{"id":20189,"date":"2025-11-19T05:36:28","date_gmt":"2025-11-19T05:36:28","guid":{"rendered":"https:\/\/www.sandbox.backupassist.com\/blog\/?p=20189"},"modified":"2026-04-03T07:47:33","modified_gmt":"2026-04-03T07:47:33","slug":"beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded","status":"publish","type":"post","link":"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded","title":{"rendered":"Beware the imitation: they look similar to backups but will leave you stranded"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">TL;DR Summary<\/h2>\n\n\n\n<p>It&#8217;s easy to tell whether something is a &#8220;genuine backup&#8221; or not &#8211; it&#8217;s about whether it can save your bacon. Regardless of how a technology is marketed or perceived, if it can&#8217;t save your bacon in all the disaster scenarios that you care about, it&#8217;s simply inadequate.<\/p>\n\n\n\n<p>Worse still, confusing jargon and acronyms like RAID, HA, DR, CDP, Cloud Sync can trick people into a false sense of security! I&#8217;ll debunk the myths and false perceptions in this article, so you won&#8217;t find yourself unwittingly making decisions that cost you in the future.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Let&#8217;s cut the jargon and get real. What&#8217;s a &#8220;genuine backup&#8221;?<\/h2>\n\n\n\n<p>With so much I.T. jargon flying around, let&#8217;s instead go back to basics to get some clarity.<\/p>\n\n\n\n<p><strong>A backup is something that will save you if your main &#8220;thing&#8221; fails.<\/strong><\/p>\n\n\n\n<p>* A backup power generator kicks in when the electricity grid fails.<\/p>\n\n\n\n<p>* Spare tires in cars are a backup in case a main tire gets punctured or fails.<\/p>\n\n\n\n<p>* You set two alarms for an important meeting, just in case one fails.<\/p>\n\n\n\n<p><strong>So the only requirement<\/strong> for a backup to be effective is that the backup <strong>must be able to take over<\/strong> if the main thing fails.<\/p>\n\n\n\n<p>This sounds super simple and obvious!<\/p>\n\n\n\n<p>So why then do so many people confuse what is and is not an effective, &#8220;genuine backup&#8221;?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Confusion is a systemic problem perpetuated by the I.T. industry<\/h3>\n\n\n\n<p>I find that most people want to do the right thing, but unwittingly end up doing the wrong thing.<\/p>\n\n\n\n<p>When I ask them why, I invariably discover the same problem that&#8217;s rampant in the I.T. industry &#8211; specifically that <strong>jargon and over-promises used in vendor marketing can deceive people easily<\/strong>.<\/p>\n\n\n\n<p>For example, the term &#8220;Business Continuity \/ Disaster Recovery (BCDR)&#8221; is used by vendors of live replication products to mean &#8220;if one site goes down, the other will take over&#8221;. And it&#8217;s a legitimate scenario &#8211; if site A gets destroyed by a tornado, site B (in a different location) will take over, thereby providing business continuity.<\/p>\n\n\n\n<p>However, the same BCDR acronym may be used by a backup software vendor to mean, &#8220;if you get infected with ransomware, you can recover from backup.&#8221; And it&#8217;s a legitimate claim &#8211; without your backup, your business would grind to a halt&#8230; but with a backup, you can recover from this disaster and continue on&#8230;<\/p>\n\n\n\n<p>So if two products offer BCDR, it&#8217;s easy to conclude that they are equivalent. But that is far from the truth.<\/p>\n\n\n\n<p>You&#8217;d never say to yourself, &#8220;my car has four wheels; my suitcase has four wheels, therefore my car is my suitcase&#8221;. That clearly makes no sense! But that&#8217;s what people do when they confuse genuine backups with the many imitation backups.<\/p>\n\n\n\n<p>Let me try to make things clear now.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">What are the consequences of being tricked?<\/h4>\n\n\n\n<p>I can boil down the consequences of having an imitation backup rather than an effective backup. You&#8217;ll have one of two key problems:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>You&#8217;ll <strong>lose a substantial amount of data<\/strong>, AND \/ OR<\/li><li>The <strong>recovery will be difficult and stressful<\/strong>.<\/li><\/ol>\n\n\n\n<p>Neither situation is one you&#8217;ll want to experience.<\/p>\n\n\n\n<p>At BackupAssist, we have a saying that the <strong>right backup<\/strong> will give you a <strong>straightforward and predictable recovery<\/strong>. Ultimately, that&#8217;s what matters.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">So what are some imitation backups, so I don&#8217;t get fooled?<\/h2>\n\n\n\n<p>There are a number of technologies that may give you a similar sense of security as backups do, but they&#8217;re not actually going to save you from the risks you need to protect against.<\/p>\n\n\n\n<p>Here are my top 6 list of imitations (not a real backup).<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>RAID arrays<\/li><li>Snapshots (such file system or VSS snapshots)<\/li><li>Live replication (HA \/ DR)<\/li><li>File sync &amp; sharing tools like Dropbox, OneDrive, Google Drive<\/li><\/ol>\n\n\n\n<p>Some that come really close to having many properties of backup, but ultimately still fail to meet the &#8220;straightforward recovery&#8221; requirement:<\/p>\n\n\n\n <ol class=\"continue\" start=\"5\">\n        <li>Git and version control<\/li>\n        <li>Infinite file versions on the same cloud service <\/li>\n       <\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Seeing the gaps at a glance<\/h3>\n\n\n\n<p>It&#8217;s easiest to see the gaps and deficiencies of each imitation in this table of data loss and recovery scenarios (click to enlarge) &#8211;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/11\/Imitation-Backups.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/11\/Imitation-Backups-1024x576.jpg\" alt=\"comparison table of the gaps of imitation backups\" class=\"wp-image-20190\" srcset=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/11\/Imitation-Backups-1024x576.jpg 1024w, https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/11\/Imitation-Backups-300x169.jpg 300w, https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/11\/Imitation-Backups-768x432.jpg 768w, https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/11\/Imitation-Backups-1536x864.jpg 1536w, https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/11\/Imitation-Backups.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p><strong>Key insights from the table<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>No single imitation protects against all scenarios<\/li><li>RAID only protects against drive failure, and nothing else<\/li><li>Cloud-based solutions are vulnerable to account compromise<\/li><li>Live replication fails against logical disasters (corruption, deletion, ransomware)<\/li><li>Version control systems only protect what&#8217;s explicitly tracked<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Now let&#8217;s look at each imitation in detail<\/h3>\n\n\n\n<p>You&#8217;re still reading? Great &#8211; you&#8217;re as passionate about backups as I am! Kudos to you!<\/p>\n\n\n\n<p>Let&#8217;s go through each of these six, explain what they are, why they may feel like backups, but where they will be inadequate at saving the day.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">1. The RAID Array<\/h4>\n\n\n\n<p><strong>What it is:<\/strong> RAID stands for Redundant Array of Independent Disks. It spreads your data across multiple hard drives so that if one drive physically fails, your data remains accessible from the other drives.<\/p>\n\n\n\n<p><strong>What it protects against:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Individual hard drive failure<\/li><li>Continued operation while replacing a failed disk<\/li><li>Hardware defects in a single disk<\/li><\/ul>\n\n\n\n<p><strong>Where it fails:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Accidental deletion<\/strong> &#8211; Delete a file, and it&#8217;s instantly deleted across all disks in the array<\/li><li><strong>Ransomware\/malware<\/strong> &#8211; Encrypts or corrupts data across all disks simultaneously<\/li><li><strong>Fire, flood, or theft<\/strong> &#8211; All disks are in the same physical location and get destroyed together<\/li><li><strong>RAID controller failure<\/strong> &#8211; The controller itself can fail and corrupt data on all disks<\/li><li><strong>Multiple disk failures<\/strong> &#8211; If more disks fail than your RAID level can handle, you lose everything<\/li><li><strong>Logical corruption<\/strong> &#8211; Filesystem corruption affects all disks at once<\/li><li><strong>Human error or sabotage <\/strong>&#8211; Any intentional or accidental changes propagate to all disks immediately<\/li><\/ul>\n\n\n\n<p><strong>In summary<\/strong>: RAID protects against hardware failure, not data loss. It keeps your system running when a disk dies, but it won&#8217;t save you from the most common causes of data loss &#8211; human error, malware, or natural disasters.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2. The File System Snapshot<\/h4>\n\n\n\n<p><strong>What it is:<\/strong> Snapshots are point-in-time copies of your data, typically stored on the same storage system. Common examples are Windows VSS (Volume Shadow Copy Service) persistent snapshots, or on Unix systems, ZFS and BTRFS snapshots. They&#8217;re space-efficient because they only record changes rather than duplicating everything.<\/p>\n\n\n\n<p><strong>What it protects against:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Accidental file deletion or modification (you can roll back to a previous snapshot)<\/li><li>Failed software updates or system changes (revert to before the change)<\/li><li>Quick recovery from recent mistakes (within the snapshot retention period)<\/li><\/ul>\n\n\n\n<p><strong>Where it fails:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Same storage location<\/strong> &#8211; If the underlying storage fails, becomes corrupted, or is physically destroyed, all snapshots are lost with it<\/li><li><strong>Hackers &amp; ransomware can delete snapshots<\/strong> &#8211; hackers can easily delete snapshots if they have administrator access. Sophisticated ransomware is even more dangerous, automating the process.<\/li><li><strong>Limited retention<\/strong> &#8211; Snapshots are typically kept for short periods (hours to weeks) and automatically deleted as space fills up<\/li><li><strong>Not offsite<\/strong> &#8211; Fire, flood, theft, or any site-level disaster destroys both your data and all snapshots<\/li><li><strong>Administrator access<\/strong> &#8211; Anyone with admin rights can delete all snapshots, whether accidentally or maliciously<\/li><\/ul>\n\n\n\n<p><strong>In summary:<\/strong> Snapshots are excellent for quick &#8220;oops&#8221; recovery and rolling back recent changes, but they live and die with your primary storage. They&#8217;re a convenience feature, not a disaster recovery solution.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">3. Live Replication Systems (HA\/DR)<\/h4>\n\n\n\n<p><strong>What it is:<\/strong> Live replication maintains synchronized copies of your data, virtual machines, or databases across different servers or locations. This includes High Availability (HA) systems for automatic failover within a data center, and Disaster Recovery (DR) replication to geographically separate sites. Examples include VMware vSphere Replication, Hyper-V Replica, SQL Server Always On, Zerto, and cloud solutions like Azure Site Recovery.<\/p>\n\n\n\n<p><strong>What it protects against:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Hardware failure at the primary site (the replica takes over)<\/li><li>Site-level disasters like fire or flood (if replicated to a different location)<\/li><li>Planned maintenance downtime (failover to replica while servicing primary)<\/li><\/ul>\n\n\n\n<p><strong>Where it fails:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Accidental deletion<\/strong> &#8211; Delete a file or database, and it&#8217;s instantly deleted on the replica<\/li><li><strong>Ransomware<\/strong> &#8211; Encryption propagates to the replica within seconds or minutes<\/li><li><strong>Logical corruption<\/strong> &#8211; Database corruption, filesystem errors, or application bugs are mirrored to the replica<\/li><li><strong>Malicious insider<\/strong> &#8211; An attacker with access can destroy both primary and replica<\/li><li><strong>No point-in-time recovery<\/strong> &#8211; You can only fail over to the current state, not to &#8220;before the problem happened&#8221;<\/li><li><strong>Software bugs<\/strong> &#8211; A bad update or configuration change affects both systems<\/li><li><strong>Compromised credentials<\/strong> &#8211; If an attacker gains access, they typically can access both locations<\/li><\/ul>\n\n\n\n<p><strong>In summary:<\/strong> Replication keeps you running when hardware fails or a site goes down, but it mirrors problems just as quickly as it mirrors data. It maintains the current state, not historical states\u2014which is exactly what you need in a disaster. You need to <strong>always ask this key question:<\/strong> &#8220;Can I recover from a point in time <em>before<\/em> the problem occurred?&#8221; If not, it&#8217;s replication, not backup.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">4. File Sync &amp; Sharing Tools (Dropbox, OneDrive, Google Drive)<\/h4>\n\n\n\n<p><strong>What it is:<\/strong> Cloud-based file synchronization services that keep your files in sync across multiple devices and stored in the cloud. Popular examples include Dropbox, OneDrive, Google Drive, Box, and iCloud Drive. Many offer limited version history features (typically 30-90 days).<\/p>\n\n\n\n<p><strong>What it protects against:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Device loss, theft, or hardware failure (files remain accessible from other devices and the cloud)<\/li><li>Accidental device damage (your laptop dies, but files are still in the cloud)<\/li><li>Recent file modifications (you can restore previous versions within the retention period)<\/li><\/ul>\n\n\n\n<p><strong>Where it fails:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Accidental deletion syncs everywhere<\/strong> &#8211; Delete a file on one device, and it&#8217;s deleted from all devices and the cloud within seconds<\/li><li><strong>Ransomware propagates to the cloud<\/strong> &#8211; If ransomware encrypts your local files, those encrypted files sync to the cloud, overwriting your good files<\/li><li><strong>Limited version history<\/strong> &#8211; Most consumer plans keep versions for only 30 days; after that, you can&#8217;t recover older versions<\/li><li><strong>Account compromise<\/strong> &#8211; If someone gains access to your account, they can delete everything from all locations. Especially dangerous is the &#8220;remote wipe&#8221; feature that allows attackers to delete data from synced devices.<\/li><li><strong>Sync bugs can cause mass deletion<\/strong> &#8211; Software glitches have been known to sync deletions that shouldn&#8217;t have happened<\/li><li><strong>Shared folders multiply the risk<\/strong> &#8211; Anyone with access to a shared folder can accidentally (or intentionally) delete files for everyone<\/li><li><strong>No true isolation<\/strong> &#8211; All copies are connected to the same account and authentication system<\/li><li><strong>Malware with cloud access<\/strong> &#8211; Modern malware can use your credentials to delete cloud copies too<\/li><\/ul>\n\n\n\n<p><strong>In summary:<\/strong> File sync tools are fantastic for collaboration and accessing your files anywhere, but they&#8217;re designed for convenience, not protection. They keep multiple copies of your <em>current<\/em> files, but when something goes wrong, that wrong state propagates everywhere almost instantly.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">And now for the honorable mentions<\/h3>\n\n\n\n<p>There are two technologies that I think come really close to bona fide backups, and <strong>very often lure people into not performing backups<\/strong> because of their similarities.<\/p>\n\n\n\n<p>But these two imitations come with a <strong>severe flaw<\/strong>: while you might not lose your data, it can be difficult and time consuming to recover.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">5. Git and Version Control<\/h4>\n\n\n\n<p><strong>What it is:<\/strong> Version control systems like Git, Subversion (SVN), or Mercurial track every change made to files over time, creating a complete history. You can roll back to any previous version of any file. Git repositories are often distributed across multiple developers&#8217; machines and remote servers like GitHub or GitLab.<\/p>\n\n\n\n<p><strong>What it protects against:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Accidental file modifications or deletions (revert to any previous commit)<\/li><li>Bad code changes (roll back to when things worked)<\/li><li>Complete change history with author attribution (know who changed what and when)<\/li><li>Distributed copies (multiple people have full repository history)<\/li><\/ul>\n\n\n\n<p><strong>Where it fails:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Only tracks committed files<\/strong> &#8211; If you forget to commit your work, it&#8217;s not protected<\/li><li><strong>Requires manual action<\/strong> &#8211; You must remember to commit regularly; there&#8217;s no automatic protection<\/li><li><strong>Doesn&#8217;t track everything<\/strong> &#8211; System configurations, databases, compiled binaries, and large files are typically excluded. If everything were put into version control, the repository would grow impracticably big.<\/li><li><strong>Limited to the repository<\/strong> &#8211; Files outside the Git repository aren&#8217;t protected at all<\/li><li><strong>Force pushes can destroy history<\/strong> &#8211; With the right (or wrong) commands, history can be rewritten or lost<\/li><li><strong>Repository corruption<\/strong> &#8211; The entire Git repository can become corrupted, taking all history with it<\/li><li><strong>Requires technical knowledge<\/strong> &#8211; Non-technical users often struggle with version control concepts<\/li><li><strong>Not designed for full system recovery<\/strong> &#8211; Can&#8217;t restore your entire development environment, just the code files. And worse still, if your remote repository gets destroyed (without a genuine backup in place), recovering can be a nightmare as code needs to be manually re-committed and pushed.<\/li><li><strong>Remote repository access<\/strong> &#8211; If compromised accounts have push access, malicious changes can be pushed to all copies<\/li><\/ul>\n\n\n\n<p><strong>In summary:<\/strong> Git is excellent for tracking code changes and collaboration, and developers (me included!) often rely on it to recover from coding mistakes. However, it only protects what you explicitly commit, requires discipline and technical knowledge, and isn&#8217;t designed to back up entire systems or non-code assets. It&#8217;s version control, not comprehensive backup.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">6. Infinite File Versions on the Same Cloud Service<\/h4>\n\n\n\n<p><strong>What it is<\/strong>: Some cloud storage services offer extended or unlimited version history as a premium feature. For example, Dropbox Business offers unlimited version history, Google Workspace keeps versions for 30 days to indefinitely (depending on plan), and OneDrive for Business can be configured for longer retention. This means you can recover any version of any file from weeks, months, or even years ago.<\/p>\n\n\n\n<p><strong>What it protects against<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Accidental file changes or deletions (recover from any point in history)<\/li><li>Ransomware that encrypts files (restore from versions before the attack)<\/li><li>Long-term mistakes (realized months later that you need an old version)<\/li><li>Gradual data corruption (go back to before corruption started)<\/li><\/ul>\n\n\n\n<p><strong>Where it fails:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Lack of non-destructive point in time restore en masse<\/strong> &#8211; two of the major providers provide <em>revert<\/em> or <em>rollback<\/em> capabilities on a cloud drive, meaning once you do that, you&#8217;ll lose any changes since the target rollback time. Another major provider forces you to restore individual files from the file history. All these options are inadequate. In recovery scenarios, the utmost care must be taken, usually requiring (a) a restore to a specific point in time, (b) restoring to a different location, not over the top of existing data, (c) previewing the restore action before actually doing it.<\/li><li><strong>Single point of failure<\/strong> &#8211; All versions are stored with one service provider under one account, meaning a single account compromise or vendor failure leaves your primary copy of data, and version history, vulnerable.<\/li><li><strong>No true air-gapping<\/strong> &#8211; All versions are accessible online, making them vulnerable to sophisticated attacks<\/li><li><strong>Service discontinuation<\/strong> &#8211; If the company is acquired, changes business models, or shuts down, your versions could disappear &#8211; this is more likely to apply to smaller cloud storage vendors but nonetheless is still a risk.<\/li><\/ul>\n\n\n\n<p><strong>In summary:<\/strong> Extended version history is significantly better than basic file sync and comes very close to being a proper backup. However, lack of proper restore features make it impractical to restore files en masse, while keeping everything with a single provider under a single account creates a single point of failure. A true backup strategy requires copies that are truly independent and isolated from your primary systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Now you can spot the imitation and avoid being fooled, what&#8217;s next?<\/h2>\n\n\n\n<p>It&#8217;s understandable why so many people think that the imitation backup can substitute a real one. But I trust you can now spot the differences.<\/p>\n\n\n\n<p>So where to from here?<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li><strong>Audit what you have<\/strong> &#8211; Go through each technology you&#8217;re currently using and honestly assess it against the scenarios in the table above<\/li><li><strong>Ask the right questions<\/strong> &#8211; When a vendor claims their product provides &#8220;data protection,&#8221; &#8220;BCDR,&#8221; or &#8220;CDP,&#8221; ask specifically: &#8220;Can I recover from a ransomware attack? Can I restore to a point in time before the problem occurred?&#8221;<\/li><li><strong>Don&#8217;t eliminate the imitations<\/strong> &#8211; RAID, snapshots, replication, and cloud sync all have legitimate uses. Keep using them for what they&#8217;re good at &#8211; just don&#8217;t mistake them for backups<\/li><li><strong>Make sure you have genuine backups<\/strong> &#8211; Whether you use backup software, cloud backup services, or managed backup solutions, make sure you have genuine backups that are isolated, immutable, and tested regularly<\/li><li><strong>Test your recovery<\/strong> &#8211; The best backup is worthless if you can&#8217;t actually recover from it. Test regularly to ensure your recovery process is truly straightforward and predictable<\/li><\/ol>\n\n\n\n<p>When disaster strikes, you&#8217;ll be grateful you invested in the real thing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud sync, past versions retention, snapshots and RAID are examples of technologies that &#8220;look like&#8221; backup, may give you a warm fuzzy feeling, but are simply not dependable in the full range of disaster scenarios. This results in data loss, a complicated and time-consuming recovery, or both.<\/p>\n","protected":false},"author":2,"featured_media":20193,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[757],"tags":[],"class_list":["post-20189","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-resilience"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Beware the imitation: they look similar to backups but will leave you stranded<\/title>\n<meta name=\"description\" content=\"Learn to distinguish true backups from RAID, snapshots, sync, and replication\u2014and avoid hidden risks that could leave your business exposed.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beware the imitation: they look similar to backups but will leave you stranded\" \/>\n<meta property=\"og:description\" content=\"Learn to distinguish true backups from RAID, snapshots, sync, and replication\u2014and avoid hidden risks that could leave your business exposed.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-19T05:36:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-03T07:47:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/11\/shutterstock_2604650457.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"567\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Linus Chang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linus Chang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded\"},\"author\":{\"name\":\"Linus Chang\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3\"},\"headline\":\"Beware the imitation: they look similar to backups but will leave you stranded\",\"datePublished\":\"2025-11-19T05:36:28+00:00\",\"dateModified\":\"2026-04-03T07:47:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded\"},\"wordCount\":2766,\"publisher\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/11\/shutterstock_2604650457.jpg\",\"articleSection\":[\"Cyber Resilience\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded\",\"name\":\"Beware the imitation: they look similar to backups but will leave you stranded\",\"isPartOf\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/11\/shutterstock_2604650457.jpg\",\"datePublished\":\"2025-11-19T05:36:28+00:00\",\"dateModified\":\"2026-04-03T07:47:33+00:00\",\"description\":\"Learn to distinguish true backups from RAID, snapshots, sync, and replication\u2014and avoid hidden risks that could leave your business exposed.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded#primaryimage\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/11\/shutterstock_2604650457.jpg\",\"contentUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/11\/shutterstock_2604650457.jpg\",\"width\":1000,\"height\":567},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sandbox.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Beware the imitation: they look similar to backups but will leave you stranded\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sandbox.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3\",\"name\":\"Linus Chang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g\",\"caption\":\"Linus Chang\"},\"description\":\"*Founder &amp; Creator, BackupAssist* Linus Chang has been writing software since he was eight years old. He founded BackupAssist in 2002 \u2014 making him one of the longest-standing voices in Windows backup and data protection \u2014 and has spent the decades since talking to IT administrators around the world about what actually goes wrong, and why. His interest in data loss isn't abstract. Early in his career, he was working at the Monash University help desk when a student came in with a floppy disk that wouldn't read. They tried everything. None of their drives could read it either. The disk held her entire PhD dissertation \u2014 years of work \u2014 and it was the only copy. She broke down in tears. There was nothing he could do. Five years later, he wrote the first version of BackupAssist. Linus holds a Bachelor of Science in Computer Science and has held Microsoft Certified Solution Developer and Sun Certified Java Programmer credentials. More recently, he has completed digital forensics and cyber-security courses through the Black Hat Conference. He has spoken on information security and cryptography at Infosecurity Europe, addressed politicians and policymakers at Australian Parliament House, presented to SMB IT administrators at the IT Pro Experts Conference, and served as a guest lecturer to Cyber Security master's students at the University of Melbourne. On this blog, Linus writes about backup strategy and the technical side of cyber-resilience \u2014 drawing on 24 years of product development and direct conversation with the IT professionals BackupAssist is built for. [Connect with Linus on LinkedIn](https:\/\/www.linkedin.com\/in\/linuschang\/)\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/author\/linus-chang\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beware the imitation: they look similar to backups but will leave you stranded","description":"Learn to distinguish true backups from RAID, snapshots, sync, and replication\u2014and avoid hidden risks that could leave your business exposed.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded","og_locale":"en_US","og_type":"article","og_title":"Beware the imitation: they look similar to backups but will leave you stranded","og_description":"Learn to distinguish true backups from RAID, snapshots, sync, and replication\u2014and avoid hidden risks that could leave your business exposed.","og_url":"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded","og_site_name":"Cyber Resilience Blog","article_published_time":"2025-11-19T05:36:28+00:00","article_modified_time":"2026-04-03T07:47:33+00:00","og_image":[{"width":1000,"height":567,"url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/11\/shutterstock_2604650457.jpg","type":"image\/jpeg"}],"author":"Linus Chang","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Linus Chang","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded#article","isPartOf":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded"},"author":{"name":"Linus Chang","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3"},"headline":"Beware the imitation: they look similar to backups but will leave you stranded","datePublished":"2025-11-19T05:36:28+00:00","dateModified":"2026-04-03T07:47:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded"},"wordCount":2766,"publisher":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded#primaryimage"},"thumbnailUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/11\/shutterstock_2604650457.jpg","articleSection":["Cyber Resilience"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded","url":"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded","name":"Beware the imitation: they look similar to backups but will leave you stranded","isPartOf":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded#primaryimage"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded#primaryimage"},"thumbnailUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/11\/shutterstock_2604650457.jpg","datePublished":"2025-11-19T05:36:28+00:00","dateModified":"2026-04-03T07:47:33+00:00","description":"Learn to distinguish true backups from RAID, snapshots, sync, and replication\u2014and avoid hidden risks that could leave your business exposed.","breadcrumb":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded#primaryimage","url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/11\/shutterstock_2604650457.jpg","contentUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2025\/11\/shutterstock_2604650457.jpg","width":1000,"height":567},{"@type":"BreadcrumbList","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/beware-the-imitation-they-look-similar-to-backups-but-will-leave-you-stranded#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sandbox.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"Beware the imitation: they look similar to backups but will leave you stranded"}]},{"@type":"WebSite","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#website","url":"https:\/\/www.sandbox.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sandbox.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.sandbox.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3","name":"Linus Chang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g","caption":"Linus Chang"},"description":"*Founder &amp; Creator, BackupAssist* Linus Chang has been writing software since he was eight years old. He founded BackupAssist in 2002 \u2014 making him one of the longest-standing voices in Windows backup and data protection \u2014 and has spent the decades since talking to IT administrators around the world about what actually goes wrong, and why. His interest in data loss isn't abstract. Early in his career, he was working at the Monash University help desk when a student came in with a floppy disk that wouldn't read. They tried everything. None of their drives could read it either. The disk held her entire PhD dissertation \u2014 years of work \u2014 and it was the only copy. She broke down in tears. There was nothing he could do. Five years later, he wrote the first version of BackupAssist. Linus holds a Bachelor of Science in Computer Science and has held Microsoft Certified Solution Developer and Sun Certified Java Programmer credentials. More recently, he has completed digital forensics and cyber-security courses through the Black Hat Conference. He has spoken on information security and cryptography at Infosecurity Europe, addressed politicians and policymakers at Australian Parliament House, presented to SMB IT administrators at the IT Pro Experts Conference, and served as a guest lecturer to Cyber Security master's students at the University of Melbourne. On this blog, Linus writes about backup strategy and the technical side of cyber-resilience \u2014 drawing on 24 years of product development and direct conversation with the IT professionals BackupAssist is built for. [Connect with Linus on LinkedIn](https:\/\/www.linkedin.com\/in\/linuschang\/)","url":"https:\/\/www.sandbox.backupassist.com\/blog\/author\/linus-chang"}]}},"_links":{"self":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/20189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=20189"}],"version-history":[{"count":3,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/20189\/revisions"}],"predecessor-version":[{"id":20197,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/20189\/revisions\/20197"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/20193"}],"wp:attachment":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=20189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=20189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=20189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}