

This is the highest level of protection available. The 3-2-1-1-0 rule significantly increases your chances of getting your data back, no matter what happens to your main dataset: malware, physical damage, or human error. The difference between the 3-2-1 and the 3-2-1-1-0 backup rules is that the former helps you to save your production data, and the latter provides you with everything its competitor has, but also adds an extra backup-saving mechanism. But taking into account the increasing frequency of ransomware attacks and their tendency to become more backup-oriented, backups require additional protection. Until recently, the 3-2-1 rule was the industry standard companies who cared about their data were following this rule and considered themselves to be fine. The Difference Between the 3-2-1 and 3-2-1-1-0 Backup Rules The 3-2-1-1-0 rule is about not keeping all your eggs in one basket, so that in any case you are able to make your omelette. Two different storages and three copies guarantee that at least one will be available somewhere to help you to get back to work. If one copy is off-site, then you can use it in the event of any disaster in your office. If one copy is offline, no malware can reach it via the Internet. If your backups have zero errors, you can restore your data and continue working. This strategy provides you with the highest data recoverability and, thus, offers the best protection from ransomware.
3 2 1 DATA BACKUP OFFLINE

The 3-2-1-1-0 backup rule calls for five conditions to be met: One such method is the 3-2-1-1-0 backup rule. New methods of keeping your data secure should be implemented. This means that even gold standards of data protection might be not enough to actually protect the data. Most likely, these attacks will affect backups, as intruders prefer to make sure that you can’t just restore your data without paying the ransom. The Gartner experts predict that by 2025, up to 75% of IT companies will become the target of one or more ransomware attacks.

The number of cyberattacks is constantly growing they happen more and more often, and hackers are inventing more and more methods to reach companies’ sensitive data in order to make profit from it.
