Times have changed and you should look to have many layers, as is the updated 3-2-1-1-0 backup rule that has started floating around
The next evolution: 3-2-1-1-0 backup strategy
The 3-2-1 backup strategy remains valuable, but modern threats like ransomware require additional protection. One backup copy must be isolated, either physically or virtually, to safeguard against attacks that target all data, including backups. To further enhance security and reliability, many organizations have recently transitioned from the 3-2-1 strategy to the upgraded 3-2-1-1-0, which introduces the following updates to the key principles:
3 = Maintain Three Copies of Your Data
Always keep at least three copies of your dataâone primary and two backups.
2 = Use Two Separate Storage Media
Store backups on two different types of media, such as a local server or hard drive and a cloud storage platform. This diversifies your protection and reduces risks.
1 = Keep One Copy Offsite
At least one backup should be stored in a separate location, such as a remote office or in the cloud, to protect against local disasters.
1 = Store One Copy Offline or Immutably
To defend against ransomware and other cyberattacks, one backup should be stored offline (air-gapped) or set to be immutable. An offline backup is disconnected from your network, while immutability ensures that data cannot be altered or deleted, adding an extra layer of protection.
0 = Ensure Zero Backup Errors
Regularly verify that backups are completed without errors. This includes daily monitoring and periodic restore tests to confirm that data can be fully recovered. Zero-error backups are essential for a reliable ransomware recovery plan.
The 3-2-1-1-0 backup strategy goes beyond traditional backup methods by adding crucial layers of protection against both physical and digital threats. By incorporating offsite, offline, or immutable backups and ensuring error-free recoverability, this approach equips businesses with the resilience needed to combat modern cyber threats like ransomware while safeguarding critical data.