What would you do if tomorrow your systems were hijacked by ransomware and your backups were also compromised? Sounds like a nightmare, right? But that's exactly what's happening to many companies today. Ransomware is no longer content with blocking your production environment; now it's going after your last line of defense: your backups.
Attackers have refined their methods. They no longer go in blindly. They do it strategically: they disable backup agents, delete snapshots, change retention policies, encrypt network-attached volumes, and exploit any weaknesses in your backup systems. Their goal is clear: to leave you with no way to recover, and no choice but to pay the ransom.
If your backups aren't designed with these types of attacks in mind, you're walking a tightrope. But don't worry: in this guide, we'll look at common mistakes that can leave you exposed and, more importantly, how to build a strong, reliable, ransomware-resistant backup strategy, whether you work with local copies, cloud copies, or both.
Common mistakes that leave your backups hanging in the balance
One of the most common mistakes when it comes to protecting backups is not keeping them well separated from the rest of the system. Often, external or immutable copies are not used, and only typical local copies or snapshots are relied upon. But if those backups are in the same environment as the production systems... you're in trouble. Attackers can easily find them and do what they do best: encrypt or delete them.
The big problem? Lack of isolation. If backup systems are connected to the same network or environment as compromised computers, ransomware can move unhindered until it reaches them. This is called lateral movement, and it's one of attackers' favorite strategies.
Here are some of the most common ways cybercriminals manage to sneak into your backups:
-
Active Directory (AD) attacks: They use this user management tool to escalate privileges and get where they shouldn't, including your backup systems.
-
Virtual host hijacking: If the virtual machine (VM) environment is poorly configured or has vulnerabilities, attackers can take control of the hypervisor (the software that manages them) and access everything... including backups.
-
Attacks using Windows tools: Many backup programs run on Windows, so hackers take advantage of system services and weaknesses to gain access without raising suspicion.
-
Exploitation of known vulnerabilities (CVE): If you don't apply security patches in time, attackers can use already documented flaws to gain access.
And that's not all. Another common mistake is to rely entirely on a single cloud provider for your backups. It sounds practical, but it can become a big risk: if that provider fails or is compromised, you could lose everything. For example, if you back up Microsoft 365 within the Microsoft ecosystem itself, you're putting all your eggs in one basket. If an attacker gains access to your account or APIs, they have free rein to both the original system and your backups.
Make your backups truly resilient with the 3-2-1-1-0 strategy
The famous 3-2-1 backup rule has been the basic recipe for protecting our data for years. And yes, it's still very useful. But let's be honest: ransomware attacks have stepped up their game, and that means we have to too. It's no longer enough to have several copies saved... now we need to make sure those copies are truly foolproof.
That's where the 3-2-1-1-0 strategy comes in, an improved version that helps you be prepared for even the worst-case scenarios. What does that mean? Let's break it down:
3 copies of your data: 1 original + 2 backups
It's always good to have more than one copy. But it's not just about saving individual files; ideally, you should make complete copies of the system, known as image backups. This ensures that you can restore everything (operating system, apps, settings, etc.) exactly as it was, without having to start from scratch.
Also, if you can, use a dedicated backup device (physical or virtual) instead of relying solely on generic software. If possible, look for solutions based on hardened Linux, as they tend to be more secure than those based on Windows.
2 different types of media
This is simple: don't put all your copies on the same type of storage. For example, save one on a local disk and another in the cloud. That way, if an attack affects one, the other can still save you.
1 off-site copy
Having a copy in another physical location or in a different geographical location protects you against natural disasters or attacks that affect your entire network. And if you can, it's even better if it's isolated from the rest of the system (known as air-gapped, either physically or logically).
1 immutable copy
This is key today. An immutable copy is one that cannot be modified, encrypted, or deleted, even by a user with access. How is this achieved? By using cloud storage with WORM (Write Once, Read Many) policies, which ensure that the copy remains intact for a specified period of time.
0 errors
There is no point in having backups if they don't work when you need them. That's why you have to test them regularly. Verify that they are being done correctly, that they have no errors, and that you can restore them without any problems. Only then can you rest assured that everything will work when the critical moment arrives.
Read more: What are Backup Recovery Tests?
So, how do you put all this into practice?
This is where a good backup solution can make all the difference. If you don't want to set everything up from scratch or worry about integrating multiple tools, it's best to use a solution that's ready to go.
At TecnetOne, we offer TecnetProtect Backup, a solution based on Acronis technology, one of the most reliable backup and cyber protection platforms in the world. With TecnetProtect Backup, you can apply the 3-2-1-1-0 strategy without complications. Some of its advantages:
-
Full or incremental backups, depending on your needs.
-
Storage on multiple media: local, cloud, or a combination.
-
Immutability features so you have copies that even ransomware can't touch.
-
Easy-to-use management console with alerts, reports, and total control.
-
High-level security: strong encryption, MFA, and role-based access control.
-
All in one solution, without having to rely on multiple providers or struggle with complex configurations.
In short: it's a tool designed to keep your backups safe and give you peace of mind.
Read more: What is TecnetProtect Backup?
Best practices for protecting your backups in the cloud
Although we sometimes think that the cloud is “untouchable,” the reality is that ransomware can also attack it, and it does so more often than you might think. This is especially true when backups are stored in the same environment as your production systems. That's why isolating and segmenting those backups is key to keeping them safe.
Isolation and segmentation: don't mix everything together
If you want something similar to an air gap (a secure separation) but in the cloud, then your backups should not live in the same place as your main system. The idea is to store them in a different cloud infrastructure, with its own access and authentication system.
Avoid using the same passwords, access codes, or secret keys that you use in production at all costs. The more separated your backups are from the original environment, the more difficult it will be for an attack that affects your main system to also delete your backups.
Better if you use a private cloud or an alternative environment
Instead of backing up to the same service where you have everything else, opt for solutions that take data out of the original environment and store it in an alternate location, such as a private cloud or a separate platform.
This creates a more secure, logically isolated space that cannot be accessed with the same credentials as the original system. That way, if there's a breach in your main infrastructure, your backups won't go down with everything else.
A clear example is what TecnetProtect Backup offers, which automates this type of protection: your data is backed up outside the source environment, in a secure and separate infrastructure, with independent access controls. This drastically reduces the risk of a single attack compromising both your systems and your backups.
And yes, making backups within the same ecosystem (such as saving Microsoft 365 backups to OneDrive) may seem practical, but it actually makes life easier for attackers. On the other hand, if you keep them well separated (as TecnetProtect does), you complicate the picture for them, and that gives you a big advantage in cybersecurity.
Access control: less is more
Cloud backups need to have their own identity and access system. No sharing users with other systems. Here are some best practices:
-
Use multi-factor authentication (MFA), and if possible, biometric authentication (such as fingerprint or face recognition), not just temporary codes.
-
Apply role-based access control (RBAC) so that everyone only has access to what they need.
-
Enable alerts that notify you if someone tries to delete agents or change important settings such as the retention policy.
-
Don't store your passwords or tokens in the same place you back up. This is like leaving the key to your safe inside the safe itself.
For example, if you are backing up Microsoft 365, it is best not to store access tokens within the Microsoft environment itself. By keeping them elsewhere, you ensure that you don't depend on that ecosystem to recover your information if something goes wrong.
Nowadays, having backups is no longer enough. They must be well done, well protected, and have a clear strategy that you can apply without complications. If you are looking for a robust, easy-to-use solution that allows you to sleep peacefully, TecnetProtect Backup is an excellent option.
How TecnetProtect Backup protects your backups for 100% recovery
When it comes to ransomware, human error, or technical failures, having a backup is not enough... what really matters is being able to recover it quickly, reliably, and without surprises. And that's where TecnetProtect Backup comes in.
This solution, based on Acronis technology, is designed to give you real backup: one that not only stores your data, but actively protects it and ensures that you can recover it when you need it most.
Total protection with intelligent backup
TecnetProtect Backup combines the best of both worlds: backup and cyber protection. This means that your copies are not only stored, but also monitored against malware, ransomware, and unauthorized tampering.
Among its main protection measures are:
-
Immutable copies in the cloud, which cannot be encrypted, edited, or deleted by anyone (not even compromised administrators).
-
Logical isolation of backups, which prevents an attack on your main system from affecting your copies.
-
End-to-end encryption, from the moment the data leaves your computer until it reaches storage, with keys that you control.
-
Multi-site storage, which allows you to store your data in different locations (local, cloud, hybrid), reducing single points of failure.
-
Fast and flexible recovery, whether you need to restore a single file, an entire system, or even run a VM directly from the backup.
Secure password protection and file recovery
Proactive security: detect and block threats before it's too late
Thanks to the Acronis protection engine, TecnetProtect Backup can detect suspicious behavior in real time, such as mass encryption attempts or anomalous access, and act immediately to prevent damage to your backups.
It also includes:
-
Multi-factor authentication (MFA) for all sensitive operations.
-
Role-based access control (RBAC), so each user only sees what they need to see.
-
Automated alerts and reports, so you are always aware of the status of your backups.
Complete device management and more
And that's not all. One of the great advantages of TecnetProtect Backup is that it also includes centralized device management tools. From a single console, you can:
-
Monitor all protected equipment (servers, PCs, laptops, etc.),
-
View the status of each backup and its history,
-
Apply backup policies on a mass or customized basis,
-
Manage storage usage and schedule automatic tasks.
This not only gives you total control, but also saves time and reduces operational errors. Ideal for IT teams looking for efficiency without sacrificing security.
Guaranteed recovery: when you need it, it works
TecnetProtect Backup is designed with a single goal in mind: to ensure that your backups are there when you need them most, and that you can restore them without losing information or valuable time.
The solution is constantly tested and validated to ensure that each copy is complete, functional, and error-free, eliminating those dreaded “failed backups” that you only discover when it's too late.
Is it time to rethink your backup strategy?
Digital resilience starts with something basic but crucial: keeping your backups well protected. Before ransomware comes knocking on your door, it's worth asking yourself:
-
Are your backups truly separate from your production systems?
-
Could they be deleted or encrypted if an account with access is compromised?
-
How long has it been since you tested a full restore?
If you don't have clear or confident answers, now is a good time to evaluate your backup strategy with a more realistic, risk-based approach. Identify weaknesses, correct what needs to be corrected, and ensure that if something goes wrong, recovery is a certainty... not a question.
And to achieve this without complicating your life, TecnetProtect Backup can help you implement a modern, secure, and resilient backup architecture designed to meet real-world challenges: attacks, human error, system crashes, and whatever else may come your way. Ready to take your backups seriously?