{"id":7973,"date":"2025-12-10T12:01:03","date_gmt":"2025-12-10T12:01:03","guid":{"rendered":"https:\/\/gitprotect.io\/blog\/?p=7973"},"modified":"2026-01-20T09:37:36","modified_gmt":"2026-01-20T09:37:36","slug":"backup-data-security","status":"publish","type":"post","link":"https:\/\/gitprotect.io\/blog\/backup-data-security\/","title":{"rendered":"Cybercriminals Want Your Backups &#8211; Here\u2019s How to Keep Them Safe"},"content":{"rendered":"\n<p>Cyber crime gets more advanced, and threat actors increasingly target backups with ransomware attacks. If an organization is left with erased or corrupted data and has no access to backup copies, there is no chance of recovery. This allows the attackers to demand ransom payments averaging at over 10 million dollars as of 2025.<\/p>\n\n\n\n<p>That is why your backup and disaster recovery strategy should be reliable and secure to keep your environments protected and guarantee business continuity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The golden 3-2-1 backup rule&nbsp;<\/h2>\n\n\n\n<p>Never forget the basics. The <a href=\"https:\/\/gitprotect.io\/blog\/3-2-1-backup-rule-complete-guide\/\">3-2-1 backup rule<\/a> is what true data resilience is built on. The rule requires at least: 3 copies of data, on 2 different media, with one being off-site. There are other rules worth mentioning, such as:<\/p>\n\n\n\n<p class=\"has-text-align-left has-background\" style=\"background-color:#f4fafe\">\ud83d\udca1 3-2-1-1-0 rule: 3 copies, 2 media types, 1 off-site, 1 immutable\/air-gapped, 0 errors after testing <br>\ud83d\udca1 4-3-2 rule: 4 copies, 3 storage tiers, 2 isolated environments<\/p>\n\n\n\n<p>With these applied, organizations can build resilient backup and recovery strategies. This allows for redundancy, isolation, and immutability to keep data safe. Now, a third-party backup solution can automatically enforce these rules for your and maintain continuous protection, along with other advanced automation capabilities that we\u2019ll explore in later sections.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Common challenges with backup security&nbsp;<\/h2>\n\n\n\n<p>Attackers target backups to remove the option for recovery. Ensuring that an organization covers all risks, demands a thorough analysis of the security practices and backup requirements. When choosing a solution it is important to also consider flexible restore options. Appropriate implementation of a backup and DR strategy comes with challenges that need addressing.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Human error remains on top&nbsp;<\/h3>\n\n\n\n<p>Even with advanced cyber security measures, human error is still the <a href=\"https:\/\/www.ibm.com\/think\/insights\/cisos-list-human-error-top-cybersecurity-risk\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">most common cause of data loss<\/a>. Accidental deletions, misconfigured policies, over-permissive access roles, and inconsistent monitoring can compromise backup integrity long before a cyberattack even occurs.<\/p>\n\n\n\n<p><strong>Specific examples of human error include:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>In fast-paced environments, backup settings can drift away from the desired standard, making backups inconsistent.<\/li>\n\n\n\n<li>Using GitHub\/GitLab\/Bitbucket\/Azure DevOps\/Jira as a backup and recovery solution.<\/li>\n\n\n\n<li>Overwriting data and lost versions.<\/li>\n\n\n\n<li>Accidental deletion of important data.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Shared Responsibility Model&nbsp;<\/h3>\n\n\n\n<p>Platforms like GitHub, Azure DevOps, GitLab or Bitbucket all operate under the shared responsibility model. It is a division of duties between the service provider and the user. In the SaaS model, the provider takes care of their infrastructure and uptime while the user is responsible for data security. For the users this includes securing devices, accounts as well as access controls but also backup and recovery.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Compliance with DevOps industry regulations&nbsp;<\/h3>\n\n\n\n<p>Backup along with disaster recovery are both requirements demanded by industry regulations such as SOC 2 Type II or ISO 27001. Choosing an appropriate backup solution will help you pass audits, avoid penalties and keep your data protected against cyber criminals. Main <a href=\"https:\/\/gitprotect.io\/security.html\">compliance<\/a> standards applying to DevOps data include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SOC 2 Type II&nbsp;<\/li>\n\n\n\n<li>ISO 27001&nbsp;<\/li>\n\n\n\n<li>NIS 2&nbsp;<\/li>\n\n\n\n<li>DORA&nbsp;<\/li>\n\n\n\n<li>FINRA&nbsp;<\/li>\n\n\n\n<li>GDPR&nbsp;<\/li>\n\n\n\n<li>HIPAA (healthcare)<\/li>\n<\/ul>\n\n\n\n<p>Make sure your backup and recovery solution is compliant with the relevant compliance frameworks to guarantee industry-standard protection. Common aspects that need addressing, in terms of backup, include: access control, backup frequency, geo-redundancy, encryption, and retention. However, these will range from industry to industry, based on data criticality. For example, government entities focus heavily on immutability, auditability, and long-term retention, while healthcare environments prioritize encryption and strict access controls to protect patient health information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Scaling organizations with increasing data volume&nbsp;<\/h3>\n\n\n\n<p>There may be a time where you \u2018outgrow\u2019 your backup solution, and will need to change providers, migrate data and implement new security measures. When choosing a backup vendor, make sure that the solution can grow along with your organization and continuously cover your data protection requirements.<\/p>\n\n\n\n<p>More data with increased operational complexity requires notifications, alerts and status updates regarding all tasks. Comprehensive platforms like <a href=\"http:\/\/gitprotect.io\">GitProtect.io<\/a> provide a centralized management console, to simplify the user experience and facilitate transparency. From there organizations can view things like logs, tasks in-progress, and reports.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How cyber criminals breach access&nbsp;<\/h2>\n\n\n\n<p>Cyber criminals come up with more sophisticated ways to breach your data. The attackers\u2019 goal is to make data recovery impossible so the victim will pay ransom. Therefore, reliable backup is necessary, as attackers increasingly target the backup data, which is the key to any recovery process.<\/p>\n\n\n\n<p><strong>The common attacks include:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Stolen admin credentials &#8211; these privileged credentials are obtained through phishing, token theft, or reusing credentials.<\/li>\n\n\n\n<li>Misconfigured IAM and access controls can give attackers access to the backup storage.<\/li>\n\n\n\n<li>Supply-chain attacks on integrated services &#8211; this includes compromising CI\/CD systems, automation tools, secrets managers, or other connected services.<\/li>\n\n\n\n<li>Breaching and compromising the user\u2019s DevOps platform first &#8211; if cybercriminals gain control of a GitHub, GitLab, Azure DevOps, or Bitbucket account, they can directly delete or corrupt repositories and metadata (native retention is not true backup).<\/li>\n<\/ul>\n\n\n\n<p class=\"has-text-align-left has-background\" style=\"background-color:#f4fafe\">\ud83d\udca1 In the 2024-2025 <a href=\"https:\/\/www.ibm.com\/think\/news\/change-healthcare-22-million-ransomware-payment\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Change Healthcare ransomware attack<\/a>, the organization paid a $22 million ransom but still did not get its data back. The incident shows that even ransom payment does not guarantee recovery &#8211; only reliable, isolated backups and a tested recovery process.&nbsp; <br>\ud83d\udca1 CDK Global was hit with a <a href=\"https:\/\/www.techtarget.com\/whatis\/feature\/The-CDK-Global-outage-Explaining-how-it-happened\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ransomware attack<\/a> that shut down systems across the industry. The outage cost dealerships over $1 billion collectively and demonstrated how a single compromised vendor can cripple thousands of businesses at once.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Best practices to ensure secure backup processes<\/h2>\n\n\n\n<p>Secure backup grants reliable recovery. Therefore, the solution you opt for must meet all of your specific criteria in terms of coverage, retention, frequency, scheduling and automation. While cyber attacks are on the rise, it is still in your hands to keep data protected.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Shift security to the left&nbsp;<\/h3>\n\n\n\n<p>Backups should be integrated into the SDLC from the very beginning. With this approach, many risks can be eliminated before they reach production. <a href=\"https:\/\/gitprotect.io\/blog\/shifting-left-approach-is-it-a-business-challenge\/\">Shift security left<\/a> to support business continuity and data resilience from the start.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Set RTO and RPO&nbsp;<\/h3>\n\n\n\n<p>These two metrics (<a href=\"https:\/\/gitprotect.io\/blog\/rto-vs-rpo-definitions-differences\/\">RTO &amp; RPO<\/a>) determine how often backups are made and how quickly the restore must happen to keep the business running.<\/p>\n\n\n\n<p class=\"has-text-align-left has-background\" style=\"background-color:#f4fafe\">\ud83d\udca1 Recovery Time Objective (RTO): how long your organization can afford to be down&nbsp; <br>\ud83d\udca1 Recovery Point Objective (RPO): how much data you can afford to lose<\/p>\n\n\n\n<p>Make sure to calculate the acceptable outage duration before operations, revenue, or customers are affected. Then, consider the maximum time gap between your backups. Is losing 24 hours of work acceptable, or do you need snapshots every few minutes?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Automate backups for better security &amp; time management&nbsp;<\/h3>\n\n\n\n<p>Third-party <a href=\"https:\/\/gitprotect.io\/\">backup and recovery solutions<\/a> provide automation that supports organizations on many levels. First off, there is less time spent on manual handling of any backup process. Moreover, automation skips the human element and decreases the chance of human error. With secure, automated backups, teams can stick to their primary objective and support business continuity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">WORM-compliant, immutable storage&nbsp;<\/h3>\n\n\n\n<p>Reliable backup vendors keep data in WORM-compliant, <a href=\"https:\/\/gitprotect.io\/blog\/immutable-storage\/\">immutable storage<\/a>. Write once, read many (WORM) storage guarantees that data cannot be altered or erased. This ensures that even if attackers get a hold of your data, they will not be able to do anything with it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Crucial backup functionalities<\/h3>\n\n\n\n<p>A complete backup and disaster recovery (DR) solution provides flexible functionalities that secure your day to day operations. Ideally, your vendor shall include clear policies, and scheduling capabilities to accommodate your RPO requirements and provide you with a central management console for simplicity of use.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Make sure to have full coverage and unlimited retention.<\/li>\n\n\n\n<li>Leverage GFS (Grandfather-Father-Son) &#8211; structured restore points: daily (sons), weekly (fathers), and monthly (grandfathers). This balances long-term retention with storage efficiency.<\/li>\n\n\n\n<li>Combine full, differential and incremental backups for efficient data protection and rapid recovery without needless overhead.<\/li>\n\n\n\n<li>Air-gap keeps your backup copy completely separated from production, so attackers cannot reach backups even if the main environment is compromised.<\/li>\n\n\n\n<li>Geo-redundancy means storing backup copies across independent geographic locations to protect against regional outages, cloud provider failures, and localized disasters. Multi-region redundancy grants that even if one site is unavailable, your recovery paths remain intact.<\/li>\n\n\n\n<li>Encryption guarantees that backup data is unreadable to individuals without the key.<\/li>\n<\/ul>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\"><strong><a href=\"https:\/\/gitprotect.io\/sign-up.html\">[FREE TRIAL] Keep your DevOps environment protected with a 14-day trial \u2014 guarantee compliant backup and disaster recovery, even in the event of accidental partial loss <\/a>\ud83d\ude80<br><br><a href=\"https:\/\/calendly.com\/d\/3s9-n9z-pgc\/gitprotect-live-demo?\">[CUSTOM DEMO] Find out how GitProtect\u2019s backup &amp; DR solution for DevOps helps to mitigate risks and recover your data in no time.<\/a><\/strong><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber crime gets more advanced, and threat actors increasingly target backups with ransomware attacks. If an organization is left with erased or corrupted data and has no access to backup copies, there is no chance of recovery. This allows the attackers to demand ransom payments averaging at over 10 million dollars as of 2025. That is why your backup and disaster recovery strategy should be reliable and secure to keep your environments protected and guarantee business continuity. The golden 3-2-1 backup rule&nbsp; Never forget the basics. The 3-2-1 backup rule is what true data resilience is built on. The rule [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":7975,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-7973","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-git-backup-101","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybercriminals Want Your Backups Here\u2019s How to Keep Them Safe<\/title>\n<meta name=\"description\" content=\"The article shows risks concerning data backups along with relevant mitigation strategies to keep your backup data protected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gitprotect.io\/blog\/backup-data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercriminals Want Your Backups Here\u2019s How to Keep Them Safe\" \/>\n<meta property=\"og:description\" content=\"The article shows risks concerning data backups along with relevant mitigation strategies to keep your backup data protected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gitprotect.io\/blog\/backup-data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog | GitProtect.io\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-10T12:01:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-20T09:37:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/12\/Cybercriminals-Want-Your-Backups.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mi\u0142osz Jesis, Technical Content Writer at GitProtect.io\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@GitProtectio\" \/>\n<meta name=\"twitter:site\" content=\"@GitProtectio\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mi\u0142osz Jesis, Technical Content Writer at GitProtect.io\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/gitprotect.io\/blog\/backup-data-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/backup-data-security\/\"},\"author\":{\"name\":\"Mi\u0142osz Jesis, Technical Content Writer at GitProtect.io\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/3404d5bf8d1a1c26abb51a4c2cacbc05\"},\"headline\":\"Cybercriminals Want Your Backups &#8211; Here\u2019s How to Keep Them Safe\",\"datePublished\":\"2025-12-10T12:01:03+00:00\",\"dateModified\":\"2026-01-20T09:37:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/backup-data-security\/\"},\"wordCount\":1400,\"publisher\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/backup-data-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/12\/Cybercriminals-Want-Your-Backups.png\",\"articleSection\":[\"Git Backup 101\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gitprotect.io\/blog\/backup-data-security\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/backup-data-security\/\",\"name\":\"Cybercriminals Want Your Backups Here\u2019s How to Keep Them Safe\",\"isPartOf\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/backup-data-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/backup-data-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/12\/Cybercriminals-Want-Your-Backups.png\",\"datePublished\":\"2025-12-10T12:01:03+00:00\",\"dateModified\":\"2026-01-20T09:37:36+00:00\",\"description\":\"The article shows risks concerning data backups along with relevant mitigation strategies to keep your backup data protected.\",\"breadcrumb\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/backup-data-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gitprotect.io\/blog\/backup-data-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/backup-data-security\/#primaryimage\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/12\/Cybercriminals-Want-Your-Backups.png\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/12\/Cybercriminals-Want-Your-Backups.png\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gitprotect.io\/blog\/backup-data-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/gitprotect.io\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercriminals Want Your Backups &#8211; Here\u2019s How to Keep Them Safe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#website\",\"url\":\"https:\/\/gitprotect.io\/blog\/\",\"name\":\"GitProtect.io Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gitprotect.io\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\",\"name\":\"GitProtect.io\",\"url\":\"https:\/\/gitprotect.io\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png\",\"width\":528,\"height\":528,\"caption\":\"GitProtect.io\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/XoperoSoftware\/\",\"https:\/\/x.com\/GitProtectio\",\"https:\/\/www.linkedin.com\/company\/xopero-software\/\",\"https:\/\/www.youtube.com\/channel\/UCiEnl6n0mIO6w7twccz-l2w\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/3404d5bf8d1a1c26abb51a4c2cacbc05\",\"name\":\"Mi\u0142osz Jesis, Technical Content Writer at GitProtect.io\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/08\/milosz-jesis-technical-content-writer-at-gitprotect.io_avatar-96x96.png\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/08\/milosz-jesis-technical-content-writer-at-gitprotect.io_avatar-96x96.png\",\"caption\":\"Mi\u0142osz Jesis, Technical Content Writer at GitProtect.io\"},\"description\":\"Milosz is Technical Content Writer at GitProtect, demonstrating fluency in both Polish and English, and a passion for language and technology. Currently pursuing a degree in Philosophy at UWE Bristol, he excels in creating engaging technical content that bridges the gap between users and the emerging technologies. Milosz leverages his writing skills and technical knowledge to author articles and blog posts, with a focus on DevOps, cyber-security, and potential cyber-threats, among other crucial IT topics. Additionally, valuable translations provided by Milosz further enhance GitProtect's communication and global outreach.\",\"url\":\"https:\/\/gitprotect.io\/blog\/author\/milosz-jesis\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercriminals Want Your Backups Here\u2019s How to Keep Them Safe","description":"The article shows risks concerning data backups along with relevant mitigation strategies to keep your backup data protected.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gitprotect.io\/blog\/backup-data-security\/","og_locale":"en_US","og_type":"article","og_title":"Cybercriminals Want Your Backups Here\u2019s How to Keep Them Safe","og_description":"The article shows risks concerning data backups along with relevant mitigation strategies to keep your backup data protected.","og_url":"https:\/\/gitprotect.io\/blog\/backup-data-security\/","og_site_name":"Blog | GitProtect.io","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2025-12-10T12:01:03+00:00","article_modified_time":"2026-01-20T09:37:36+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/12\/Cybercriminals-Want-Your-Backups.png","type":"image\/png"}],"author":"Mi\u0142osz Jesis, Technical Content Writer at GitProtect.io","twitter_card":"summary_large_image","twitter_creator":"@GitProtectio","twitter_site":"@GitProtectio","twitter_misc":{"Written by":"Mi\u0142osz Jesis, Technical Content Writer at GitProtect.io","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gitprotect.io\/blog\/backup-data-security\/#article","isPartOf":{"@id":"https:\/\/gitprotect.io\/blog\/backup-data-security\/"},"author":{"name":"Mi\u0142osz Jesis, Technical Content Writer at GitProtect.io","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/3404d5bf8d1a1c26abb51a4c2cacbc05"},"headline":"Cybercriminals Want Your Backups &#8211; Here\u2019s How to Keep Them Safe","datePublished":"2025-12-10T12:01:03+00:00","dateModified":"2026-01-20T09:37:36+00:00","mainEntityOfPage":{"@id":"https:\/\/gitprotect.io\/blog\/backup-data-security\/"},"wordCount":1400,"publisher":{"@id":"https:\/\/gitprotect.io\/blog\/#organization"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/backup-data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/12\/Cybercriminals-Want-Your-Backups.png","articleSection":["Git Backup 101"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/gitprotect.io\/blog\/backup-data-security\/","url":"https:\/\/gitprotect.io\/blog\/backup-data-security\/","name":"Cybercriminals Want Your Backups Here\u2019s How to Keep Them Safe","isPartOf":{"@id":"https:\/\/gitprotect.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gitprotect.io\/blog\/backup-data-security\/#primaryimage"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/backup-data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/12\/Cybercriminals-Want-Your-Backups.png","datePublished":"2025-12-10T12:01:03+00:00","dateModified":"2026-01-20T09:37:36+00:00","description":"The article shows risks concerning data backups along with relevant mitigation strategies to keep your backup data protected.","breadcrumb":{"@id":"https:\/\/gitprotect.io\/blog\/backup-data-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gitprotect.io\/blog\/backup-data-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/backup-data-security\/#primaryimage","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/12\/Cybercriminals-Want-Your-Backups.png","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2025\/12\/Cybercriminals-Want-Your-Backups.png","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/gitprotect.io\/blog\/backup-data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/gitprotect.io\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybercriminals Want Your Backups &#8211; Here\u2019s How to Keep Them Safe"}]},{"@type":"WebSite","@id":"https:\/\/gitprotect.io\/blog\/#website","url":"https:\/\/gitprotect.io\/blog\/","name":"GitProtect.io Blog","description":"","publisher":{"@id":"https:\/\/gitprotect.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gitprotect.io\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/gitprotect.io\/blog\/#organization","name":"GitProtect.io","url":"https:\/\/gitprotect.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png","width":528,"height":528,"caption":"GitProtect.io"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/GitProtectio","https:\/\/www.linkedin.com\/company\/xopero-software\/","https:\/\/www.youtube.com\/channel\/UCiEnl6n0mIO6w7twccz-l2w"]},{"@type":"Person","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/3404d5bf8d1a1c26abb51a4c2cacbc05","name":"Mi\u0142osz Jesis, Technical Content Writer at GitProtect.io","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/image\/","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/08\/milosz-jesis-technical-content-writer-at-gitprotect.io_avatar-96x96.png","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/08\/milosz-jesis-technical-content-writer-at-gitprotect.io_avatar-96x96.png","caption":"Mi\u0142osz Jesis, Technical Content Writer at GitProtect.io"},"description":"Milosz is Technical Content Writer at GitProtect, demonstrating fluency in both Polish and English, and a passion for language and technology. Currently pursuing a degree in Philosophy at UWE Bristol, he excels in creating engaging technical content that bridges the gap between users and the emerging technologies. Milosz leverages his writing skills and technical knowledge to author articles and blog posts, with a focus on DevOps, cyber-security, and potential cyber-threats, among other crucial IT topics. Additionally, valuable translations provided by Milosz further enhance GitProtect's communication and global outreach.","url":"https:\/\/gitprotect.io\/blog\/author\/milosz-jesis\/"}]}},"_links":{"self":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/7973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/comments?post=7973"}],"version-history":[{"count":4,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/7973\/revisions"}],"predecessor-version":[{"id":8299,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/7973\/revisions\/8299"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/media\/7975"}],"wp:attachment":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/media?parent=7973"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/categories?post=7973"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/tags?post=7973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}