{"id":29548,"date":"2026-04-02T07:36:52","date_gmt":"2026-04-02T06:36:52","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=29548"},"modified":"2026-04-02T07:36:55","modified_gmt":"2026-04-02T06:36:55","slug":"backups-the-last-line-of-defense-against-ransomware-part-1","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/","title":{"rendered":"Backups : The Last Line of\u00a0Defense\u00a0Against Ransomware\u00a0&#8211; Part 1\u00a0"},"content":{"rendered":"\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">In 2025, ransomware attacks remained a persistent threat and increasingly targeted backup systems (21% of attacks targeted backups in 2021, compared with 90% in 2025 [<\/span><span data-contrast=\"auto\">1] <\/span><span data-contrast=\"auto\">). Protecting backups,&nbsp;now also subject to strengthened regulatory requirements such as NIS 2,&nbsp;has therefore become a top priority in addressing this threat.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:360}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">This article presents four complementary approaches to strengthening end-to-end backup security:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<ol>\n<li><strong>Continuously ensuring the availability of usable backups&nbsp;<\/strong><\/li>\n<li><strong>Strengthening the security of the backup infrastructure against attacker takeover&nbsp;<\/strong><\/li>\n<li><strong>Protecting backups against logical destruction&nbsp;<\/strong><\/li>\n<li><strong>Identifying&nbsp;residual risks&nbsp;in light of&nbsp;the measures implemented&nbsp;<\/strong><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">This article is published in two parts: the first focuses on approaches 1 and 2, followed by a second publication covering approaches 3 and 4.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The recommendations presented do not replace those set out in ANSSI guidelines, which define the fundamental principles of backup [<\/span><span data-contrast=\"auto\">2]<\/span><span data-contrast=\"auto\">&nbsp;practices.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:2,&quot;335551620&quot;:2}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-29535\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/image.png\" alt=\"Renforcer la s\u00e9curisation des sauvegardes par 4 approches\" width=\"579\" height=\"519\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/image.png 579w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/image-213x191.png 213w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/image-44x39.png 44w\" sizes=\"auto, (max-width: 579px) 100vw, 579px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><em>Figure 1: Strengthening Backup Security Through Four Approaches&nbsp;<\/em><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559685&quot;:720}\">&nbsp;<\/span><\/p>\n<h1><b><span data-contrast=\"none\">1. Continuously ensuring the availability of usable backups<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:1080,&quot;335559740&quot;:259,&quot;335559991&quot;:360}\">&nbsp;<\/span><\/h1>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">To guarantee the availability of usable backups, it is essential to apply fundamental best practices.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Ensuring backup completeness and consistency<\/span><\/b><span data-ccp-props=\"{}\">&nbsp;<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">In the context of a ransomware attack, the primary&nbsp;objective&nbsp;of backups is to provide a reliable data source enabling the reconstruction of the information system. Backups are truly effective only if they&nbsp;contain&nbsp;all the elements&nbsp;required&nbsp;for full recovery. This notably includes&nbsp;businesscritical&nbsp;data, configurations of business applications and systems, installation sources, as well as critical operational data such as password vaults, licenses, and operational documentation.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Backup completeness alone is not sufficient. The need for data&nbsp;consistency&nbsp;points across backups originating from different sources (e.g., a document management system (DMS) database and its associated files) must also be&nbsp;taken into account. Conducting a preliminary analysis helps&nbsp;facilitate&nbsp;data resynchronization across different repositories during the recovery phase.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">In addition, it is necessary to&nbsp;maintain&nbsp;backups of the&nbsp;infrastructure itself&nbsp;to enable identical reconstruction. These backups must include the backup catalog, software installation sources, encryption keys, and all other required secrets. A copy of configuration parameters should be stored in a separate location,&nbsp;such as an offline environment,&nbsp;distinct from the primary infrastructure,&nbsp;in order to&nbsp;limit the risk of a shared compromise.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><i><span data-contrast=\"none\">According to the Cyber Benchmark conducted by Wavestone across more than 170 assessed organizations, approximately <\/span><\/i><b><i><span data-contrast=\"none\">90%<\/span><\/i><\/b><i><span data-contrast=\"none\">&nbsp;of the&nbsp;organizations&nbsp;observed&nbsp;perform&nbsp;regular&nbsp;data backups.<\/span><\/i>&nbsp;<br><i><span data-contrast=\"none\">Among&nbsp;organizations&nbsp;that&nbsp;perform&nbsp;regular&nbsp;backups:<\/span><\/i><span data-ccp-props=\"{&quot;335559685&quot;:0}\">&nbsp;<\/span><\/p>\n<ul>\n<li><i><span data-contrast=\"none\">Approximately&nbsp;<\/span><\/i><b><i><span data-contrast=\"none\">65%<\/span><\/i><\/b><i><span data-contrast=\"none\">&nbsp;conduct&nbsp;<\/span><\/i><b><i><span data-contrast=\"none\">restoration&nbsp;tests<\/span><\/i><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/li>\n<li><i><span data-contrast=\"none\">Approximately&nbsp;<\/span><\/i><b><i><span data-contrast=\"none\">20%<\/span><\/i><\/b><i><span data-contrast=\"none\">&nbsp;perform&nbsp;<\/span><\/i><b><i><span data-contrast=\"none\">business data&nbsp;consistency&nbsp;checks<\/span><\/i><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">In this context, various controls must be defined and implemented on a regular basis.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Testing Backup Reliability Through Regular Controls<\/span><\/b><span data-ccp-props=\"{}\">&nbsp;<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">A first&nbsp;level of control aims to ensure that backups are effectively performed and remain usable. This can be based on the application of daily verification procedures relying on evidence such as reports, logs, and alerts. These checks may be manual or (semi)&nbsp;automated. However, an&nbsp;additional&nbsp;human review&nbsp;remains&nbsp;necessary to ensure that indicators and alerts are not misleading,&nbsp;particularly&nbsp;in the event that&nbsp;monitoring&nbsp;and control mechanisms have been compromised or disabled by an attacker.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">This first level also includes periodic restoration tests, carried out on representative scopes,&nbsp;in order to&nbsp;verify,&nbsp;where possible with the involvement of application or business subject-matter experts,&nbsp;the integrity and completeness of the data&nbsp;required&nbsp;for business recovery.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The second level consists&nbsp;in&nbsp;ensuring that first-level checks are properly applied. It relies on independent controls or formalized processes. Dashboards may be used to centralize confidence-level indicators by correlating the results of daily operational checks with restoration test outcomes.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Once the reliability of backups has been&nbsp;established, restoration processes should be&nbsp;optimized&nbsp;by regularly testing them and ensuring their effectiveness.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Industrializing Restoration Processes to Optimize Recovery Time&nbsp;in the Event of&nbsp;a Compromise<\/span><\/b><span data-ccp-props=\"{}\">&nbsp;<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">To reduce recovery time following a compromise, it is essential to industrialize restoration&nbsp;processes at&nbsp;scale&nbsp;in order to&nbsp;support mass recoveries. This requires preparing these processes in advance, testing them regularly, and adapting them to different destruction scenarios.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">As the restoration phase of an information system may extend over several weeks,&nbsp;or even several months,&nbsp;it is necessary to increase backup retention periods for the data to be restored,&nbsp;in order to&nbsp;prevent their loss through overwriting or premature deletion.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Restoration processes must also include mechanisms to rapidly assess the state of&nbsp;backedup&nbsp;data by&nbsp;identifying,&nbsp;based on indicators of compromise,&nbsp;data that has been compromised,&nbsp;modified, or corrupted,&nbsp;so as to&nbsp;effectively target the&nbsp;appropriate restoration&nbsp;points.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Integrating the Risk of Backup Compromise into the Restoration Strategy<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">To ensure reliable recovery following a compromise, it is essential to account, within the overall restoration strategy, for the risk of alteration or manipulation of&nbsp;backedup&nbsp;data. This involves addressing the risk of data alteration or manipulation occurring upstream of backup processing by the backup agent, for example:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">Being able to rely on full backups created prior to the attacker\u2019s intrusion, as&nbsp;identified&nbsp;during the&nbsp;initial&nbsp;investigations. In such cases, the&nbsp;backedup&nbsp;data can be considered uncompromised and used to rebuild systems and applications.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">When restoring unaltered application or system components that are not reinstalled from trusted sources, the restoration process must also include the application of security patches and hardening measures to prevent any&nbsp;subsequent&nbsp;compromise.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The backup process alone cannot prevent potential data compromise before the data is handed over to it. Depending on the context,&nbsp;additional&nbsp;measures may be implemented, such as:<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">Protecting data integrity through system-level mechanisms and\/or cryptographic&nbsp;means;<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/li>\n<li><span data-contrast=\"auto\">Detecting data alteration through application-level validation,&nbsp;monitoring&nbsp;of \u201ccanary&nbsp;files\u201d data, or the use of an EDR (Endpoint Detection and Response) solution.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">These topics must be addressed in addition to backup protection measures.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Extending Backup and Restoration Best Practices to Cloud Environments<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Finally, the backup rules defined for&nbsp;onpremises&nbsp;environments must be replicated and adapted to cloud environments.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><i><span data-contrast=\"none\">According to the Cyber Benchmark conducted by Wavestone, approximately 25% of the organizations observed have a regularly reviewed and updated backup policy covering both onpremises and cloud environments.<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><i><span data-contrast=\"none\">In addition,&nbsp;around&nbsp;29% of&nbsp;organizations&nbsp;externalize&nbsp;a backup of&nbsp;their&nbsp;cloud data to&nbsp;another&nbsp;region&nbsp;or to an&nbsp;onpremises&nbsp;environment,&nbsp;ensuring&nbsp;resilience&nbsp;against&nbsp;cyberattacks&nbsp;and&nbsp;regularly&nbsp;testing&nbsp;this&nbsp;process.<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Beyond the usability of backups, securing the infrastructure that hosts them&nbsp;represents&nbsp;an equally critical challenge,&nbsp;one that is sometimes insufficiently addressed.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<h1><b><span data-contrast=\"none\">2. Strengthening the security of the backup infrastructure against attacker takeover<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/h1>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Before considering more advanced mechanisms, it&nbsp;is important to recall that effective backup protection first relies on best practices for securing the backup infrastructure, notably those documented by ANSSI<\/span><span data-contrast=\"auto\">3<\/span><span data-contrast=\"auto\">. A compromise of this infrastructure could indeed result in the alteration of backups (encryption, destruction, etc.).<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b><span data-contrast=\"none\">Ensuring Defense in Depth for the Backup Infrastructure<\/span><\/b><span data-ccp-props=\"{}\">&nbsp;<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">These best practices include segregating production and backup environments, using dedicated administrative accounts, and hardening infrastructure components,&nbsp;particularly through the application of ANSSI hardening guides applicable to Windows, Linux, and other systems. They also apply to backup agents, which may&nbsp;constitute&nbsp;a propagation vector toward production systems.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">In addition to hardening measures, the backup infrastructure must be subject to both technical and cybersecurity monitoring.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Implementing technical and cyber monitoring of backup infrastructures<\/span><\/b><span data-ccp-props=\"{}\">&nbsp;<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Technical monitoring of backup infrastructures helps ensure&nbsp;their proper&nbsp;operation and detect any anomalies. The effective handling of detected anomalies must be regularly reviewed.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Cybersecurity monitoring of the backup infrastructure relies on&nbsp;appropriate logging&nbsp;and traffic analysis. It must be capable of detecting the main attack techniques&nbsp;observed&nbsp;in the wild.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Maintaining&nbsp;Threat Intelligence Focused on Backup Systems<\/span><\/b><span data-ccp-props=\"{}\">&nbsp;<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Threat intelligence specifically targeting backup systems must be&nbsp;maintained, beyond the technical vulnerability monitoring performed as part of&nbsp;maintaining&nbsp;the backup infrastructure in a secure operating condition. This&nbsp;threat&nbsp;intelligence should cover attack techniques and tactics used against backup infrastructures,&nbsp;in order to&nbsp;anticipate&nbsp;potential attacks and adapt protection, detection, and response capabilities accordingly.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Despite the measures implemented to prevent the compromise of backup infrastructures, the risk of logical destruction&nbsp;remains&nbsp;and must be&nbsp;anticipated.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">&nbsp;<\/span><\/p>\n<p>&nbsp;<\/p>\n<h1>Reference<\/h1>\n<p>[1] Wavestone, <a href=\"https:\/\/www.wavestone.com\/en\/insight\/2024-wavestone-cert-report\/\">CERT<\/a><\/p>\n<p>[2] ANSSI, <a href=\"https:\/\/messervices.cyber.gouv.fr\/guides\/fondamentaux-sauvegarde-systemes-dinformation\">Sauvegarde des syst\u00e8mes d&#8217;information<\/a><\/p>\n<p>[3] ANSSI, <a href=\"https:\/\/messervices.cyber.gouv.fr\/guides\/fondamentaux-sauvegarde-systemes-dinformation\">Sauvegarde des syst\u00e8mes d&#8217;information<\/a><\/p>\n\n\n\n\n\n\n","protected":false},"excerpt":{"rendered":"<p>In 2025, ransomware attacks remained a persistent threat and increasingly targeted backup systems (21% of attacks targeted backups in 2021, compared with 90% in 2025 [1] ). Protecting backups,&nbsp;now also subject to strengthened regulatory requirements such as NIS 2,&nbsp;has therefore&#8230;<\/p>\n","protected":false},"author":1285,"featured_media":29558,"comment_status":"open","ping_status":"closed","sticky":true,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777],"tags":[3387,2772,2817,3838],"coauthors":[2841,4989],"class_list":["post-29548","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","tag-cybercriminality","tag-cybersecurity","tag-data-protection","tag-ransomware-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Backups : The Last Line of\u00a0Defense\u00a0Against Ransomware\u00a0- Part 1\u00a0 - RiskInsight<\/title>\n<meta name=\"description\" content=\"In 2025, ransomware attacks\u00a0remained\u00a0a persistent threat and increasingly targeted backup systems (21% of attacks targeted backups in 2021, compared with 90% in 20251). Protecting backups,\u00a0now also subject to strengthened regulatory requirements such as NIS 2,\u00a0has therefore become a top priority in addressing this threat.\u00a0This article presents four complementary approaches to strengthening end-to-end backup security:\u00a0Continuously ensuring the availability of usable backups\u00a0Strengthening the security of the backup infrastructure against attacker takeover\u00a0Protecting backups against logical destruction\u00a0Identifying\u00a0residual risks\u00a0in light of\u00a0the measures implemented\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Backups : The Last Line of\u00a0Defense\u00a0Against Ransomware\u00a0- Part 1\u00a0 - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"In 2025, ransomware attacks\u00a0remained\u00a0a persistent threat and increasingly targeted backup systems (21% of attacks targeted backups in 2021, compared with 90% in 20251). Protecting backups,\u00a0now also subject to strengthened regulatory requirements such as NIS 2,\u00a0has therefore become a top priority in addressing this threat.\u00a0This article presents four complementary approaches to strengthening end-to-end backup security:\u00a0Continuously ensuring the availability of usable backups\u00a0Strengthening the security of the backup infrastructure against attacker takeover\u00a0Protecting backups against logical destruction\u00a0Identifying\u00a0residual risks\u00a0in light of\u00a0the measures implemented\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-02T06:36:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-02T06:36:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/Image12.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Axel Petersen, paul-adrien Faineant\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Axel Petersen, paul-adrien Faineant\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/\"},\"author\":{\"name\":\"Axel Petersen\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/3544c8184dc9a23e6ca7ad0da430b274\"},\"headline\":\"Backups : The Last Line of\u00a0Defense\u00a0Against Ransomware\u00a0&#8211; Part 1\u00a0\",\"datePublished\":\"2026-04-02T06:36:52+00:00\",\"dateModified\":\"2026-04-02T06:36:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/\"},\"wordCount\":1534,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/Image12.jpg\",\"keywords\":[\"cybercriminality\",\"cybersecurity\",\"data protection\",\"ransomware\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/\",\"name\":\"Backups : The Last Line of\u00a0Defense\u00a0Against Ransomware\u00a0- Part 1\u00a0 - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/Image12.jpg\",\"datePublished\":\"2026-04-02T06:36:52+00:00\",\"dateModified\":\"2026-04-02T06:36:55+00:00\",\"description\":\"In 2025, ransomware attacks\u00a0remained\u00a0a persistent threat and increasingly targeted backup systems (21% of attacks targeted backups in 2021, compared with 90% in 20251). Protecting backups,\u00a0now also subject to strengthened regulatory requirements such as NIS 2,\u00a0has therefore become a top priority in addressing this threat.\u00a0This article presents four complementary approaches to strengthening end-to-end backup security:\u00a0Continuously ensuring the availability of usable backups\u00a0Strengthening the security of the backup infrastructure against attacker takeover\u00a0Protecting backups against logical destruction\u00a0Identifying\u00a0residual risks\u00a0in light of\u00a0the measures implemented\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/Image12.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/Image12.jpg\",\"width\":2000,\"height\":1256},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Backups : The Last Line of\u00a0Defense\u00a0Against Ransomware\u00a0&#8211; Part 1\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/3544c8184dc9a23e6ca7ad0da430b274\",\"name\":\"Axel Petersen\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/axel-petersen\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Backups : The Last Line of\u00a0Defense\u00a0Against Ransomware\u00a0- Part 1\u00a0 - RiskInsight","description":"In 2025, ransomware attacks\u00a0remained\u00a0a persistent threat and increasingly targeted backup systems (21% of attacks targeted backups in 2021, compared with 90% in 20251). Protecting backups,\u00a0now also subject to strengthened regulatory requirements such as NIS 2,\u00a0has therefore become a top priority in addressing this threat.\u00a0This article presents four complementary approaches to strengthening end-to-end backup security:\u00a0Continuously ensuring the availability of usable backups\u00a0Strengthening the security of the backup infrastructure against attacker takeover\u00a0Protecting backups against logical destruction\u00a0Identifying\u00a0residual risks\u00a0in light of\u00a0the measures implemented\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/","og_locale":"en_US","og_type":"article","og_title":"Backups : The Last Line of\u00a0Defense\u00a0Against Ransomware\u00a0- Part 1\u00a0 - RiskInsight","og_description":"In 2025, ransomware attacks\u00a0remained\u00a0a persistent threat and increasingly targeted backup systems (21% of attacks targeted backups in 2021, compared with 90% in 20251). Protecting backups,\u00a0now also subject to strengthened regulatory requirements such as NIS 2,\u00a0has therefore become a top priority in addressing this threat.\u00a0This article presents four complementary approaches to strengthening end-to-end backup security:\u00a0Continuously ensuring the availability of usable backups\u00a0Strengthening the security of the backup infrastructure against attacker takeover\u00a0Protecting backups against logical destruction\u00a0Identifying\u00a0residual risks\u00a0in light of\u00a0the measures implemented\u00a0","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/","og_site_name":"RiskInsight","article_published_time":"2026-04-02T06:36:52+00:00","article_modified_time":"2026-04-02T06:36:55+00:00","og_image":[{"width":2000,"height":1256,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/Image12.jpg","type":"image\/jpeg"}],"author":"Axel Petersen, paul-adrien Faineant","twitter_misc":{"Written by":"Axel Petersen, paul-adrien Faineant","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/"},"author":{"name":"Axel Petersen","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/3544c8184dc9a23e6ca7ad0da430b274"},"headline":"Backups : The Last Line of\u00a0Defense\u00a0Against Ransomware\u00a0&#8211; Part 1\u00a0","datePublished":"2026-04-02T06:36:52+00:00","dateModified":"2026-04-02T06:36:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/"},"wordCount":1534,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/Image12.jpg","keywords":["cybercriminality","cybersecurity","data protection","ransomware"],"articleSection":["Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/","name":"Backups : The Last Line of\u00a0Defense\u00a0Against Ransomware\u00a0- Part 1\u00a0 - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/Image12.jpg","datePublished":"2026-04-02T06:36:52+00:00","dateModified":"2026-04-02T06:36:55+00:00","description":"In 2025, ransomware attacks\u00a0remained\u00a0a persistent threat and increasingly targeted backup systems (21% of attacks targeted backups in 2021, compared with 90% in 20251). Protecting backups,\u00a0now also subject to strengthened regulatory requirements such as NIS 2,\u00a0has therefore become a top priority in addressing this threat.\u00a0This article presents four complementary approaches to strengthening end-to-end backup security:\u00a0Continuously ensuring the availability of usable backups\u00a0Strengthening the security of the backup infrastructure against attacker takeover\u00a0Protecting backups against logical destruction\u00a0Identifying\u00a0residual risks\u00a0in light of\u00a0the measures implemented\u00a0","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/Image12.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/03\/Image12.jpg","width":2000,"height":1256},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/04\/backups-the-last-line-of-defense-against-ransomware-part-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Backups : The Last Line of\u00a0Defense\u00a0Against Ransomware\u00a0&#8211; Part 1\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/3544c8184dc9a23e6ca7ad0da430b274","name":"Axel Petersen","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/axel-petersen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/29548","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1285"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=29548"}],"version-history":[{"count":9,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/29548\/revisions"}],"predecessor-version":[{"id":29599,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/29548\/revisions\/29599"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/29558"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=29548"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=29548"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=29548"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=29548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}