Business Daily Media

Men's Weekly

.

Cybercriminals are targeting backups: How to protect your business

  • Written by James Bergl, regional vice president ANZ at Datto

Backups are a critical part of any business infrastructure. If your primary data becomes compromised by malicious intent or human error (e.g. accidental deletion), the backup enables the business to be up and running again in the shortest time possible.

However hackers are enterprising people. Backups, a key component of business continuity and disaster recovery (BCDR) plans, are now being targeted by bad actors. If your backup is encrypted due to a ransomware attack, it may appear the only option is to pay the ransom—but even then, can cybercriminals be trusted with their word? If your business’ backup is hit, it means the last line of defence has fallen. So how can businesses improve their cyber resilience and protect their backups? Does your organization has skilled ethical hackers who can tackle these attacks? If not, it is really important to get your employees trained in this field. There is plenty of Ethical Hacking course online from where they can get trained.

Hacking, malware and errors are backups’ biggest threat

According to the Verizon 2020 Data Breach Investigations Report (DBIR), attacks on small and medium sized businesses (SMBs) accounted for 28 per cent of all cyberattacks last year. It also found that malware poses a great threat to SMBs, along with hacking and user error.

In fact, the report found hacking occurred in 45 per cent of breaches, while errors accounted for 22 per cent.

When it comes to compromising backups, hackers are increasingly looking at vulnerabilities in backup software, backup files and the systems where backups are stored.

Backup software by nature requires a high level of access to systems, files and virtual machines. To access this software, hackers are known to steal administrator credentials and use those passwords and logins as a backdoor to infect systems. Some backup software also maintain a configuration database that stores credentials needed to access the backup. By accessing this configuration database, hackers gain access to every connected system.

Other vectors that hackers use include accessing backup files, which are easily identified through their .BAK file extension. If a hacker finds these files, they can simply turn off access or delete the files, making recovery impossible. Remote monitoring and management (RMM) solutions are also a point of compromise, along with remote access to backups, where the hacker obtains easy-to-steal and easy-to-guess passwords.

How to protect your business against backup attacks

There are a number of strategies you can use to protect your backup files against hackers, malware, human error and improve your business’ overall cyber resilience.

The first step you can take is to be proactive and scan for ransomware during backup. Detection and prevention is the best cure for this sort of attack. Most modern backup solutions offer ransomware scanning as an integral part of the package—so use it!

The next step is to make sure backups are kept off-site in a secure location. You need to have an air-gap between your production systems and your backup data so that if your primary data is compromised, there’s no way for the hackers or malware to jump the air-gap and encrypt or otherwise steal your backup data.

If you have offsite backups, they can be used to quickly restore a system that’s been hacked or infected by ransomware. Cloud storage is the perfect solution to this off-prem backup conundrum, allowing business owners to get things up and running quickly after an attack.

It’s critical that you have more than one copy of a backup. With modern backup solutions, granular backups, or snapshots of your data can be captured in increments, from a matter of minutes to up to 24 hours, letting you return to a point in time before your systems were compromised.

Finally, invest in a BCDR solution. This will allow you to recover business operations quickly, either locally, or in the cloud, if your business operations are compromised.

Backups are under attack. Whether it’s hacking, malware or human error, backups can be compromised, so it’s important to prepare your business to be able to recover from an attack and improve overall cyber resilience. With BCDR, as well as offsite backups and malware scanning, you can ensure your organisation is protected.

RogersDigital.com Announces the Launch of TheBulletin.au, a Destination for Business, Policy and Financial Insight

RogersDigital.com has announced the launch of TheBulletin.au, a new national digital publication designed to deliver sharp, data-driven reporting ...

Controlling business spend is helping finance leaders to forecast with confidence

Forecasting has always been central to financial planning; however, traditional methods based on historical trends are no longer enough. Economic ...

From correction to resilience: making the most of Australia’s evolving insurance landscape

Australia is benefiting from one of the most favourable insurance market environments seen in years. However, it’s important to recognise that these...

AI is Changing Trademarking Forever

The launch of ChatGPT in 2022 marked a turning point for AI. In three short years, AI has been integrated into everything from our phone cameras to ...

Times Media Australia Launches Times Australia Today

A New National Digital Publication Designed to Make Sense of Modern Australia Sydney, Australia — 26 November 2025 — Times Media Australia today an...

The Future of Ozi.com.au

Ozi.com.au: The New Benchmark in Australian Digital Services In a digital landscape evolving at breakneck speed, Australian businesses are demand...

hacklink hack forum hacklink film izle hacklink หวยออนไลน์betsmovemavibetvozol türkiyePusulabet Girişสล็อตเว็บตรงgamdom girişpadişahbetMostbetbetofficemavibetcarros usadospin upMostbetdizipalholiganbet girişnn888pradabettipobetpusulabetcasibompusulabetjojobet girişbetofficetipobet girişpusulabetpusulabetholiganbet色情 film izlejojobetnakitbahisJojobet 1106pusulabet girişpusulabet girişpusulabet girişmatbetYakabet1xbet girişjojobetGrandpashabetFİXBETgobahisorisbetbetofficejustintvjojobet girişgiftcardmall/mygiftultrabet girişmatbetbets10royalbetmamibetmadridbetcasibommadridbet girişbetcioslot spacemaniptvcasibomcasibomJojobetmeritkingmeritking girişcasibomdeneme bonusutrgoalsyakabetcasibom girişcasibombetciobetcioultrabetSekabetCasibommadridbetsekabetDinamobetrinabetVdcasinobetpuanMarsbahisatlasbetultrabet girişprimebahiskingroyalprimebahiskingroyal girişholiganbetultrabetultrabetultrabetcasibombetnanoaresbetSahabetmr pachocasibomcasibomcolor pickerpusulabetorisbettipobet girişmatbet girişpusulabet girişbetsmove girişbetsmove girişbetsmove girişholiganbet girişgalabet girişคลิปหลุดไทยCasibomcasibomvaycasinodeneme bonusu veren siteleronwinonwinizmir escorttimebetkonya escorthttps://bogaria-atelier.com/bahsegelgrandbettingtimebetgrandbettingbetofficetimebetultrabetbets10matbet girişRoyal Reelsroyal reelsnorabahistipobet güncel girişKayseri Escortjojobet girişJojobetbetasusNişantaşı EscortlimanbetlimanbetbettiltStreameastcasibomKalebetAresbetfixbetaviator gameÜsküdar Evden Eve Nakliyattimebettimebettimebetbahislionistanbul escort telegrambetparkcasibompantheraproject.netcasibompusulabetmeritbetbetasusmatbet girişvaycasinoholiganbetcasibomstreameast한국야동หวยออนไลน์jojobet girişholiganbet girişpornopadişahbetBetigmabetparkBetigmaBetlora girişgaziantep escorteb7png pokiesbest online casino australiabest online pokies australiareal money pokies online australiabcgame96 casinocrown155 hk casinohb88kh casinoAresbetholiganbetpadişahbetgalabetholiganbet girişbetasuscasibombets10bets10setrabetholiganbetolimposcasinocasinomegaJojobet 1106bets10aresbetblooketasyabahis girişpinbahis girişdeneme bonusu telegramdumanbet girişmatbetStreameastmostbetdaftar situs judi slot gacor hb88 indonesiamostbetmostbetmostbetteosbetmeritcasinomatbetgrandpashabetjojobet giriş