Back to blog

Ransomware

Ransomware can encrypt files a business depends on. In many incidents, reachable backups become part of the damage.

Ransomware risk visual

Backups can become a target

Businesses often assume backups are safe, but backup folders on the same computer, the same network share, or the same user permission boundary may be encrypted together with active files.

Ransomware usually searches for reachable locations. If a backup is reachable by the infected environment, it can be damaged too.

A clean restore point is essential

By the time an attack is discovered, the newest backup may already include affected data. Protected backup history from earlier points in time improves the chance of recovery.

That is why immutable, monitored backup matters: it keeps recovery options available when the current environment cannot be trusted.

In short: One of the most valuable defenses against ransomware is backup history the attacker cannot delete or modify.

Core protections

  • Backups should be sent to a secure environment outside the user computer.
  • Backup results should be monitored continuously.
  • Older restore points should remain protected.
  • Technical teams should be informed when errors appear.