Skip to main content
Rehmann
Rehmann
Solutions
Industries
Resources
About Us

The Role of Backups in Minimizing Ransomware Impact

June 2, 2025

Contributors: Jacob Harrand, Senior Technology Solutions and Risk Management advisor, Jessica R. Dore, CISA

Ransomware attacks are among the most disruptive and costly threats facing organizations today. In a single breach, the malicious software can encrypt or lock an organization’s data, devices, or entire network, allowing access only after the victim pays a ransom … and then only sometimes.  

A cyberattacker’s promise is as reliable as you might expect: According to a 2024 report published on Statistica, 20.6 percent of organizations that experienced a ransomware attack in 2023 and paid the commanded ransom still couldn’t recover their data. 

The stakes have never been higher for IT managers tasked with defending their networks. But amid the myriad strategies for mitigating ransomware risks, one stands out as particularly crucial for recovery and resilience: robust, reliable backups.  

Backups are not just a safety net; they are a vital component of any effective cybersecurity strategy. By implementing secure, air-gapped (more on that below), and regularly tested backups, IT managers can drastically reduce the damage caused by ransomware attacks, safeguard their organizations’ critical assets, and maintain business continuity.  

The Critical Role of Backups in Cybersecurity  

At its core, a backup is a copy of your data that can be restored in case of loss or damage. Backups play an exceptionally crucial role in ransomware scenarios. They often represent an organization’s last resort. 

Fact is, ransomware attacks happen. According to Veeam’s 2023 Ransomware Trends Report, 93% of ransomware victims determined the attack on their organization had been “unavoidable.” So when defenses fail, effective backups can save more than the day; they can minimize downtime, preserve the organization’s reputation, and empower the organization to refuse the cybercriminals’ ransom demands.   

Best Practices for Effective Backups

To make backups truly effective against ransomware attacks, it is essential to implement advanced strategies. Two recommended physical strategies: air-gapped and/or immutable backups.  

Air-Gapped Backups  

An air-gapped backup is physically separated from the rest of the network, making it inaccessible to hackers who breach connected systems. For organizations able to implement air-gapped solutions, this method offers unparalleled protection against ransomware, since attackers cannot manipulate or encrypt the backup if it is entirely offline.  

Immutable Backups  

For organizations that may find air-gapping too costly or complex, immutable backups provide a viable alternative. With immutable storage, data is written and stored in a format that prevents it from being modified or deleted. While these backups remain connected to the network, they are a highly secure option for preventing unauthorized changes or corruption if a breach occurs.  

Adopting one or both of these approaches significantly strengthens your organization’s ability to recover quickly while preserving critical data integrity.  

Layered Security with Encryption and Redundancy  

Beyond physical safeguards, encrypting your backup data adds another vital layer of protection. Should attackers somehow gain access to the backups, encryption ensures the data remains useless to unauthorized users, providing your organization with peace of mind.  

Equally important is redundancy, a principle best exemplified by the “3-2-1” backup strategy: 

  • 3 copies of your data (the production copy and two backups). 
  • 2 media types for backups (e.g., local storage and cloud storage).
  • 1 off-site copy stored in a separate, secure location.  

This diversified approach ensures preparedness against various risk scenarios, from cyberattacks to hardware failures and natural disasters, offering a robust safety net for unforeseen events.  

Why Testing Backups is Essential  

Even the best-laid plans can falter without testing. IT managers must regularly validate their backup systems with real-world simulations of ransomware attacks or other potential disruptions. Also known as penetration testing, real-world simulations ensure that backups not only exist but also are functional and restorable when needed.  

According to global technology research firm IDC, more than 50% of organizations that suffer ransomware attacks discover that their backups do not function properly when recovery is attempted. Testing allows you to identify issues in advance and address them proactively, which can significantly reduce downtime, eliminate bottlenecks, and ensure seamless restoration during a crisis.  

When testing backups, which you should do on a regular basis — ideally quarterly, as ransomware efforts evolve rapidly — focus on areas such as: 

  • Completeness: Are the backups capturing all critical files and systems?
  • Integrity: Are the files intact without corruption or errors?
  • Recovery Speed: How quickly can backups be restored to minimize downtime?
  • Compatibility: Will backed-up data integrate seamlessly with current or updated IT systems upon restoration?  

For organizations looking to improve backup and disaster recovery, a thorough IT assessment—which should evaluate systems, identify risks, and offer recommendations — is recommended. 

Building a Backup-Centric Strategy  

Positioning backups as a core part of your ransomware defense strategy is a forward-thinking move that can save significant time, money, and effort during an incident. But creating a successful backup strategy requires more than just technology; it requires careful planning, execution, and continuous refinement.  

Tips for a Strong Backup Strategy  

  • Prioritize Critical Systems: Identify which data and systems are essential for keeping your organization operational, and focus your backup efforts there. 
  • Use Tiered Storage: Differentiate between archival data, active backups, and instantaneous recovery options to optimize your system’s efficiency.
  • Regularly Update and Patch Systems: Keeping backup software up-to-date helps prevent vulnerabilities that attackers could exploit.
  • Train Your Team: Ensure that all key personnel understand the protocols for backup and recovery so they can act swiftly in an emergency.  

Final Thoughts  

No organization is immune to ransomware attacks, but how prepared your business is to recover often makes all the difference. Backups remain one of the most reliable tools to mitigate ransomware impact, providing a path to recovery that doesn’t involve negotiating with criminals.  

By incorporating air-gapped or immutable backups, encrypting data, adhering to the 3-2-1 rule, and rigorously testing your systems, you equip your organization with the resilience to face today’s evolving cybersecurity threats.  

The path forward may require effort, but the benefits of maintaining robust backups far outweigh the risks of neglecting them. Start building a solid backup strategy today to protect your organization’s assets, ensure continuity, and minimize the fallout from any future ransomware incident.