Share this
Ransomware: When Was Your Last Backup Test?
by Arianna Carter on Jul 22, 2016 10:22:33 AM
These days, most people are familiar with what Ransomware is. Either your business has been directly affected, you have a friend or colleague who has fallen victim, or you’ve heard about it on the nightly news. Ransomware is a type of malicious software specifically designed to encrypt files and systems, effectively locking you out of your own data.
Once it has taken hold, it demands a ransom payment—often in untraceable digital currency—in exchange for a decryption key or promise of restored access. In many cases, even paying the ransom does not guarantee full data recovery, which is why proactive protection and a solid backup strategy are absolutely critical.

The number of professionals and small businesses being targeted by ransomware is increasing.
According to the FBI, more than $209 million in ransomware payments have been paid in the United States in the first three months of 2016 -- up from just $25 million for all of 2015.
The true cost of lost data
As we all know, information—and the ability to access it quickly—is the foundation of any business. When your data is unavailable, revenue stops, productivity drops, and in regulated industries, you can even face compliance violations.
The only reliable way to protect this information is to implement an effective, well-architected backup solution in your IT environment and make sure you’re ready for any possible threat—from accidental deletions and hardware failures to targeted ransomware attacks and natural disasters.
Why restore readiness matters
In the event of a disaster, your backup solution is only as good as its restoration capability. Being able to restore a single file, a database, or an entire system on short notice is what ultimately determines your recovery time and the impact on your business.
In situations where hardware fails or becomes infected, a little preparation can go a long way. Documented recovery procedures, clearly defined RPOs and RTOs, and knowing exactly where your last good copy of data resides are all critical to minimizing downtime.
The missing step: testing your backups
Many businesses spend significant time and budget evaluating, purchasing, and deploying a backup solution, but often forget one vital step: regularly testing their backup’s restorability as part of their disaster recovery plan.
If there is a problem with a backup that hasn’t been tested, you often won’t know until it’s too late—typically in the middle of an outage, when every minute counts. A lot of ransomware will attempt to encrypt data on a network as well as on attached storage and removable drives, in some cases even targeting mapped backup locations.
Protecting backup copies from threats
To make sure your business stays safe, it’s important to ensure that at least one copy of your backups is protected from direct access by infections and users, and that it is stored safely in your local environment or on other secured media.
Combining secure local backups with off-site copies and regular restore tests dramatically increases your chances of recovering quickly without paying a ransom.
Recommended backup strategy: follow the 3-2-1 rule
At NovaBACKUP, we recommend following the proven 3-2-1 backup strategy. This means maintaining 3 copies of your data, stored on 2 different types of media, with at least 1 copy kept off-site. As part of this approach, you should also verify that all files in your backups are readable and that the backup sets themselves are physically intact. These checks are essential to confirm that your backups can be successfully restored when you need them most.
Establishing a realistic testing cadence
In an ideal scenario, you should test backups after every significant change. If you create a new backup job, test it. If you add a new workstation or server, test it. For larger environments, this level of testing can be time-consuming, and in some cases, impractical after every modification. If that’s the case, establish a regular testing cadence that fits your environment and stick to it.
Using NovaBACKUP to verify backup integrity
Industry best practice is to perform a full restore test at least once per quarter. Within NovaBACKUP, when you configure a new backup job, you can enable verification options to validate the integrity of your backup data automatically. You can also review logs to confirm which items were included in the backup and to identify any warnings, errors, or informational messages. In addition, NovaBACKUP’s Granular Restore functionality makes it easy to validate specific files, folders, and databases within your backup sets.
The risk of untested backups
If you are not routinely testing your applications and data for restorability, you are relying on assumptions, not necessarily reality. You are assuming that you selected everything required for recovery, that it backed up correctly, and that it will restore flawlessly when the pressure is highest—a level of risk most businesses simply cannot afford.
To learn more about these ransomware threats and how you can protect yourself, download our whitepaper on Ransomware Prevention.
Share this
- Pre-Sales Questions (91)
- Tips and Tricks (86)
- Industry News (37)
- Best Practices (34)
- Reseller / MSP (31)
- Security Threats / Ransomware (25)
- Cloud Backup (22)
- Disaster Recovery (21)
- Compliance / HIPAA (20)
- Storage Technology (20)
- Applications (18)
- Backup Videos (15)
- Virtual Environments (12)
- Technology Updates / Releases (7)
- Backup preparation (5)
- Infographics (5)
- Products (US) (4)
- Company (US) (1)
- Events (1)
- Events (US) (1)
- Unternehmen (1)
- November 2025 (1)
- October 2025 (2)
- September 2025 (1)
- August 2025 (1)
- July 2025 (1)
- June 2025 (2)
- May 2025 (2)
- April 2025 (2)
- March 2025 (1)
- February 2025 (2)
- January 2025 (2)
- December 2024 (1)
- November 2024 (2)
- October 2024 (1)
- September 2024 (2)
- August 2024 (1)
- July 2024 (2)
- June 2024 (2)
- May 2024 (1)
- April 2024 (2)
- March 2024 (3)
- February 2024 (2)
- January 2024 (1)
- December 2023 (1)
- November 2023 (1)
- October 2023 (1)
- September 2023 (1)
- August 2023 (1)
- July 2023 (1)
- May 2023 (1)
- March 2023 (3)
- February 2023 (2)
- January 2023 (1)
- December 2022 (1)
- November 2022 (2)
- October 2022 (2)
- September 2022 (1)
- July 2022 (1)
- June 2022 (1)
- April 2022 (1)
- March 2022 (2)
- February 2022 (1)
- January 2022 (1)
- December 2021 (1)
- September 2021 (1)
- August 2021 (1)
- July 2021 (1)
- June 2021 (1)
- May 2021 (2)
- April 2021 (1)
- March 2021 (1)
- February 2021 (1)
- January 2021 (1)
- December 2020 (1)
- November 2020 (1)
- October 2020 (1)
- September 2020 (3)
- August 2020 (2)
- July 2020 (1)
- June 2020 (1)
- May 2020 (1)
- April 2020 (1)
- March 2020 (2)
- February 2020 (2)
- January 2020 (2)
- December 2019 (1)
- November 2019 (1)
- October 2019 (1)
- August 2019 (1)
- July 2019 (1)
- June 2019 (1)
- April 2019 (1)
- January 2019 (1)
- August 2018 (3)
- July 2018 (2)
- June 2018 (2)
- April 2018 (2)
- March 2018 (1)
- February 2018 (1)
- January 2018 (2)
- December 2017 (1)
- September 2017 (1)
- May 2017 (2)
- April 2017 (4)
- March 2017 (4)
- February 2017 (1)
- January 2017 (1)
- December 2016 (1)
- October 2016 (2)
- August 2016 (3)
- July 2016 (1)
- June 2016 (2)
- May 2016 (6)
- April 2016 (5)
- February 2016 (1)
- January 2016 (7)
- December 2015 (6)
- November 2015 (2)
- October 2015 (5)
- September 2015 (1)
- July 2015 (1)
- June 2015 (2)
- May 2015 (1)
- April 2015 (3)
- March 2015 (3)
- February 2015 (3)
- October 2014 (2)
- September 2014 (5)
- August 2014 (4)
- July 2014 (4)
- June 2014 (3)
- May 2014 (2)
- April 2014 (3)
- March 2014 (4)
- February 2014 (5)
- January 2014 (5)
- December 2013 (4)
- October 2013 (6)
- September 2013 (1)
