different zones . Organisations should aim to maintain an on-premises copy , a cloud or online-remote copy , and an offline remote copy of critical data .
Coined the 3-2-1 rule , this approach combines a diverse mix of cloud , onpremises , and offline-remote copies to ensure data can be preserved even if an online backup is disrupted . Sophisticated ransomware will attempt to disrupt recovery from backups , and any online backup , remote or local , is at risk .
Among all forms of backup systems , cloud-based backups are often the most
Remote access backups , for instance , are often reliant on password protections .
vulnerable . In turn , organisations should be leveraging an on-premises backup that can drive rapid restoration at scale , especially in cases where there ’ s a high volume of critical data to recover . Controls used to monitor access to on-premises backups do not always translate one-to-one to cloud-based systems .
Designing a cloud-based solution , organisations need to consider how access is controlled , how requests to retrieve or store data are authenticated and how the backup
INTELLIGENT TECH CHANNELS 39