{"id":40020,"date":"2021-03-16T09:59:00","date_gmt":"2021-03-16T09:59:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\/"},"modified":"2021-03-16T09:59:00","modified_gmt":"2021-03-16T09:59:00","slug":"ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\/","title":{"rendered":"Ransomware: How to make sure backups are ready for a real attack"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/06\/cw_engineer_server_check_backup-and-restore_testing_by_casarsaguru_gettyimages-971101238_2400x1600-100800370-large.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The best way to avoid paying ransom to attackers who have infected your systems with ransomware is to have those systems adequately backed up so you can wipe them and restore them from safe backups. Here are several options for making sure those backups are up to the task.<\/p>\n<p>In this article, backup refers to any system that you&#8217;re going to use to respond to a ransomware attack, including old-school backup systems, replication systems, and modern hybrid systems that support backup and disaster recover. For simplicity\u2019s sake, they\u2019ll all be referred to as backup here.<\/p>\n<aside class=\"fakesidebar\">\n<p><strong>More about backup and recovery:<\/strong><\/p>\n<\/aside>\n<h2>Backup everything using the 3-2-1 rule<\/h2>\n<p>Before anything else, one idea is paramount: Back up all the things. Investigate your backup system&#8217;s ability to automatically <a href=\"https:\/\/www.networkworld.com\/article\/3571435\/how-to-make-sure-data-that-should-be-backed-up-gets-backed-up.html\">include all new systems, filesystems, and databases<\/a>. This is easiest in the <a href=\"https:\/\/www.networkworld.com\/article\/3234795\/what-is-virtualization-definition-virtual-machine-hypervisor.html\">virtualization<\/a> world where you can configure your backup system to automatically backup all VMs on a host whenever they show up. This can also be done with tag-based inclusion, where VMs of different types get automatically included based on their \u201cincluded\u201d tags. This is one of the best uses of automation in a backup system&#8211;automatic inclusion of all the things.<\/p>\n<p>Also make sure to follow the <a href=\"https:\/\/www.networkworld.com\/article\/3527303\/for-secure-data-backup-here-s-how-to-do-the-3-2-1-rule-right.html\">3-2-1 rule<\/a> in your backup system, no matter who tries to tell you it\u2019s old-fashioned. The rule says make at least three copies or versions of data stored on two different media, one of which is off-site. The big parts here are the two and the one&#8211;store backups on a different system and in a different location. Don&#8217;t store your backups in the same place as your primary system. Even better, store them on a different operating system and a different physical location, but in the real world <a href=\"https:\/\/www.networkworld.com\/article\/3607688\/how-to-protect-backups-from-ransomware.html\">that\u2019s not always possible<\/a>.<\/p>\n<p>There should be some type of automatic reporting by your backup system so you can be sure the backups you think are happening actually are. This should include both success reporting and failure reporting. A third-party monitoring system is probably best so it can continually look at everything and point out when things are a little off. A reporting system with machine learning would be ideal it can it can notice patterns that indicate problems. This is easier than having to read dozens or hundreds of emails from your backup system every day just to make sure things are working.<\/p>\n<h2>DR security should top the list<\/h2>\n<p>Your backup and DR system should be one of the most secure systems in your computing environment. It should be hard to get to and hard to log into. It should be really hard to login as Administrator or root. Hopefully, your backup system supports role-based administration so you can login as yourself and run backups as you. You should not have to run your backups as root or Administrator. Logging in as those accounts is incredibly dangerous and should be restricted whenever possible.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>Your backup and DR system should also be the most up-to-date system you have. Security patches should be installed there first not last because your backup and DR system is your last line of defense. Make sure it\u2019s not subject to a security hole that should have been patched weeks ago.<\/p>\n<p>All claims of data integrity and immutability go out the window if you have physical access to a server, so the backup server should also be very hard to get to physically. Perhaps it&#8217;s in a different room that requires different physical access, or inside a computer rack that not everybody has the key to. Another great way to do this is to get the backup system out of your <a href=\"https:\/\/www.networkworld.com\/article\/3599213\/what-are-data-centers-how-they-work-and-how-they-are-changing-in-size-and-scope.html\">data center<\/a> altogether. Put it in the cloud.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<h2>Encrypt everything<\/h2>\n<p>All backup communications should be encrypted, so make sure your backup provider is encrypting traffic between systems. That means if you do get an advanced persistent threat, and it is sniffing the network, it\u2019s not going to identify the backup servers or what they&#8217;re up to. This can prevent your backup systems from being attacked by ransomware.<\/p>\n<aside class=\"fakesidebar\"><a href=\"https:\/\/www.networkworld.com\/newsletters\/signup.html\">[Get regularly scheduled insights by signing up for Network World newsletters.]<\/a><\/aside>\n<p>In addition to encrypting backup traffic in flight, you should also encrypt all backup traffic at rest, especially if the data is stored anywhere outside your physical control. This includes <a href=\"https:\/\/www.networkworld.com\/article\/3257808\/why-is-tape-declining-in-the-backup-world.html\">tapes<\/a> that you&#8217;re going to hand over at any time to anyone, including your own employees. This also includes data that you\u2019re storing in cloud-provider networks, because even though they are very secure, nothing is perfect. Make sure that your backup data cannot be used as a way to further investigate your network and attack it.<\/p>\n<h2>Build DR based on business needs<\/h2>\n<p>A well-tested DR system is the best defense against a ransomware attack. A poorly designed system is the best way to guarantee that you end up paying a ransom.<\/p>\n<p>This should be the case in every area of IT, but the DR system should be built on requirements that come from the business. There should be many meetings where requirements like <a href=\"https:\/\/www.networkworld.com\/article\/3328488\/how-to-pick-an-off-site-data-backup-method.html\">recovery time objective (RTO) and recovery point objective (RPO)<\/a> are discussed and agreed to long before you decide how you&#8217;re going to actually meet those requirements. Once you agree to an RTO and RPO, design a backup and DR system that satisfies those requirements.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id> <\/aside>\n<h2>Test like your life depends on it<\/h2>\n<p>A recent news article said that the reason Austin, TX, lost its drinking water for so long during a statewide power failure was that no one at the water-treatment plant knew how to turn on the backup generator. Don&#8217;t be that company. Don&#8217;t be the company that has a perfectly fine backup and DR system and doesn&#8217;t know how to use it. There are too many risks to your data today for you to not follow this crucial piece of advice: Frequently test your DR system.<\/p>\n<p>The good news is that most modern backup and DR systems support frequent testing of the whole system. You can bring up your entire data center in a sandbox as often as you need to so you can see how it actually works. Do it at least quarterly. It should only take a few hours, and it should be boring because it\u2019s proving that it works. If it&#8217;s boring when you test it every quarter, it will be easy when you need to actually use it to recover from ransomware.<\/p>\n<p>Each time you run the test, rotate the personnel who run it. They should not be the people who designed the system nor the people that use the system every day. They should have good technical know-how and be provided with good documentation to follow. That is the best way to confirm that both your system and your documentation work.<\/p>\n<p>A ransomware-ready DR system that can bring your entire data center back online after a ransomware attack is the only way you can avoid paying ransom. Please look into doing this now before your company becomes another statistic.<\/p>\n<aside class=\"nativo-promo nativo-promo-3 tablet desktop smartphone\" id> <\/aside>\n<div class=\"end-note\"> <!-- blx4 #2005 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a> to comment on topics that are top of mind. <\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3611808\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nThe best way to avoid paying ransom to attackers who have infected your systems with ransomware is to have those systems adequately backed up so you can wipe them and restore them from safe backups. Here are several options for making sure those backups are up to the task.In this article, backup refers to any system that you&#8217;re going to use to respond to a ransomware attack, including old-school backup systems, replication systems, and modern hybrid systems that support backup and disaster recover. For simplicity\u2019s sake, they\u2019ll all be referred to as backup here.<br \/>\nMore about backup and recovery:To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":40021,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[9269,9270,307],"class_list":["post-40020","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-backup-systems-and-services","tag-enterprise-storage","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware: How to make sure backups are ready for a real attack 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware: How to make sure backups are ready for a real attack 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-16T09:59:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Ransomware: How to make sure backups are ready for a real attack\",\"datePublished\":\"2021-03-16T09:59:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\\\/\"},\"wordCount\":1216,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack.jpg\",\"keywords\":[\"Backup Systems and Services\",\"Enterprise Storage\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\\\/\",\"name\":\"Ransomware: How to make sure backups are ready for a real attack 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack.jpg\",\"datePublished\":\"2021-03-16T09:59:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Backup Systems and Services\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/backup-systems-and-services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ransomware: How to make sure backups are ready for a real attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware: How to make sure backups are ready for a real attack 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware: How to make sure backups are ready for a real attack 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-03-16T09:59:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Ransomware: How to make sure backups are ready for a real attack","datePublished":"2021-03-16T09:59:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\/"},"wordCount":1216,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack.jpg","keywords":["Backup Systems and Services","Enterprise Storage","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\/","url":"https:\/\/www.threatshub.org\/blog\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\/","name":"Ransomware: How to make sure backups are ready for a real attack 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack.jpg","datePublished":"2021-03-16T09:59:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-how-to-make-sure-backups-are-ready-for-a-real-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Backup Systems and Services","item":"https:\/\/www.threatshub.org\/blog\/tag\/backup-systems-and-services\/"},{"@type":"ListItem","position":3,"name":"Ransomware: How to make sure backups are ready for a real attack"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=40020"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40020\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/40021"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=40020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=40020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=40020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}