{"id":41139,"date":"2021-05-31T10:00:00","date_gmt":"2021-05-31T10:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/make-sure-your-laptop-backups-can-handle-ransomware\/"},"modified":"2021-05-31T10:00:00","modified_gmt":"2021-05-31T10:00:00","slug":"make-sure-your-laptop-backups-can-handle-ransomware","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/make-sure-your-laptop-backups-can-handle-ransomware\/","title":{"rendered":"Make sure your laptop backups can handle ransomware"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/05\/ransomware_attack_worried_businessman_by_andrey_popov_gettyimages-1199291222_cso_2400x1600-100840844-large.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>With increasingly mobile workforces, it\u2019s important to effectively backup corporate data that resides on laptops, which requires a unique set of features not found in traditional backup systems used for desktops attached to corporate LANs.<\/p>\n<p>Laptops have all the functionality of desktops, but are readily lost or stolen, have limited bandwidth for connectivity to corporate resources, and can spend unpredictable spans of time disconnected or turned off. So it\u2019s important to find backup options that meet these challenges, which can also include ransomware attacks.<\/p>\n<aside class=\"fakesidebar\"><a href=\"https:\/\/www.networkworld.com\/article\/3615678\/backup-lessons-from-a-cloud-storage-disaster.html\">Backup lessons from a cloud-storage disaster<\/a><\/aside>\n<p>Backing up laptops properly also makes upgrading them much easier, especially in the world of remote work. A good backup system can restore a user\u2019s profile and data, and makes replacing a laptop much simpler for both the IT department and the person whose laptop is being replaced. With the right system in place, all you have to do is ship them a new laptop.&nbsp; They can restore their own profile and data without IT intervention, saving time, effort, and a lot of money.<\/p>\n<h2>Shortcomings of portable hard drives<\/h2>\n<p>It is possible to backup laptops on portable hard drives, but it\u2019s not a good option for enterprises.<\/p>\n<p>First, it violates the <a href=\"https:\/\/www.networkworld.com\/article\/3527303\/for-secure-data-backup-here-s-how-to-do-the-3-2-1-rule-right.html\">3-2-1 rule<\/a> that states there should be at least three copies or versions of data stored on two different pieces of media, one of which is off-site. Backing up one copy to one medium located right next to the laptop fails all three requirements.<\/p>\n<p>This method is also really bad from a corporate IT perspective. There is no centralized control or reporting over the backup process, making it unwieldly and untrustworthy. It allows the risk of hundreds or thousands of unencrypted copies of corporate data sitting on the portable hard drives, making physical security a concern; it\u2019s super easy to mount a portable hard drive to another laptop and read all its data.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<h2>Limits of traditional backup software<\/h2>\n<p>Another option is using traditional backup software that backs up data at the file level. This will work well for desktops on a LAN, but not for laptops. First there is the fact that laptops are not always connected, and traditional backup software assumes that they are. The traditional system\u2019s backup server kicks off nightly backup on a configured schedule. If a laptop is powered off or disconnected from the network at the time, the backup will fail.<\/p>\n<p>Full-file file incremental backups used by these traditional systems use far too much bandwidth to be practical for laptops that typically operate over lower bandwidth connections, and they tend not to encrypt backup in transit, exposing them to potential interception.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<h2>Sync-and-share limitations<\/h2>\n<p>Some people use services like Dropbox or OneDrive to sync laptops to a cloud that stores a copy of their data. One advantage to this approach is that these products are often included in larger products like Microsoft 365 or Google Workspace, allowing budget-conscious companies to have something that\u2019s similar to backups without having to pay for it. It\u2019s important to note, however, that it will not have the same functionality as a backup product designed for backing up laptops reliably.<\/p>\n<p>One difference between sync-and-share products and backup products is how they handle ransomware attacks.<\/p>\n<p>Once a laptop is infected with ransomware, the malware starts encrypting files silently in the background. This process may take weeks or months before the malware has encrypted enough files to demand the ransom. This means that while the attack is in stealth mode, the ransomware-encrypted files will be synced via the sync-and-share program. Some sync-and-share products store only one version of each file in the cloud, while others store many. But every sync-and-share setup has a limited number of versions it stores.<\/p>\n<p>Ransomware developers know this and have tweaked the stealth phase of their attacks to address it. They repeatedly encrypt a given file, causing it to be synced to the cloud multiple times, so at some point, every version of that file that is stored in the cloud is an encrypted one; there are no unencrypted versions that can be used to restore machines encrypted by the ransomware.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id> <\/aside>\n<p>Backup products designed with laptops in mind, on the other hand, don\u2019t have this limitation. Most have unlimited retention and therefore will always have the version of a file as it existed before being encrypted by ransomware.<\/p>\n<p>The final concern with sync-and-share is that there is no centralized control or reporting that IT can use to ensure that copies of data are being saved. A user can accidentally or maliciously disable the sync process, causing their backups to stop, and IT will have no idea it happened. Any true backup system will have such management and reporting in the base product.<\/p>\n<h2>Laptop-friendly backup<\/h2>\n<p>There are backup systems designed with backing up laptops in mind that can address these problems. They provide the centralized control, scheduling, and monitoring that are essential to corporate IT.<\/p>\n<p>They can also be made invisible to the end user, meaning backups just happen, don\u2019t slow down the laptop, and the typical user won\u2019t have to know or care about them. They are configured by an admin who can monitor them.<\/p>\n<aside class=\"nativo-promo nativo-promo-3 tablet desktop smartphone\" id> <\/aside>\n<p>Because laptops typically have connections with limited bandwidth, it\u2019s desirable to <a href=\"https:\/\/www.networkworld.com\/article\/3302804\/the-correct-levels-of-backup-save-time-bandwidth-space.html\">have block-level incremental<\/a> or <a href=\"https:\/\/www.networkworld.com\/article\/3296623\/what-is-data-deduplication-and-how-is-it-implemented.html\">source-side-deduplication<\/a> backups to reduce the amount of data that needs to be sent to the backup-storage system and so reduce the time the transfer takes. These are features true backup products and services can provide.<\/p>\n<p>End-to-end encryption is also a plus to protect the data in transit.<\/p>\n<p>Specific ransomware protection is another attractive option that can detect an attack, and in the event that an attack succeeds, some backup products and services can simplifying the process of recovering hundreds of files across many directories.<\/p>\n<p>Not all backups for remote systems have all these features, so shop carefully.<\/p>\n<p>Yes, these systems cost money, but you might be surprised how much you can save when it comes time to upgrade or replace these machines. You\u2019ll also be really glad you did this if you get hit by a ransomware attacks, which are not likely to get less common.<\/p>\n<div class=\"end-note\"> <!-- blx4 #2005 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a> to comment on topics that are top of mind. <\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3620302\/make-sure-your-laptop-backups-can-handle-ransomware.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nWith increasingly mobile workforces, it\u2019s important to effectively backup corporate data that resides on laptops, which requires a unique set of features not found in traditional backup systems used for desktops attached to corporate LANs.Laptops have all the functionality of desktops, but are readily lost or stolen, have limited bandwidth for connectivity to corporate resources, and can spend unpredictable spans of time disconnected or turned off. So it\u2019s important to find backup options that meet these challenges, which can also include ransomware attacks.Backup lessons from a cloud-storage disaster<br \/>\nBacking up laptops properly also makes upgrading them much easier, especially in the world of remote work. A good backup system can restore a user\u2019s profile and data, and makes replacing a laptop much simpler for both the IT department and the person whose laptop is being replaced. With the right system in place, all you have to do is ship them a new laptop.\u00a0 They can restore their own profile and data without IT intervention, saving time, effort, and a lot of money.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":41140,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[9269,307],"class_list":["post-41139","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-backup-systems-and-services","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Make sure your laptop backups can handle ransomware 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/make-sure-your-laptop-backups-can-handle-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Make sure your laptop backups can handle ransomware 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/make-sure-your-laptop-backups-can-handle-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-31T10:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/make-sure-your-laptop-backups-can-handle-ransomware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/make-sure-your-laptop-backups-can-handle-ransomware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/make-sure-your-laptop-backups-can-handle-ransomware\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Make sure your laptop backups can handle ransomware\",\"datePublished\":\"2021-05-31T10:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/make-sure-your-laptop-backups-can-handle-ransomware\\\/\"},\"wordCount\":1062,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/make-sure-your-laptop-backups-can-handle-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/make-sure-your-laptop-backups-can-handle-ransomware.jpg\",\"keywords\":[\"Backup Systems and Services\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/make-sure-your-laptop-backups-can-handle-ransomware\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/make-sure-your-laptop-backups-can-handle-ransomware\\\/\",\"name\":\"Make sure your laptop backups can handle ransomware 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/make-sure-your-laptop-backups-can-handle-ransomware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/make-sure-your-laptop-backups-can-handle-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/make-sure-your-laptop-backups-can-handle-ransomware.jpg\",\"datePublished\":\"2021-05-31T10:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/make-sure-your-laptop-backups-can-handle-ransomware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/make-sure-your-laptop-backups-can-handle-ransomware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/make-sure-your-laptop-backups-can-handle-ransomware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/make-sure-your-laptop-backups-can-handle-ransomware.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/make-sure-your-laptop-backups-can-handle-ransomware.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/make-sure-your-laptop-backups-can-handle-ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Backup Systems and Services\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/backup-systems-and-services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Make sure your laptop backups can handle ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Make sure your laptop backups can handle ransomware 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/make-sure-your-laptop-backups-can-handle-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"Make sure your laptop backups can handle ransomware 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/make-sure-your-laptop-backups-can-handle-ransomware\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-05-31T10:00:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/make-sure-your-laptop-backups-can-handle-ransomware.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/make-sure-your-laptop-backups-can-handle-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/make-sure-your-laptop-backups-can-handle-ransomware\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Make sure your laptop backups can handle ransomware","datePublished":"2021-05-31T10:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/make-sure-your-laptop-backups-can-handle-ransomware\/"},"wordCount":1062,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/make-sure-your-laptop-backups-can-handle-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/make-sure-your-laptop-backups-can-handle-ransomware.jpg","keywords":["Backup Systems and Services","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/make-sure-your-laptop-backups-can-handle-ransomware\/","url":"https:\/\/www.threatshub.org\/blog\/make-sure-your-laptop-backups-can-handle-ransomware\/","name":"Make sure your laptop backups can handle ransomware 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/make-sure-your-laptop-backups-can-handle-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/make-sure-your-laptop-backups-can-handle-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/make-sure-your-laptop-backups-can-handle-ransomware.jpg","datePublished":"2021-05-31T10:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/make-sure-your-laptop-backups-can-handle-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/make-sure-your-laptop-backups-can-handle-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/make-sure-your-laptop-backups-can-handle-ransomware\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/make-sure-your-laptop-backups-can-handle-ransomware.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/make-sure-your-laptop-backups-can-handle-ransomware.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/make-sure-your-laptop-backups-can-handle-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Backup Systems and Services","item":"https:\/\/www.threatshub.org\/blog\/tag\/backup-systems-and-services\/"},{"@type":"ListItem","position":3,"name":"Make sure your laptop backups can handle ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=41139"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41139\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/41140"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=41139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=41139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=41139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}