Dec. 1, 2025

The Death of the 3-2-1 Rule: Enter 3-2-1-1-0

The Death of the 3-2-1 Rule: Enter 3-2-1-1-0

The 3-2-1 rule is dead. Long live 3-2-1-1-0. For decades, the 3-2-1 rule has been the gold standard for backup strategies - three copies of your data, on two different media, with one copy somewhere else. But ransomware killed it. Not because the fundamentals were wrong, but because threat actors learned to target backups specifically. In this episode, Curtis and Prasanna explain why the traditional 3-2-1 rule isn't enough anymore and what the evolution to 3-2-1-1-0 means for your backup strategy. The extra "1" stands for one immutable, air-gapped copy that attackers can't delete or encrypt. The "0" means zero failures - your backups must actually work when you need them. You'll learn why SaaS platforms don't meet the 3-2-1 rule, how to think about immutability in the cloud era, and why this upgrade isn't optional if you want to survive a ransomware attack.

Our interview with Peter Krogh, the one who coined the term:

https://www.backupwrapup.com/peter-krogh-who-coined-the-3-2-1-rule-on-our-podcast/

Speaker:

You found the backup wrap up your go-to podcast for all things

Speaker:

backup recovery and cyber recovery.

Speaker:

In this episode, we're declaring the death of the 3, 2, 1 rule.

Speaker:

Sort of the 3, 2, 1 rule has been a foundation of backup,

Speaker:

uh, best practices since.

Speaker:

The nineties, but it's time to admit that it's not quite enough.

Speaker:

Ransomware has changed everything.

Speaker:

Threat actors are going after your backups too.

Speaker:

So the 3, 2, 1 rule had to evolve.

Speaker:

It's now 3, 2, 1, 1 0.

Speaker:

We'll break down what those extra numbers mean and why immutable

Speaker:

and air gap copies are now.

Speaker:

Non-negotiable and why?

Speaker:

Zero backup failures matters more than ever.

Speaker:

By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.

Speaker:

Backup, and I've been passionate about backup and recovery for over 30 years.

Speaker:

That's a long time ever since I had to tell my boss there were no backups of that

Speaker:

production database that we just lost.

Speaker:

I don't want that to happen to you, and that's why I do this.

Speaker:

On this podcast, we turn unappreciated admins into cyber recovery heroes.

Speaker:

This is the backup wrap up.

Speaker:

Welcome to the show.

Speaker:

Hi, I am w Curtis Preston, AKA, Mr. Backup, and I have with me a guy who

Speaker:

I used to think was smart until he told me the story he just told me.

Speaker:

Prasanna Malaiyandi how's it going?

Speaker:

Prasanna.

Speaker:

I am good and I, I'm glad I am bringing you to reality rather than

Speaker:

putting me up on a pedestal with all

Speaker:

So, so what did you just tell me?

Speaker:

Why did you have a, a cut on your forehead?

Speaker:

Yeah.

Speaker:

So for people who, by the way, we do YouTube, so the podcast, if you want to

Speaker:

Yeah, if you wanna watch this on YouTube or, yeah, yeah.

Speaker:

Yeah.

Speaker:

wrap up channel.

Speaker:

You can watch us there.

Speaker:

But, uh, well, yeah, when I was younger, I decided I wanted to be like,

Speaker:

you know, all those wrestlers, like where they're like, girl, and then

Speaker:

they crush the can on their forehead.

Speaker:

Yeah, you did that and

Speaker:

So I had an empty can and I was like, oh yeah, that's cool.

Speaker:

I'll try that too.

Speaker:

Yeah, let's just say that

Speaker:

no bueno.

Speaker:

up with the cut.

Speaker:

Yeah.

Speaker:

Yeah, we of course, started this conversation because of this little

Speaker:

gash on my forehead due to just my inability to navigate me, me

Speaker:

trying to prove, once again, prove.

Speaker:

A fundamental law of physics, you know, that no two objects can occupy

Speaker:

the same space at the same time.

Speaker:

Y you know, I think someone's just moving stuff around on you,

Speaker:

Curtis, I think like, like yeah.

Speaker:

Things jumping out and places you don't expect.

Speaker:

I think someone's messing with

Speaker:

I wish I could blame that on this.

Speaker:

Unfortunately, this, you know, this was a shelf.

Speaker:

A shelf which I mounted.

Speaker:

Yeah.

Speaker:

So I can't really blame moving around stuff, but.

Speaker:

It's

Speaker:

Uh, yeah, but speaking of moving around stuff, move, you know,

Speaker:

the 3, 2, 1 rule has been moved around a bit, I think, you know?

Speaker:

what is a 3, 2, 1 rule?

Speaker:

Yeah.

Speaker:

Let's start with that.

Speaker:

And, and I would say that it is like, you know, first off, um, let,

Speaker:

let's, let's just say I, I would say it's one of the most fundamental

Speaker:

sort of concepts in backup, right?

Speaker:

Do you remember when every episode had the 3, 2, 1 rule in it?

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

It, it came up a lot.

Speaker:

Right.

Speaker:

Um, and so, and, and, and, and we've, it's somewhat morphed over time in terms

Speaker:

of what we, what the 3, 2, 1 means.

Speaker:

Um, uh, but, but let's just start with it.

Speaker:

You know, it's three copies of your data on two different media.

Speaker:

One of which is somewhere else.

Speaker:

Um, and that we used to say, one of which is offsite.

Speaker:

I've changed that to somewhere else because that, that sort of

Speaker:

goes with the cloud concept, right?

Speaker:

By the way, if you wanna listen to more about where the 3, 2, 1 rule came from.

Speaker:

We actually did an episode with the person who created the

Speaker:

Yes.

Speaker:

Yeah.

Speaker:

The coin, Peter.

Speaker:

It, was it Kro?

Speaker:

I think it's pronounced Kro.

Speaker:

Um, it's K-R-O-G-H-I believe.

Speaker:

Uh, yeah, with the guy that coined the term, he, he was a, or is a

Speaker:

digital photographer, coined the term back in the nineties and we

Speaker:

actually had him on the podcast.

Speaker:

That was very cool.

Speaker:

I'll put a link to that in the, uh, in the podcast.

Speaker:

And, and he was just trying to help.

Speaker:

Um.

Speaker:

Uh, you know, digital photographers do the right thing and, and we're like,

Speaker:

yes, we like this right thing, you know?

Speaker:

And, and, and, and the thing is, it should be more just like what

Speaker:

we're gonna talk about today.

Speaker:

It, it's like a very basic, like if you, if you aren't at least doing

Speaker:

this, you aren't doing backups.

Speaker:

Yeah,

Speaker:

Um, it, it's not like this is like the way to architect a backup system.

Speaker:

This is if you don't have at least three copies of your data, if you don't have

Speaker:

at, on at least two pieces of media and at least one of them somewhere

Speaker:

else, you, you just, what, what?

Speaker:

Don't even, don't even talk to me.

Speaker:

Right.

Speaker:

Um, where, where do we, where do we end up using this rule A lot as a

Speaker:

sort of a proof point to say, well, you are not doing backups, do you?

Speaker:

Do you remember where that comes up A lot.

Speaker:

I think this came up when we started looking at like SaaS backups.

Speaker:

Yeah, or just what, or, or the non-existence thereof.

Speaker:

Right.

Speaker:

Um, right, because there, there are so many people, it's like, uh.

Speaker:

I, I found, I, I have found myself arguing with people online, you know?

Speaker:

I,

Speaker:

Uh,

Speaker:

laughing 'cause I think one of the first times, maybe like six months

Speaker:

after we met, or maybe a year after we

Speaker:

yeah,

Speaker:

I remember you going on this rant how frustrated you were with Microsoft.

Speaker:

yeah,

Speaker:

Claiming Microsoft 365 need backup.

Speaker:

Yeah.

Speaker:

And there was, there, there was, and is a guy that.

Speaker:

Actually is a Microsoft 365 expert, and he wrote a book about Microsoft 365 and I

Speaker:

bought it just to see what he had to say.

Speaker:

And literally it was like the fir, the chapter on backup basically

Speaker:

said, strictly speaking, you don't need to backup Microsoft 365.

Speaker:

And I was like, ah.

Speaker:

Right.

Speaker:

Um.

Speaker:

And, and again, it's not, it's nothing against Microsoft 365.

Speaker:

It is.

Speaker:

Just to go to the, to this topic, you're your, your, your, your copies as I make

Speaker:

quotes in the air aren't copies, number one, it it, like, it doesn't, it doesn't

Speaker:

conform to any of the 3, 2, 1 rule.

Speaker:

Right?

Speaker:

So you're, you're, there aren't multiple copies.

Speaker:

There are, there can be versioning within, uh, within.

Speaker:

365, but your copies aren't copies.

Speaker:

Why aren't they copies?

Speaker:

Because, well, one of two things.

Speaker:

One, they either rely on something else, like they're part of production,

Speaker:

right?

Speaker:

right.

Speaker:

Uh, so as an example, if you're

Speaker:

using Recycle bin to hold your copies or whatever else,

Speaker:

right?

Speaker:

It's still part of the same production database.

Speaker:

And

Speaker:

so you have that issue or the fact that like these are things that

Speaker:

you don't have access to as back.

Speaker:

Up admin.

Speaker:

Yeah, it's, yeah, it's, it is multiple things, right?

Speaker:

Like you said, it's, it's not, well, it's not a copy 'cause it's not a copy, right?

Speaker:

It's not, it's all, everything's all in, in one place.

Speaker:

It's not, you're not actually taking a copy of it and putting that copy

Speaker:

on some other piece of storage.

Speaker:

If you copy yes, if you go on your hard drive.

Speaker:

And, um, or your drive, I guess, you know, it's not always a hard drive these days,

Speaker:

but usually not a hard drive these days.

Speaker:

If you go on your laptop and you right click, uh, on your, your, uh, your, your

Speaker:

drive and you say, copy this file and then paste it, you've, you've, you've

Speaker:

essentially made a copy of the file

Speaker:

Mm-hmm.

Speaker:

you at least have a separate.

Speaker:

Um, instance of that file that is a copy, it's not yet a backup.

Speaker:

Yep.

Speaker:

What's the difference between a copy and a backup?

Speaker:

It's on something else.

Speaker:

It's still

Speaker:

Yeah,

Speaker:

next to your production.

Speaker:

yeah.

Speaker:

That's the, that's the whole 3, 2, 1.

Speaker:

You know, if you just make a bunch of copies.

Speaker:

And you don't separate those copies from the drive, right?

Speaker:

So this is like, you could do three copies, but all on the same drive.

Speaker:

You don't really have a backup at that point.

Speaker:

You need to put it on a, another drive,

Speaker:

It's

Speaker:

right?

Speaker:

about NAS systems, right?

Speaker:

And one of my former employers, right?

Speaker:

Yeah,

Speaker:

okay.

Speaker:

You can do snapshots of your production volume, which is great.

Speaker:

You

Speaker:

yeah.

Speaker:

versions, like you said, but typically those snapshots lived with the production.

Speaker:

So if you

Speaker:

Yeah.

Speaker:

volume or you lost the system, you lost your copies.

Speaker:

And those are not copies, right?

Speaker:

Those are, those are virtual copies.

Speaker:

But you know, you were saying it sits on the same thing.

Speaker:

It, it's relying on the storage.

Speaker:

So that's not a copy at all.

Speaker:

So that doesn't follow the 3, 3, 2, 1 rule.

Speaker:

Right?

Speaker:

So, uh, usually when, so my point is that usually when we use the 3, 2,

Speaker:

1 rule as a cudgel these days, we're using it to just basically prove, it's

Speaker:

like look snapshots by themselves.

Speaker:

Are not backups, SaaS, uh, you know, recycle bin, uh, et cetera, et cetera,

Speaker:

retention policies in Microsoft 365, which is like a fancier version of

Speaker:

the, um, of the, um, recycle bin.

Speaker:

You can say, Hey, uh, you know, you can't, you know, every object, which

Speaker:

is a term would, that would include emails, files, spreadsheets, et cetera.

Speaker:

Every object has to be retained for at least 30 days or 90 days, whatever.

Speaker:

You could create a retention policy that every.

Speaker:

Object once it's created, is retained for at least 90 days,

Speaker:

um, even after its deletion.

Speaker:

And you can say that, uh, that copy while being stored is immutable, right?

Speaker:

You can say that it cannot be deleted out of that, that thing, right?

Speaker:

Um, but that it, it's all, it really is, is a big fancy database.

Speaker:

With a, with a, with a, you know, it's, it's a special purpose database.

Speaker:

It hold that holds the emails, it holds the files, it holds all of that.

Speaker:

Uh, and so you're not copying anything anywhere.

Speaker:

, If you're not copying it anywhere, it's not a backup.

Speaker:

It's a, it's a convenience copy.

Speaker:

Just like the copying and pasting a file within the same hard drive.

Speaker:

Okay, so Microsoft would argue that with Exchange or with Microsoft 365,

Speaker:

Yeah.

Speaker:

replicate their data

Speaker:

Yep,

Speaker:

offsite location,

Speaker:

yep,

Speaker:

Secondary, just in case something happens to the primary data center,

Speaker:

A and,

Speaker:

your service.

Speaker:

and that replication has a delay in it, right?

Speaker:

So it is a delayed, replicated copy, which is great.

Speaker:

The only problem is you get no access to that.

Speaker:

Right.

Speaker:

So, and I've verified this as a customer of a very large company,

Speaker:

paying, you know, a crap ton of money every month to Microsoft.

Speaker:

Say, Hey, let's say somebody obliterated a, you know, we

Speaker:

obliterated a user within 365 or ransomware attacked a user within 365.

Speaker:

Could we use that delayed copy?

Speaker:

As a method to restore it.

Speaker:

And the answer was an emphatic no.

Speaker:

That is not what it's for,

Speaker:

Yep.

Speaker:

It's, it's there for, um, um, what do you call it?

Speaker:

It's there for the, essentially dr for them, right?

Speaker:

If the, if the, which is good to know, right?

Speaker:

That they do have DR for their, um, you know, for their environment.

Speaker:

Uh, but it, it's not for you, right?

Speaker:

and, and I think that's important to understand as you're going from workloads.

Speaker:

On systems that you own, that you operate,

Speaker:

Right,

Speaker:

versus SaaS you now have this split responsibility model,

Speaker:

and you might have to do additional things in the SaaS environments that

Speaker:

you think you don't have to do, but it's actually more important that

Speaker:

you do backup being one of them.

Speaker:

Yeah.

Speaker:

And, and if you, if you don't have access to that backup, you do.

Speaker:

If you don't have independent control over that backup, then

Speaker:

you don't really have a backup.

Speaker:

Right?

Speaker:

So this is what the 3, 2, 1 rule is about, right?

Speaker:

Is that, is that we, we, we need to make another copy.

Speaker:

That copy needs to be in your hot little hands, not necessarily physically.

Speaker:

Right in your hot little hands.

Speaker:

It could be in the cloud, it could be in an, it just needs to be

Speaker:

somewhere else again, and, and, because in the SaaS world, they

Speaker:

don't even conform to the two, right?

Speaker:

They don't conform to the three, they don't conform to the two, and they

Speaker:

definitely don't conform to the one, which is why we end up using the 3, 2, 1

Speaker:

rules of cudgel for saying that the stuff, the stuff that they do is not a backup.

Speaker:

Yep.

Speaker:

Um, and so while the title might of this podcast might have suggested

Speaker:

that the 3, 2, 1 rule is dead, it, it's not, it, it still has a purpose.

Speaker:

Um, and that is, and, and the purpose that it serves primarily is it's a

Speaker:

cudgel to say, Hey, that's not a, that's, those aren't backups at all.

Speaker:

but, but why does it matter to say that those are not backups,

Speaker:

Well.

Speaker:

does that matter

Speaker:

Yeah.

Speaker:

That's a great, yeah, because again, if something happens, specifically the

Speaker:

number one reason people are restoring these days, ransomware, if a ransomware

Speaker:

attack attacks your 365 account and you're unable to use your backups,

Speaker:

uh, to put everything back, uh, then why, why were you even making them?

Speaker:

Right.

Speaker:

The the other thing, and, and, and again, this isn't so much on the 3, 2,

Speaker:

1 rule, but the other thing is that.

Speaker:

The other thing about, especially when we talk about 365 and, and similar

Speaker:

products, the, the thing they have that, that some people think of as backup,

Speaker:

it also is really bad at Restore.

Speaker:

Right.

Speaker:

Just functionality wise.

Speaker:

Yeah.

Speaker:

It's good at bringing back a handful of files or a handful of emails that

Speaker:

you were looking for, but in terms of put my inbox back to the way it looked

Speaker:

before this thing happened, it just simply doesn't have that functionality.

Speaker:

I,

Speaker:

it's a bit more like an e-discovery tool or an

Speaker:

archive like system rather than a backup and restore tool.

Speaker:

Right, right.

Speaker:

Um, so.

Speaker:

Why then?

Speaker:

So if, if we still think that it has value, why then do

Speaker:

people say 3, 2, 1 rule is dead.

Speaker:

People like Rick Vanover over at

Speaker:

I, I, I was,

Speaker:

Veeam.

Speaker:

well, I remember when was on the podcast

Speaker:

Yeah,

Speaker:

he was, I think he added a few extra numbers

Speaker:

yeah,

Speaker:

2, 1, right.

Speaker:

yeah.

Speaker:

He has indeed, in fact.

Speaker:

When I was researching for this podcast, uh, you know, nobody ever actually

Speaker:

visits the, uh, the site anymore.

Speaker:

You just get the, the Google summary, right?

Speaker:

Um, and, uh.

Speaker:

But, but in the Google summary, this is new.

Speaker:

I've actually never seen this until just now.

Speaker:

In the Google summary, there was a video, uh, and it was, it was rickatron

Speaker:

doing the 3, 2, 1, 1 0 on the, on the, uh, the, the glass, uh, thing.

Speaker:

Nice.

Speaker:

and I was like, oh, look at, look at Rick.

Speaker:

He's, he's popular enough that he shows up in the, in the thing there.

Speaker:

The question that was on the table was, why do people say that

Speaker:

the 3, 2, 1 rule is not enough?

Speaker:

Because 3, 2, 1 is good for most cases, but things have changed.

Speaker:

I know you alluded to it earlier that most of the time when you're

Speaker:

recovering, it's due to a cybersecurity

Speaker:

incident or ransomware or something else like that,

Speaker:

where just having that one copy offsite is not good enough.

Speaker:

Well, it, it's not just that it's offsite, it, the, the big thing

Speaker:

is that it needs to be immutable.

Speaker:

Right.

Speaker:

That's the thing that we really, you know, in my first shoot, my first

Speaker:

25 years in the backup space, I don't recall ever using that term.

Speaker:

I

Speaker:

did.

Speaker:

You did.

Speaker:

I did, yes, but it was more intended from a compliance perspective.

Speaker:

So it was

Speaker:

around like Sarbanes Oxley and

Speaker:

those sort of requirements rather than backup and

Speaker:

yeah, and that shows sort of your journey versus my journey, right?

Speaker:

I was focused mainly on backup and recovery and, um, the, um, uh, what's

Speaker:

funny is I, I do remember a lot of SOCS compliance stuff that we had to do, but.

Speaker:

I, I think we, we still didn't use that term.

Speaker:

Right.

Speaker:

Uh, let's just, again, let's define the term immutable.

Speaker:

Immutable just literally means that it cannot be changed, right?

Speaker:

And this is true that cybersecurity incidents, AKA ransomware usually,

Speaker:

um, is I think the number one reason that people do restores these days.

Speaker:

And since that's the case, and since we know that the first thing that a

Speaker:

ransomware, a threat actor is going to do is attempt to disable your backup

Speaker:

system, um, the, this is why the first thing, the, the next thing you need to be

Speaker:

adding to that 3, 2, 1 is that at least one of your copies needs to be immutable.

Speaker:

Now, do you wanna define immutable?

Speaker:

So immutable means that you're not able to delete the copy.

Speaker:

No one can really delete the copy before a certain time period has elapsed.

Speaker:

So you might say, okay, keep the copies around for three months and before three

Speaker:

months, and admin can't go delete it.

Speaker:

Uh, malicious actor can't go delete it.

Speaker:

The system doesn't allow you to delete it unless you basically go and.

Speaker:

Pull the drives out and

Speaker:

Yeah.

Speaker:

on it,

Speaker:

Yeah.

Speaker:

giant drill.

Speaker:

'cause nothing is immutable if you have physical access.

Speaker:

Yep.

Speaker:

Right.

Speaker:

Um,

Speaker:

yeah.

Speaker:

Immutable just means it can't be changed.

Speaker:

Right.

Speaker:

But when we talk about this world, essentially, I think the

Speaker:

only thing that's truly immutable is if no one can change it.

Speaker:

Meaning you can't change it even if you have all super powerful

Speaker:

admin access to the system.

Speaker:

If you can still change your mind and then, and then delete it, then that's

Speaker:

not really immutable, in my opinion.

Speaker:

Or change a retention period

Speaker:

Or ch Yeah.

Speaker:

Change of retention period, which then causes it to be deleted.

Speaker:

Right.

Speaker:

If you can do that after the fact, you know, if you turn the, the, if you, if you

Speaker:

go to the super, you know, extra special level, then that's not really immutable.

Speaker:

Now there are some, uh, systems where.

Speaker:

You know, I know that you know where the normal customer can't delete

Speaker:

it, and so there are some system situations where a vendor has the

Speaker:

ability to go in and delete it.

Speaker:

That's, I have less of a problem with that, but it's still not truly immutable.

Speaker:

If you can still, if there's still a back door, even if the back door has

Speaker:

lots of humans in front of it, right?

Speaker:

Humans can be engineered,

Speaker:

Yep.

Speaker:

That's exactly what I was thinking about

Speaker:

was especially with AI out there and

Speaker:

People being able to do deep fakes and other things like that.

Speaker:

It is a possibility.

Speaker:

yeah, I, I, I think that really the way to do it is to have, you know,

Speaker:

to, to use something like object lock with, with object storage, right?

Speaker:

Where you basically say, I'm gonna put this thing here.

Speaker:

It's gonna be here 90 days, or whatever number you have.

Speaker:

It's gonna be here 90 days.

Speaker:

And no one, including me can delete it before that timeframe.

Speaker:

And I can't change my mind once I put it there.

Speaker:

I can't then go, oh, 90 days, well, did I say 90 days?

Speaker:

I meant, I meant three days.

Speaker:

Right.

Speaker:

Um, because that's another, that's another way that, that, um, a threat actor might

Speaker:

delete, delete the backups by just simply telling the backups to delete themselves.

Speaker:

and I think people should go research the immutable functionality of

Speaker:

their storage systems because most do support two modes, One that's

Speaker:

very strict, that won't allow anyone versus one that does allow

Speaker:

super users to tweak things.

Speaker:

So

Speaker:

just make sure you understand the implications of the systems you're using.

Speaker:

Thanks for bringing that up.

Speaker:

It's human nature.

Speaker:

To choose the less restrictive of the two options because you're

Speaker:

like, I can't change my mind.

Speaker:

Right?

Speaker:

What happens if we have this big part of the company and then, you know,

Speaker:

we have a big reduction or something, we lay off a bunch of people, we want

Speaker:

to, you know, we want to whatever, whatever, whatever things stuck in your

Speaker:

mind and you want to then go in and, and prematurely delete those backups.

Speaker:

And so you, so you choose the less secure option.

Speaker:

It's human nature to choose that.

Speaker:

And I'm saying if you're able to do it, that means a threat actor can

Speaker:

possibly do it if they're able to get in with, you know, a stolen credential

Speaker:

and, and MFA fatigue, or they're able to exploit a, you know, some sort of

Speaker:

system weakness so that boom, they are now you in the backup system,

Speaker:

they can do whatever it is you can do.

Speaker:

Um, then I, I, I, I don't like that idea.

Speaker:

Yeah, a hundred

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

So that's the 3, 2, 1, 1, and then the zero is just zero.

Speaker:

Um, uh, failures.

Speaker:

Right?

Speaker:

Which sounds nice.

Speaker:

Um, this is, you know, I.

Speaker:

you say failures, what are you referring to?

Speaker:

Because it could be backup failures, it could be storage failures, it could be

Speaker:

Yeah.

Speaker:

Well, it's mainly what, what, when, when Rick talks about it, he's talking

Speaker:

about zero zero backup failures, right?

Speaker:

The thing is backup failures happen.

Speaker:

Generally speaking, they happen due to process failures today.

Speaker:

It used to be that backups would fail on a very regular basis due to that

Speaker:

wonderful thing we call tape, right?

Speaker:

And again, there was nothing wrong with tape, it was just how we were using tape.

Speaker:

Uh, and there was a fundamental mismatch of technology.

Speaker:

But, uh, we've generally solved a lot of these issues

Speaker:

and so.

Speaker:

Backups, generally speaking work, you know and and are successful most of the time.

Speaker:

You do need to make, as part of your system, you need to need to make sure

Speaker:

that you are regularly monitoring the success of your backups and when they

Speaker:

don't succeed, you do something about it.

Speaker:

Can I add a.

Speaker:

Nope.

Speaker:

Sorry, that's the end of the podcast.

Speaker:

Sorry.

Speaker:

No, I, I think I was, as you were talking, I was thinking about sort of

Speaker:

ransomware and other things like that.

Speaker:

You know what?

Speaker:

3 2 1 1 0 does not really capture

Speaker:

What?

Speaker:

the fact that there is a clean backup without any ransomware

Speaker:

that exists in your system.

Speaker:

Yeah.

Speaker:

You know, that's a good Yeah, that, that's a good one.

Speaker:

I, I like that.

Speaker:

Um, and I, and I don't have an issue with that.

Speaker:

Actually, it's a good point, and that may be something that, that Rick

Speaker:

talks about in his, um, I guess maybe I didn't think about it, but that's

Speaker:

actually a really good point, right?

Speaker:

Is that you should be scanning your backups for ransomware.

Speaker:

The, the, the hard part is that, um.

Speaker:

A lot of times the backup itself doesn't have ransomware in it.

Speaker:

What it does have is encrypted files in it.

Speaker:

Um, 'cause the ransomware is the actual code that's making this happen.

Speaker:

And then the encrypted files are, are, are worthless.

Speaker:

Right.

Speaker:

Um, I will say that when we, you know, when we wrote the book that's

Speaker:

coming out in January, uh, learning ransomware and recco, uh, learning

Speaker:

ransomware response and recovery, um.

Speaker:

This was something we debated quite a bit about, right?

Speaker:

When you go to do a restore, how do you verify that the thing that

Speaker:

you're restoring to is clean?

Speaker:

How do you verify the thing that you're restoring is clean?

Speaker:

And the answer is, it's actually a really hard answer, right?

Speaker:

Um, you do it as best as you can upfront.

Speaker:

I like systems that check the backups when they're doing them.

Speaker:

I like systems that check the backups as they're doing restores.

Speaker:

Um, and then, uh, I think you should be checking, you hopefully.

Speaker:

In the initial phase, uh, which we, you know, we covered all of the

Speaker:

different phases in the book on, on.

Speaker:

On actually responding to an attack, definitely early on you

Speaker:

should have figured out what it was that attacked you, right?

Speaker:

You should know what it is you're looking for.

Speaker:

You should know the actual ransomware variant that you have, and so

Speaker:

you should be able to relatively, easily, easily look for that in

Speaker:

anything that you're restoring,

Speaker:

Mm-hmm.

Speaker:

Um, but yeah, so, so to go back to the topic at hand, 3, 2, 1, 1 0, uh, it's

Speaker:

just again, 3, 2, 1 is great, uh, but it's time for it to grow up a little bit.

Speaker:

Uh, if you don't have 3, 2, 1, then you don't have a backup.

Speaker:

But if you don't have 3, 2, 1, 1 0, then you, um.

Speaker:

You, you don't have a backup that's gonna be helpful in the time of a

Speaker:

ransomware response, which is most likely gonna be the number one reason.

Speaker:

Why do, why do, why did it become the number one reason besides the

Speaker:

fact that ransomware took off?

Speaker:

Why did, why did this become the number one reason people restore?

Speaker:

What do you think?

Speaker:

I have an opinion.

Speaker:

well, two things.

Speaker:

One is ransomware actors, right?

Speaker:

They're gonna ask for ransom,

Speaker:

Hmm.

Speaker:

and so what's one good way not to pay the ransom is to do the recovery yourself.

Speaker:

And so that's why you have your backups.

Speaker:

Yeah.

Speaker:

why you need that immutable copy.

Speaker:

So then the second part is ransomware actors got smart and then they

Speaker:

started targeting backup systems

Speaker:

Yeah.

Speaker:

if you can't fix stuff, then there's more likely to pay them.

Speaker:

And so that's why it sort of has come under attack.

Speaker:

Yeah, that, that was all very valid, wasn't what I was going for.

Speaker:

Uh,

Speaker:

it, it, it's just, it is just me sort of waxing philosophical,

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

the reason why ransomware became.

Speaker:

Like the number one reason is that we fixed the old number

Speaker:

one reason as I was growing up.

Speaker:

Technically, the, the, the number one reason we were restoring

Speaker:

was technical failure, right?

Speaker:

Hard drives were failing, servers were failing, and we, we

Speaker:

addressed that right hardware.

Speaker:

And storage has become so much more resilient that we are

Speaker:

almost never restoring because the hardware itself failed.

Speaker:

We are restoring you due to one of two reasons.

Speaker:

One is somebody did something stupid.

Speaker:

Well, actually one reason somebody did something stupid, right?

Speaker:

Either they deleted something they shouldn't have deleted, or

Speaker:

they clicked on something they, they shouldn't have clicked on

Speaker:

or did something else that then resulted in a ransomware attack.

Speaker:

Right?

Speaker:

Yeah.

Speaker:

And so the only reason we restore anything these days is stupid people.

Speaker:

Yeah.

Speaker:

No, I, I wonder like, as we're talking about the 3 2 1 1 0,

Speaker:

yeah.

Speaker:

and maybe Rick has stats on this, I wonder how many organizations are

Speaker:

actually following 3, 2, 1, 1, 0.

Speaker:

Not enough.

Speaker:

It's a great question.

Speaker:

You just look at all of the ransomware stories, and we have many of

Speaker:

them as case studies in the book.

Speaker:

So many of them are, and then the backups were then.

Speaker:

Deleted or encrypted or whatever, right?

Speaker:

Locked outta the backup system.

Speaker:

Uh, not enough is the answer to that question.

Speaker:

Um, hopefully that will change over time, but, uh, hope maybe the book, maybe the

Speaker:

book will, you know, uh, solved this.

Speaker:

But yeah.

Speaker:

All right, well, there you go.

Speaker:

3, 2, 1 rule is dead long live.

Speaker:

3, 2 1, 1 0.

Speaker:

Does that mean I need to update the tattoo on my arm?

Speaker:

Um, yeah, you're, you're just, you.

Speaker:

I never know what's gonna come outta your mouth, I tell you.

Speaker:

All right.

Speaker:

Well thanks.

Speaker:

Thanks for chatting, Prasanna.

Speaker:

I will be making my appointment with the tattoo artist as

Speaker:

soon as we're off this call.

Speaker:

Absolutely.

Speaker:

And thanks to all of you, your 3, 2, 1 tattoos.

Speaker:

Uh, by the way, if anybody's got any weird backup tattoos, I'd love to see that.

Speaker:

That is a wrap.