written by
Becca Calloway

System Backups: Strong Defense or False Security?

Reliable Backups 3 min read
Security Backups

Is your backup system defending your organization against ransomware, or is it just another target?

We tend to think of automatic emergency backups as a strong line of defense against all sorts of threats. That’s pretty much right: backups should provide this kind of defense, and in fact we recommend such systems to our clients and have helped many businesses set up and maintain backup and disaster recovery (BDR) solutions.

But BDR systems have a dark side and can even become vulnerabilities themselves without proper care.

Here’s what you need to know.

What Are Backup Systems and BDR?

First, some definitions.

Backup systems store copies of files, information, and even entire systems somewhere else, not attached to your main network. This could be an off-site server or even a tape-based system, but these days the most common solution for small businesses is a cloud backup.

Backup and disaster recovery refers not just to the servers or the stuff stored on them, but to the methods an organization will use to return to operational status after a disaster. Having a copy of everything critical is a vital first step, but that copy won’t be very useful if you don’t have a plan in place for how and where to restore that backup.

Backup Systems Can Give a False Sense of Security

Because BDR systems should be a big boost to an organization’s security, these systems can lull business leaders into a false sense of security, leading them to assume their BDR system will be the cure to any and all problems.

Tornado, hurricane, fire, flood? Check.

Physical damage to facilities/servers? Check.

Cyberattack or ransomware attack? Check.

In theory, this is right. After any of those events, a business should be able to restore functional operations from a backup of critical systems.

The thing is, that’s only right if the system is right.

Unfortunately, it’s not uncommon for businesses to invest in BDR systems and then forget about them (they’re intended to run in the background after all), only to discover at the worst possible moment that the system isn’t backing up as expected. If this happens to you, you could be stranded with no path to recovery.

If you already have BDR set up for your business, how confident are you that that system is working as intended?

  • Do you know how recent your latest backup was taken?
  • Do you know whether your most recent backup is functional?
  • Do you know what steps you would take to restore from that backup?

If you can’t answer these questions confidently, then it’s time to work with a partner like us to shore up your BDR systems.

Cyber Criminals Are Now Targeting Backup Systems

Another big problem with BDR is that cyber criminals are starting to target these systems, too. They know that a ransomware attack isn’t likely to work if a business has a robust, accessible backup to the compromised system, so some groups are creating more sophisticated attacks.

With ransomware attacks, it’s often the case that attackers have access to systems for a period of time before they launch the attack. They take time to explore the system for vulnerabilities they can exploit. If they find a way into the backup system, they can work into that system and lock both your live systems and your backups behind ransomware. Not good!

Time to Shore Up Your BDR

The good news is there are steps you can take. Every organization should start with regularly verifying that their backup solutions are working as expected, not creating regular failed backups. (There are even BDR tools that can report this to you automatically.)

Second, make sure your backup systems are encrypted. This seems like a no-brainer, but around a third of businesses admit to using unencrypted backup systems.

Third, make sure your systems are up to date with the latest security patches so the bad guys don’t have easy ways to get in.

We can help you with all of this: reach out anytime to evaluate your backup and disaster recovery framework.

Reliable Backups