{"id":20082,"date":"2025-09-24T05:52:34","date_gmt":"2025-09-24T05:52:34","guid":{"rendered":"https:\/\/www.sandbox.backupassist.com\/blog\/?p=20082"},"modified":"2025-10-22T01:44:41","modified_gmt":"2025-10-22T01:44:41","slug":"the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup","status":"publish","type":"post","link":"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup","title":{"rendered":"The Ladder of Cyber-Resilience: finally, here&#8217;s an EASY way to understand backup"},"content":{"rendered":"\n<p>Have you ever been confused by technical jargon like 3-2-1 backup, online \/ offline \/ onsite \/ offsite backup, cold \/ warm \/ hot, redundancy, immutability, snapshots, blah blah blah.<\/p>\n\n\n\n<p>Even I find the jargon frustrating &#8211; and I&#8217;m in the industry!<\/p>\n\n\n\n<p>There&#8217;s no shortage of voices telling you to do this or that. But in the end &#8211; the question is, <strong>what for?<\/strong><\/p>\n\n\n\n<p>Don&#8217;t let the tail wag the dog. <a href=\"https:\/\/www.backupassist.com\/blog\/your-data-is-your-data-privacy-sovereignty-accessibility-anonymity-and-trust-in-the-age-of-cloud-hosted-everything\" target=\"_blank\" rel=\"noreferrer noopener\">You&#8217;re in control of your own data<\/a> &#8211; and in just 10 minutes I&#8217;ll help you get on top of your own cyber-resilience.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">You don&#8217;t want a backup. You want a guaranteed recovery.<\/h2>\n\n\n\n<p>A Harvard professor once said, &#8220;people don&#8217;t want a drill, they want a hole.&#8221;<\/p>\n\n\n\n<p>Let me take a wild guess. <em>You&#8217;re not really interested in backup. What you want is a guaranteed recovery.<\/em><\/p>\n\n\n\n<p>The problem with the tech industry is so much conversation is about the technical features of a product (the drill), it&#8217;s easy to forget what the bigger picture is (the hole).<\/p>\n\n\n\n<p>After 24 years, I&#8217;ve finally figured out an EASY way to explain backup and help people choose how to get <strong>the right backup<\/strong> for them.<\/p>\n\n\n\n<p>I call it the <strong>Ladder of Cyber-Resilience<\/strong> &#8211; and it&#8217;s a commonsense way to understand exactly what risks you&#8217;re protected against with any given backup strategy.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/10\/Ladder-of-Cyber-Resilience.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"724\" src=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/10\/Ladder-of-Cyber-Resilience-1024x724.jpg\" alt=\"BackupAssist Ladder of Cyber-Resilience. Backup strategies to mitigate cyber risks.\" class=\"wp-image-20142\" srcset=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/10\/Ladder-of-Cyber-Resilience-1024x724.jpg 1024w, https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/10\/Ladder-of-Cyber-Resilience-300x212.jpg 300w, https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/10\/Ladder-of-Cyber-Resilience-768x543.jpg 768w, https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/10\/Ladder-of-Cyber-Resilience-1536x1086.jpg 1536w, https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/10\/Ladder-of-Cyber-Resilience.jpg 1684w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>The higher you are up on the ladder, the more resilient you are to these risks.<\/p>\n\n\n\n<p>Is this self-explanatory? If so &#8211; great! If not, read on&#8230;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Let&#8217;s start with the risks &#8211;&nbsp;<\/h2>\n\n\n\n<p>Here&#8217;s a summary of the major risks that will cause you to lose data. These risks apply to both business and personal situations.&nbsp;&nbsp;<\/p>\n\n\n\n<style>\n.wp-block-table.is-style-stripes {\n    border-bottom: 0 !important;\n}\n\n.wp-block-table.is-style-stripes table {\n        border-right: 1px solid rgba(0, 0, 0, .1);\n        border-bottom: 1px solid rgba(0, 0, 0, .1);\n}\n.wp-block-table.is-style-stripes thead th {\n        background-color: #282561; \n        color: #ffffff;\n    }\n\n.wp-block-table.is-style-stripes tbody tr:nth-child(odd) {\n        background-color: #ffffff;\n        color: #282561;\n    }\n\n.wp-block-table.is-style-stripes tbody tr:nth-child(even) {\n        background-color: #d1dff1; \n        color: #282561;\n    }\n\n.wp-block-table.is-style-stripes tbody td {\n        padding:10px;\n    }\n\n.wp-block-table.is-style-stripes tbody ul,ol {\n        margin-top:0;\n        margin-bottom:0;\n        margin-left:15px;\n    }\n\n.post li {\n        margin-top:0;\n        margin-bottom:0;\n        line-height:18pt;\n    }\n\n<\/style>\n<figure class=\"wp-block-table is-style-stripes\"><table><thead><tr><th class=\"has-text-align-left\" data-align=\"left\">Category of Risk<\/th><th class=\"has-text-align-left\" data-align=\"left\">Example<\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Accidental data deletion (human error)&nbsp;<\/strong><\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\n<ul>\n<li>User bumps the delete key on the keyboard and doesn&#8217;t realize until 30 days later. Deleted file or email is already purged from the recycle bin.<\/li>\n<li>Administrator accidentally formats the wrong drive.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Technology failure&nbsp;<\/strong><\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\n<ul>\n<li>Hard drive crashes after 5 years of service; can&#8217;t read from it anymore.<\/li>\n<li>Power supply fails and blows up the SSD array.<\/li>\n<\/ul>\n<\/td><\/tr>\n<tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Physical theft&nbsp;<\/strong><\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\n<ul>\n<li>Thieves break into your office and steal your equipment.\n<\/li>\n<\/ul>\n<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">\n<strong>Insider sabotage&nbsp;<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\">\n<ul>\n<li>Rogue staff pull an inside job.<\/li>\n<li>Disgruntled administrator deletes data and the backups before leaving the company.<\/li>\n<\/ul>\n<\/td><\/tr>\n<tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Hardware destruction&nbsp;&nbsp;<\/strong><\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\n<ul>\n<li>Fire, earthquake, flood. Likely that not just your server is destroyed, but all your local computer infrastructure.<\/li>\n<\/ul>\n<\/td><\/tr>\n<tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Automated cyber-crime&nbsp;<\/strong><\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">\n<ul>\n<li>Ransomware, viruses and malware.<\/li>\n<\/ul><\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">\n<strong>Targeted cyber-crime&nbsp;<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\">\n<ul>\n<li>Hacking, computer or network hijack.<\/li>\n<li>Cloud account hijack.<\/li>\n<\/ul>\n<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Now let&#8217;s group the risks and simplify &#8211;&nbsp;<\/h2>\n\n\n\n<p>It turns out that we can map out each of the risk categories according to their commonalities, and escalating need for mitigations.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><thead><tr><th class=\"has-text-align-left\" data-align=\"left\">Level<\/th><th class=\"has-text-align-left\" data-align=\"left\">Risk Categories<\/th><th class=\"has-text-align-left\" data-align=\"left\">Commonalities<\/th><th class=\"has-text-align-left\" data-align=\"left\">Mitigation Needs<\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>1<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"> <ul> <li>Accidental data deletion<\/li> <li>Technology failure<\/li> <\/ul> <\/td><td class=\"has-text-align-left\" data-align=\"left\">Damage is not widespread. It&#8217;s isolated to a piece of data, or a device.&nbsp;<\/td><td class=\"has-text-align-left\" data-align=\"left\">Maintain backups of data, going back in time.&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>2<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\">\n<ul>\n<li>Physical destruction<\/li>\n<li>Physical theft<\/li>\n<\/ul><\/td><td class=\"has-text-align-left\" data-align=\"left\">Damage spreads to multiple machines, often your entire on-premise infrastructure.&nbsp;&nbsp;<\/td><td class=\"has-text-align-left\" data-align=\"left\">Keep some backups elsewhere, in case main office gets destroyed.&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>3<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"> <ul> <li>Insider sabotage<\/li> <li>Automated cyber-crime, ransomware<\/li> <li>Targeted cyber-crime (on-premise)<\/li> <\/ul><\/td><td class=\"has-text-align-left\" data-align=\"left\">Intentional, malicious electronic destruction such as deleting or encrypting the backups, wiping hard drives.&nbsp;<\/td><td class=\"has-text-align-left\" data-align=\"left\">Ensure local backups can withstand intentional sabotage.&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>4<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"> <ul> <li>Sophisticated cyber-crime (cloud)<\/li> <\/ul><\/td><td class=\"has-text-align-left\" data-align=\"left\">Hijacking of cloud storage account, with intention to cripple the backups.&nbsp;<\/td><td class=\"has-text-align-left\" data-align=\"left\">Ensure cloud backups can withstand intentional sabotage.&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>By grouping and ordering these risks like this, it means each level of risk will require more sophisticated mitigations.&nbsp;<\/p>\n\n\n\n<p>But the benefits will be <strong>cumulative<\/strong>. For example, if you can properly protect yourself at say Level 3 with a <a href=\"https:\/\/www.backupassist.com\/blog\/building-a-comprehensive-data-backup-strategy-key-aims-and-best-practices\" target=\"_blank\" rel=\"noreferrer noopener\">well-designed backup strategy<\/a>, you&#8217;ll also be protected at Levels 1 and 2.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Choose a backup strategy that protects against each risk&nbsp;<\/h2>\n\n\n\n<p>Now it becomes much easier to choose a backup strategy that will protect you. Based on our philosophy of multiple layers of protection, and our 24 years of experience, here are our recommended backup strategies:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><thead><tr><th class=\"has-text-align-left\" data-align=\"left\">Level<\/th><th class=\"has-text-align-left\" data-align=\"left\">Backup Strategy Recommendation<\/th><th class=\"has-text-align-left\" data-align=\"left\">Why<\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>1<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Locally stored backups<\/strong>&nbsp;<br>Back up locally, keeping at least 180 days of past data (a.k.a. backup history).&nbsp;<\/td><td class=\"has-text-align-left\" data-align=\"left\">Fast local recoveries.&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>2<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Offsite backups<\/strong>&nbsp;<br>Back up locally, with rotating hard drives which are disconnected and stored offsite.&nbsp;<br>and \/ or&nbsp;<br>Back up to cloud storage, keeping at least 30 days of past data.&nbsp;<\/td><td class=\"has-text-align-left\" data-align=\"left\">Geographic separation protects against physical destruction.&nbsp;<br><br>Offline drives are inaccessible to thieves and saboteurs.&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>3<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Tamper-safe local backups<\/strong>&nbsp;<br>Same as Levels 1 &amp; 2, but with extra steps:&nbsp;\n<ol>\n<li>Activate the CryptoSafeGuard Shield to shield the backups from unauthorized access.<\/li>\n<li>Use access controls on the backup file shares and file systems to restrict user account access.<\/li>\n<li>Where available, utilise snapshots on the backup storage.<\/li>\n<\/ol>\n<\/td><td class=\"has-text-align-left\" data-align=\"left\">Minimizes the possibility that intentional sabotage will work.&nbsp;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>4<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Tamper-safe cloud backups<\/strong>&nbsp;<br>Cloud offsite backups, with cloud immutability turned on and a minimum 180-day retention period.&nbsp;<\/td><td class=\"has-text-align-left\" data-align=\"left\">Last line of defense &#8211; cloud data is guaranteed available until retention period ends.&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Of course, if you have special circumstances, you&#8217;ll need to tweak the recommendations to suit your situation. But the table above gives you a very good starting point, and a way to double-check that your customizations still fulfill the intended requirements of the backups.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Get started today&nbsp;<\/h2>\n\n\n\n<p>It&#8217;s really easy to get started.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Start by identifying which risks you want to mitigate.<\/li><li>Use the Ladder of Cyber-Resilience to determine a suitable backup strategy.&nbsp;<\/li><li>Customize the strategy to suit any special circumstances.&nbsp;<\/li><\/ol>\n\n\n\n<p><\/p>\n\n\n\n<p>If you need assistance with Steps 2 or 3, <a href=\"https:\/\/www.backupassist.com\/company\/contact-us\" target=\"_blank\" rel=\"noreferrer noopener\">contact us<\/a> and we can put you in touch with an appropriate I.T. professional who can help.&nbsp;<\/p>\n\n\n\n<p>Until next time &#8211; stay safe, and stay cyber-resilient!&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cut through the jargon and build a cyber-resilient backup strategy that will guarantee recovery and protect your business data.<\/p>\n","protected":false},"author":2,"featured_media":20148,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[757],"tags":[],"class_list":["post-20082","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-resilience"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Ladder of Cyber-Resilience: finally, here&#039;s an EASY way to understand backup<\/title>\n<meta name=\"description\" content=\"Discover the Ladder of Cyber-Resilience - a simple way to choose a backup strategy that guarantees recovery and protects your business data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Ladder of Cyber-Resilience: finally, here&#039;s an EASY way to understand backup\" \/>\n<meta property=\"og:description\" content=\"Discover the Ladder of Cyber-Resilience - a simple way to choose a backup strategy that guarantees recovery and protects your business data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-24T05:52:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-22T01:44:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/Ladder-of-Cyber-Resilience-Header-Image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1230\" \/>\n\t<meta property=\"og:image:height\" content=\"693\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Linus Chang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linus Chang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup\"},\"author\":{\"name\":\"Linus Chang\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3\"},\"headline\":\"The Ladder of Cyber-Resilience: finally, here&#8217;s an EASY way to understand backup\",\"datePublished\":\"2025-09-24T05:52:34+00:00\",\"dateModified\":\"2025-10-22T01:44:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup\"},\"wordCount\":954,\"publisher\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/Ladder-of-Cyber-Resilience-Header-Image.jpg\",\"articleSection\":[\"Cyber Resilience\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup\",\"name\":\"The Ladder of Cyber-Resilience: finally, here's an EASY way to understand backup\",\"isPartOf\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/Ladder-of-Cyber-Resilience-Header-Image.jpg\",\"datePublished\":\"2025-09-24T05:52:34+00:00\",\"dateModified\":\"2025-10-22T01:44:41+00:00\",\"description\":\"Discover the Ladder of Cyber-Resilience - a simple way to choose a backup strategy that guarantees recovery and protects your business data.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup#primaryimage\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/Ladder-of-Cyber-Resilience-Header-Image.jpg\",\"contentUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/Ladder-of-Cyber-Resilience-Header-Image.jpg\",\"width\":1230,\"height\":693},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sandbox.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Ladder of Cyber-Resilience: finally, here&#8217;s an EASY way to understand backup\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sandbox.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3\",\"name\":\"Linus Chang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g\",\"caption\":\"Linus Chang\"},\"description\":\"*Founder &amp; Creator, BackupAssist* Linus Chang has been writing software since he was eight years old. He founded BackupAssist in 2002 \u2014 making him one of the longest-standing voices in Windows backup and data protection \u2014 and has spent the decades since talking to IT administrators around the world about what actually goes wrong, and why. His interest in data loss isn't abstract. Early in his career, he was working at the Monash University help desk when a student came in with a floppy disk that wouldn't read. They tried everything. None of their drives could read it either. The disk held her entire PhD dissertation \u2014 years of work \u2014 and it was the only copy. She broke down in tears. There was nothing he could do. Five years later, he wrote the first version of BackupAssist. Linus holds a Bachelor of Science in Computer Science and has held Microsoft Certified Solution Developer and Sun Certified Java Programmer credentials. More recently, he has completed digital forensics and cyber-security courses through the Black Hat Conference. He has spoken on information security and cryptography at Infosecurity Europe, addressed politicians and policymakers at Australian Parliament House, presented to SMB IT administrators at the IT Pro Experts Conference, and served as a guest lecturer to Cyber Security master's students at the University of Melbourne. On this blog, Linus writes about backup strategy and the technical side of cyber-resilience \u2014 drawing on 24 years of product development and direct conversation with the IT professionals BackupAssist is built for. [Connect with Linus on LinkedIn](https:\/\/www.linkedin.com\/in\/linuschang\/)\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/author\/linus-chang\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Ladder of Cyber-Resilience: finally, here's an EASY way to understand backup","description":"Discover the Ladder of Cyber-Resilience - a simple way to choose a backup strategy that guarantees recovery and protects your business data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup","og_locale":"en_US","og_type":"article","og_title":"The Ladder of Cyber-Resilience: finally, here's an EASY way to understand backup","og_description":"Discover the Ladder of Cyber-Resilience - a simple way to choose a backup strategy that guarantees recovery and protects your business data.","og_url":"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup","og_site_name":"Cyber Resilience Blog","article_published_time":"2025-09-24T05:52:34+00:00","article_modified_time":"2025-10-22T01:44:41+00:00","og_image":[{"width":1230,"height":693,"url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/Ladder-of-Cyber-Resilience-Header-Image.jpg","type":"image\/jpeg"}],"author":"Linus Chang","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Linus Chang","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup#article","isPartOf":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup"},"author":{"name":"Linus Chang","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3"},"headline":"The Ladder of Cyber-Resilience: finally, here&#8217;s an EASY way to understand backup","datePublished":"2025-09-24T05:52:34+00:00","dateModified":"2025-10-22T01:44:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup"},"wordCount":954,"publisher":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup#primaryimage"},"thumbnailUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/Ladder-of-Cyber-Resilience-Header-Image.jpg","articleSection":["Cyber Resilience"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup","url":"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup","name":"The Ladder of Cyber-Resilience: finally, here's an EASY way to understand backup","isPartOf":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup#primaryimage"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup#primaryimage"},"thumbnailUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/Ladder-of-Cyber-Resilience-Header-Image.jpg","datePublished":"2025-09-24T05:52:34+00:00","dateModified":"2025-10-22T01:44:41+00:00","description":"Discover the Ladder of Cyber-Resilience - a simple way to choose a backup strategy that guarantees recovery and protects your business data.","breadcrumb":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup#primaryimage","url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/Ladder-of-Cyber-Resilience-Header-Image.jpg","contentUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/09\/Ladder-of-Cyber-Resilience-Header-Image.jpg","width":1230,"height":693},{"@type":"BreadcrumbList","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/the-ladder-of-cyber-resilience-finally-heres-an-easy-way-to-understand-backup#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sandbox.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"The Ladder of Cyber-Resilience: finally, here&#8217;s an EASY way to understand backup"}]},{"@type":"WebSite","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#website","url":"https:\/\/www.sandbox.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sandbox.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.sandbox.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3","name":"Linus Chang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g","caption":"Linus Chang"},"description":"*Founder &amp; Creator, BackupAssist* Linus Chang has been writing software since he was eight years old. He founded BackupAssist in 2002 \u2014 making him one of the longest-standing voices in Windows backup and data protection \u2014 and has spent the decades since talking to IT administrators around the world about what actually goes wrong, and why. His interest in data loss isn't abstract. Early in his career, he was working at the Monash University help desk when a student came in with a floppy disk that wouldn't read. They tried everything. None of their drives could read it either. The disk held her entire PhD dissertation \u2014 years of work \u2014 and it was the only copy. She broke down in tears. There was nothing he could do. Five years later, he wrote the first version of BackupAssist. Linus holds a Bachelor of Science in Computer Science and has held Microsoft Certified Solution Developer and Sun Certified Java Programmer credentials. More recently, he has completed digital forensics and cyber-security courses through the Black Hat Conference. He has spoken on information security and cryptography at Infosecurity Europe, addressed politicians and policymakers at Australian Parliament House, presented to SMB IT administrators at the IT Pro Experts Conference, and served as a guest lecturer to Cyber Security master's students at the University of Melbourne. On this blog, Linus writes about backup strategy and the technical side of cyber-resilience \u2014 drawing on 24 years of product development and direct conversation with the IT professionals BackupAssist is built for. [Connect with Linus on LinkedIn](https:\/\/www.linkedin.com\/in\/linuschang\/)","url":"https:\/\/www.sandbox.backupassist.com\/blog\/author\/linus-chang"}]}},"_links":{"self":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/20082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=20082"}],"version-history":[{"count":22,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/20082\/revisions"}],"predecessor-version":[{"id":20144,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/20082\/revisions\/20144"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/20148"}],"wp:attachment":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=20082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=20082"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=20082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}