Sunday, 8 Feb 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > The ‘3-2-1’ backup rule is still key to modern cybersecurity
Global Market

The ‘3-2-1’ backup rule is still key to modern cybersecurity

Last updated: May 28, 2025 7:11 am
Published May 28, 2025
Share
The ‘3-2-1’ backup rule is still key to modern cybersecurity
SHARE

This easy three-copy technique stays companies’ hardest protect in opposition to ransomware and knowledge loss – whilst threats evolve and cloud reliance deepens – says Daniel Pearson, CEO at KnownHost. 

Cybercriminals are continually trying to find vulnerabilities to use and knowledge loss will be devastating for companies.

One report estimates that cyber incidents will value the US over $639 billion in 2025, with prices projected to achieve $1.82 trillion by 2028. These figures spotlight the essential significance of sturdy cybersecurity methods to mitigate dangers.

Regardless of being launched in 2009, the 3-2-1 backup rule stays a elementary greatest apply for safeguarding enterprise knowledge. This time-tested technique helps organisations minimise the impression of knowledge loss and get better rapidly from cyber threats. Right here’s how companies can use the 3-2-1 backup rule to guard vital knowledge in an evolving risk panorama.

What’s the 3-2-1 backup rule?

The three-2-1 backup rule is an easy but efficient precept designed to reinforce knowledge safety. Finest practices for sustaining enough backup of knowledge embrace holding three copies of knowledge to make sure redundancy in case of failure. It additionally recommends utilising two completely different storage options to guard in opposition to {hardware} malfunctions and holding one copy offsite to safeguard in opposition to disasters like ransomware assaults and pure disasters.

This methodology has been a long-standing greatest apply in IT safety, offering organisations with resilience in opposition to varied knowledge threats.

Why is the 3-2-1 rule nonetheless related in right now’s cyber risk panorama?

Cyber threats are continually evolving, requiring cybersecurity professionals to maintain up with a barrage of recent threats. Nonetheless, the 3-2-1 backup technique is ready to account for all potential threats by diversifying the best way that knowledge is saved and offering a spread of failsafes.

See also  EU Eases Sovereignty Rules in Cybersecurity Certification, Reuters Reveals

Whereas cloud companies provide comfort, they aren’t proof against cyberattacks, outages, or misconfigurations. Relying solely on cloud storage will increase the chance of knowledge loss.

Ransomware assaults that concentrate on cloud backups have turn out to be more and more widespread, highlighting main considerations that companies are usually not totally secure from having their knowledge held for ransom. One report discovered that 51% of ransomware assaults had tried to focus on backups, too, highlighting the prevalence of this technique. 

By concentrating on backups in a ransomware assault, cyber criminals enhance their possibilities of receiving a ransom, as companies don’t have any accessible backup. A diversified backup technique helps counteract these assaults and ensures that companies are usually not pressured to pay a ransom.

Whereas digital transformation has been revolutionary, there are nonetheless advantages to holding knowledge backed up offline. Trendy cyber threats have gotten more and more refined, so sustaining unchangeable backups which can be bodily disconnected from the web prevents tampering or deletion by attackers.

Frequent backup errors companies make

Even with a backup technique in place, companies usually make these vital errors. One report revealed that in 2024, ransomware attackers obtained over $800 million in funds, revealing the extent of the vulnerabilities companies face.

 One widespread error that companies make is storing backups on the identical community. If backups are stored on the identical community as main knowledge, then ransomware can nonetheless encrypt them. This renders the backups ineffective.

Whereas sustaining a separate copy of knowledge offline is helpful for sustaining knowledge safety, that is usually a uncared for a part of knowledge backups, with many companies choosing cloud-only storage. In a single report, 78% of enterprise leaders revealed that they’ve adopted the cloud in most or all areas of their enterprise.

See also  Water or power - which is key to sustainable cooling?

It’s not simply cyberattacks that go away companies in danger. One report discovered that {hardware} failures accounted for 45% of knowledge loss for small companies. An offline backup supplies an additional layer of safety and ensures that companies can mitigate the dangers of cyberattacks or {hardware} failures.

Lastly, an efficient backup restoration process is simply efficient if it really works. Repeatedly testing restoration procedures to make sure that they work is important. Failing to usually take a look at backup processes might result in sudden failures throughout vital incidents.

Easy methods to implement the 3-2-1 rule in a contemporary cybersecurity technique

To successfully apply the 3-2-1 backup rule, companies ought to be certain that their knowledge is saved throughout a number of mediums, corresponding to native storage, cloud suppliers, and offline backups, to scale back danger.

Companies can use AI-powered options to usually preserve backups, monitor for anomalies and forestall cyber threats from compromising knowledge integrity.

Lastly, compliance is one other main issue for companies to think about. Many rules, just like the Common Knowledge Safety Regulation (GDPR) in Europe or the worldwide Fee Card Business Knowledge Safety Customary (PCI DSS) require companies to implement dependable backup and catastrophe restoration methods.  

Following the 3-2-1 rule helps show due diligence and minimises legal responsibility within the occasion of a breach.

Source link

Contents
What’s the 3-2-1 backup rule?Why is the 3-2-1 rule nonetheless related in right now’s cyber risk panorama?Frequent backup errors companies makeEasy methods to implement the 3-2-1 rule in a contemporary cybersecurity technique
TAGGED: backup, Cybersecurity, Key, modern, Rule
Share This Article
Twitter Email Copy Link Print
Previous Article SCI Semiconductor Raises £2.5M in Funding SCI Semiconductor Raises £2.5M in Funding
Next Article Inven Inven Raises $12.75M in Series A Funding
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Amazon, Echoing Microsoft, Says It Can’t Keep Up With AI Demand

(Bloomberg) -- Amazon warned buyers that it might face capability constraints in its cloud computing…

February 7, 2025

What the New UK Government Means for the Country’s Data Center Sector

When the UK woke as much as a brand new authorities on July 5, it…

July 22, 2024

Digital Edge, Peak Energy Partner Deliver Renewable Energy Across Asia Pacific

Digital Edge, one in every of Asia’s quickest rising knowledge middle platforms with greater than…

June 9, 2024

Denodo achieves leadership position in Forrester enterprise data fabric evaluation

In keeping with a current announcement from Denodo, an information administration agency, the corporate has…

March 5, 2024

Three Nations Will Lead Asia-Pacific Data Center Expansion Through 2030

Important information middle growth is underway throughout the Asia-Pacific area, with Malaysia, Thailand, and Japan…

July 12, 2025

You Might Also Like

Shutterstock Germany Only - News - Intel Factory Germany September 2024
Global Market

Intel sets sights on data center GPUs amid AI-driven infrastructure shifts

By saad
Side view of technician or engineer with headset and laptop standing in industrial factory.
Global Market

Is private 5G/6G important after all?

By saad
Levi’s Stadium hosts Super Bowl LX
Global Market

Super Bowl LX raises network expectations

By saad
A person watching a stream of videos on a tablet
Global Market

Ruckus makes some noise with preconfigured switches for AV-over-IP networks

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.