Sunday, 1 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > The ‘3-2-1’ backup rule is still key to modern cybersecurity
Global Market

The ‘3-2-1’ backup rule is still key to modern cybersecurity

Last updated: May 28, 2025 7:11 am
Published May 28, 2025
Share
The ‘3-2-1’ backup rule is still key to modern cybersecurity
SHARE

This easy three-copy technique stays companies’ hardest protect in opposition to ransomware and knowledge loss – whilst threats evolve and cloud reliance deepens – says Daniel Pearson, CEO at KnownHost. 

Cybercriminals are continually trying to find vulnerabilities to use and knowledge loss will be devastating for companies.

One report estimates that cyber incidents will value the US over $639 billion in 2025, with prices projected to achieve $1.82 trillion by 2028. These figures spotlight the essential significance of sturdy cybersecurity methods to mitigate dangers.

Regardless of being launched in 2009, the 3-2-1 backup rule stays a elementary greatest apply for safeguarding enterprise knowledge. This time-tested technique helps organisations minimise the impression of knowledge loss and get better rapidly from cyber threats. Right here’s how companies can use the 3-2-1 backup rule to guard vital knowledge in an evolving risk panorama.

What’s the 3-2-1 backup rule?

The three-2-1 backup rule is an easy but efficient precept designed to reinforce knowledge safety. Finest practices for sustaining enough backup of knowledge embrace holding three copies of knowledge to make sure redundancy in case of failure. It additionally recommends utilising two completely different storage options to guard in opposition to {hardware} malfunctions and holding one copy offsite to safeguard in opposition to disasters like ransomware assaults and pure disasters.

This methodology has been a long-standing greatest apply in IT safety, offering organisations with resilience in opposition to varied knowledge threats.

Why is the 3-2-1 rule nonetheless related in right now’s cyber risk panorama?

Cyber threats are continually evolving, requiring cybersecurity professionals to maintain up with a barrage of recent threats. Nonetheless, the 3-2-1 backup technique is ready to account for all potential threats by diversifying the best way that knowledge is saved and offering a spread of failsafes.

See also  Is benefit realisation key to NHS digitisation?

Whereas cloud companies provide comfort, they aren’t proof against cyberattacks, outages, or misconfigurations. Relying solely on cloud storage will increase the chance of knowledge loss.

Ransomware assaults that concentrate on cloud backups have turn out to be more and more widespread, highlighting main considerations that companies are usually not totally secure from having their knowledge held for ransom. One report discovered that 51% of ransomware assaults had tried to focus on backups, too, highlighting the prevalence of this technique. 

By concentrating on backups in a ransomware assault, cyber criminals enhance their possibilities of receiving a ransom, as companies don’t have any accessible backup. A diversified backup technique helps counteract these assaults and ensures that companies are usually not pressured to pay a ransom.

Whereas digital transformation has been revolutionary, there are nonetheless advantages to holding knowledge backed up offline. Trendy cyber threats have gotten more and more refined, so sustaining unchangeable backups which can be bodily disconnected from the web prevents tampering or deletion by attackers.

Frequent backup errors companies make

Even with a backup technique in place, companies usually make these vital errors. One report revealed that in 2024, ransomware attackers obtained over $800 million in funds, revealing the extent of the vulnerabilities companies face.

 One widespread error that companies make is storing backups on the identical community. If backups are stored on the identical community as main knowledge, then ransomware can nonetheless encrypt them. This renders the backups ineffective.

Whereas sustaining a separate copy of knowledge offline is helpful for sustaining knowledge safety, that is usually a uncared for a part of knowledge backups, with many companies choosing cloud-only storage. In a single report, 78% of enterprise leaders revealed that they’ve adopted the cloud in most or all areas of their enterprise.

See also  The Multiple Ways to Classify Modern Data Centers

It’s not simply cyberattacks that go away companies in danger. One report discovered that {hardware} failures accounted for 45% of knowledge loss for small companies. An offline backup supplies an additional layer of safety and ensures that companies can mitigate the dangers of cyberattacks or {hardware} failures.

Lastly, an efficient backup restoration process is simply efficient if it really works. Repeatedly testing restoration procedures to make sure that they work is important. Failing to usually take a look at backup processes might result in sudden failures throughout vital incidents.

Easy methods to implement the 3-2-1 rule in a contemporary cybersecurity technique

To successfully apply the 3-2-1 backup rule, companies ought to be certain that their knowledge is saved throughout a number of mediums, corresponding to native storage, cloud suppliers, and offline backups, to scale back danger.

Companies can use AI-powered options to usually preserve backups, monitor for anomalies and forestall cyber threats from compromising knowledge integrity.

Lastly, compliance is one other main issue for companies to think about. Many rules, just like the Common Knowledge Safety Regulation (GDPR) in Europe or the worldwide Fee Card Business Knowledge Safety Customary (PCI DSS) require companies to implement dependable backup and catastrophe restoration methods.  

Following the 3-2-1 rule helps show due diligence and minimises legal responsibility within the occasion of a breach.

Source link

Contents
What’s the 3-2-1 backup rule?Why is the 3-2-1 rule nonetheless related in right now’s cyber risk panorama?Frequent backup errors companies makeEasy methods to implement the 3-2-1 rule in a contemporary cybersecurity technique
TAGGED: backup, Cybersecurity, Key, modern, Rule
Share This Article
Twitter Email Copy Link Print
Previous Article SCI Semiconductor Raises £2.5M in Funding SCI Semiconductor Raises £2.5M in Funding
Next Article Inven Inven Raises $12.75M in Series A Funding
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Realizing the Internet of Everything

“Huge brother is watching you” is a catchphrase for the danger of large-scale surveillance. We…

March 16, 2025

Duos Edge AI opens 5th edge data center in rural Texas panhandle

Duos Applied sciences Group subsidiary Duos Edge AI introduced the set up of its fifth…

September 25, 2025

Schneider Electric ‘transforms’ power distribution in critical industries

Schneider Electrical unveils the introduction of MasterPacT MTZ Lively, a revolutionary new low voltage air…

March 7, 2024

BCS expands utilities division with new service lines

BCS, famend for its international information centre consultancy, has strategically expanded its Utilities Division, introducing…

August 13, 2025

Samsung, Vodafone complete Open RAN data call; telecom giants form consortium

Samsung Electronics, Vodafone and AMD have collaborated to efficiently exhibit an end-to-end name utilizing the…

February 16, 2024

You Might Also Like

H1 2026 - Data Centre Review
Global Market

H1 2026 – Data Centre Review

By saad
Juniper Networks
Global Market

Security hole could let hackers take over Juniper Networks PTX core routers

By saad
CPP Investments and Equinix to buy atNorth in $4 billion deal
Global Market

CPP Investments and Equinix to buy atNorth in $4 billion deal

By saad
AI
Global Market

OpenAI launches stateful AI on AWS, signaling a control plane power shift

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.