, encrypted, or missing:


Backups are insurance. Like insurance, they only matter when everything else has failed — and that’s exactly when you can’t afford to discover they don’t work. Define your RPO and RTO this week. Verify you have at least one immutable or offline copy. Test a restore. If the restore works, you’re ahead of most organizations. If it doesn’t, you just found the problem before an attacker did. Either way, you win.