YOU MIGHT ALSO LIKE
ASSOCIATED TAGS
attack  backup  backups  copies  defense  different  drives  encrypted  immutability  network  offsite  protection  ransomware  restore  storage  
LATEST POSTS

What Is the 3/2/1 Rule for Ransomware Protection?

Here’s the uncomfortable truth: most businesses don’t back up properly. They assume cloud sync equals backup. Or they rely on a single external drive plugged into the office workstation. That changes everything when ransomware encrypts everything—including that drive.

How the 3/2/1 Backup Strategy Works in Real-World Defense

Let’s walk through the logic. You have your primary data—live, on your system. That’s copy one. Then you create a local backup: maybe an external SSD, or a network-attached storage (NAS) box. That’s two. And finally, a third copy lives somewhere isolated—like a cloud service such as Backblaze, Wasabi, or AWS S3 with versioning enabled. Or a physical drive rotated weekly and kept in a secure location miles from your office. The point? No single event—ransomware, fire, theft—can wipe out all three.

But—and this is where most fail—the media must be different. Two copies on the same NAS with mirrored drives? That’s not two media. That’s one failure point with extra cables. The idea is to avoid correlated risk. A lightning strike can fry every USB drive on a circuit. A single backup job can propagate infected files across platforms.

Why “Three Copies” Isn’t Redundant—It’s Reality

You might think two copies are enough. Here’s why they’re not. In 2023, the average ransomware attack encrypted 43% of a victim’s data before detection (Sophos State of Ransomware report). That means if your local backup runs daily at midnight and infection starts at 11 p.m., you’ve just backed up corrupted data. Three copies don’t mean three clean copies—they mean a chance to roll back further. That’s why versioning matters. Imagine restoring from a backup that’s itself encrypted. You’ve backed up nothing but ransom notes.

And that’s exactly where the second copy’s format becomes critical.

The Two-Media Rule: Why USB Drives Alone Won’t Cut It

Think of media types as survival strategies. Hard drives fail. SSDs wear out. Cloud providers have outages. But if your second copy lives on a spinning disk and your third on immutable cloud storage (like Amazon S3 Glacier Vault Lock), you’ve diversified your risk. Tape? Still used by major institutions—banks, governments—for long-term archives. It’s offline by default. No network, no attack surface. It’s a bit like keeping a spare key buried in the backyard: low-tech, but effective when everything digital fails.

And yes, some companies still use tape. IBM’s TS4500 can hold up to 570 petabytes in one system. We’re far from it in small business, but the principle holds: different media, different vulnerabilities.

Offsite Storage: Not Just “the Cloud,” But Air-Gapped

“Offsite” doesn’t mean Dropbox. It means unreachable during an active attack. Many cloud backups are mounted as network drives. Bad move. Ransomware treats them like any folder. The fix? Use a service with object lock or immutability—Backblaze B2’s legal hold, for example—so files can’t be altered for a set period. Even better: a physical drive stored at a manager’s home, rotated monthly. No network, no encryption. Just power on, restore, walk away.

Because here’s the kicker—ransomware doesn’t care about your sentimentality. It encrypts baby photos, tax records, client contracts, all with the same cold logic. And once it’s in, it hunts. It searches for mapped drives, common backup folders, even connected smartphones. That’s the silent horror: you think you’re safe, but your backup was compromised three weeks ago.

Ransomware Evolution: Why the 3/2/1 Rule Is Under Pressure

The rule was born in the 2000s, back when backups were tapes and malware was clumsy. Today, ransomware is smarter, meaner, and often paired with data theft. Double extortion. Pay up or we leak your customer database. Triple extortion now includes DDoS attacks and direct calls to your clients. The equation has shifted. It’s not just about restoring files—it’s about control.

And now attackers target backups directly. Not just by encrypting connected drives. They hunt for backup software processes—Veeam, Acronis, Backup Exec—and kill them before striking. Some even wait days inside a network, learning your backup schedule, then strike between cycles. Timing is everything. If your last clean backup was 36 hours ago, and you generate 200 GB of new data daily, that’s nearly half a terabyte of lost work. Money, yes. But also trust. Momentum.

So is 3/2/1 obsolete? Not yet. But it needs reinforcements.

When 3/2/1 Fails: The Case of Colonial Pipeline

In May 2021, Colonial Pipeline paid $4.4 million in Bitcoin after a DarkSide attack. They had backups. But restoring 10 terabytes of operational data would have taken weeks. The pipeline was down. Gas shortages spread across the Southeast U.S. The pressure was immense. And that’s when theory meets reality: having backups doesn’t mean you can restore fast enough. Speed is part of resilience. A rule that ignores recovery time is incomplete.

Data is still lacking on average restore times for midsize firms. But anecdotal reports suggest 2–7 days for full recovery. That’s a lifetime in business terms.

The Immutability Factor: A New Layer of Defense

Enter immutable backups—copies that can’t be altered or deleted for a set time. Think of it as a digital vault. You drop data in, and even if ransomware gains admin access, it can’t touch that copy. Services like Cohesity, Rubrik, and Veeam with hardened repositories offer this. But it’s not standard. It’s a premium feature. Cost? $5,000–$15,000 annually for a midsize deployment. Worth it? I find this overrated for small shops with tight budgets—but vital for anyone handling sensitive data.

And yet, immutability isn’t magic. Misconfigured policies can still allow deletion. Or worse—overwriting. Because if the backup job itself is compromised, you’re just immutably storing malware.

3/2/1 vs. Modern Alternatives: Is There a Better Way?

Some experts now push for 3-2-1-1-1: three copies, two media, one offsite, plus one immutable copy, and one air-gapped. That’s thorough. But also expensive. For a nonprofit with five employees, that’s overkill. The issue remains: balance. You can’t secure like a Fortune 500 if you’re a dental office with one server.

Others propose zero-trust backup architectures—where backup systems have no inbound ports, require multi-factor authentication, and log all access. That’s smart. But complex to implement. And let’s be clear about this: most small businesses don’t have a dedicated IT staff. They rely on managed service providers who may cut corners.

Cloud-Only Backups: Convenient, But Risky?

Many SMBs use cloud-only solutions—Google Workspace, Microsoft 365, with third-party tools like Spanning or Datto SaaS Protection. It’s easy. But is it enough? Microsoft’s shared responsibility model means they protect the infrastructure, not your data. If you don’t enable retention policies, a ransomware-infected sync can overwrite clean files in minutes. And that’s exactly where the “one offsite” rule gets blurred. If your “offsite” is still in the same cloud tenant, is it really offsite?

Because the cloud isn’t a backup. It’s a different kind of disk.

Tape and Air-Gapped Systems: Old School, But Alive

Tape backups take longer to restore—sometimes hours. But they’re offline. Physically disconnected. No network attack can reach them. The U.S. Department of Defense still uses tape for classified data. So does the IRS. To give a sense of scale: LTO-9 tapes hold 18 TB native, 45 TB compressed. That’s five times more than a typical enterprise SSD. And they cost about $100 per cartridge. Durable. Cheap per gigabyte. But slow. Restoration can take 2–3x longer than disk. So it’s a trade-off: speed versus safety.

Frequently Asked Questions

Does the 3/2/1 Rule Protect Against All Ransomware?

No rule does. The 3/2/1 strategy reduces risk but doesn’t eliminate it. If your backup software runs on an infected machine, it can copy corrupted files. If your offsite storage is accessible during an attack, it can be encrypted. The thing is, backups are only as clean as the data going into them. That’s why endpoint protection and network segmentation matter just as much. You need detection, not just recovery.

Can I Use Google Drive or Dropbox for the Offsite Copy?

You can. But with major caveats. These services sync in real time. If ransomware encrypts a file, the encrypted version syncs up. Unless you have versioning enabled and can roll back, you’re stuck. Google Workspace allows 25 version history for files, but only for 30 days. After that, gone. And if ransomware deletes everything, even version history can be wiped. So yes, it works—until it doesn’t.

How Often Should I Test My Backups?

Every quarter. Minimum. Many organizations back up religiously but never test. Then, during an actual incident, the restore fails. Bad sectors, corrupted archives, missing permissions. It’s like having a fire extinguisher but never checking the pressure gauge. In short: if you haven’t tested a full restore recently, you don’t have a backup. You have hope.

The Bottom Line

The 3/2/1 rule isn’t perfect. It’s not the final word in cybersecurity. But for most organizations, it’s the best starting point. It’s simple enough to remember, flexible enough to adapt, and proven over two decades. I am convinced that no advanced firewall or AI-powered threat detection can replace a clean, isolated backup. Because when the screen turns red and the ransom note appears, all you have is your last good copy.

That said, treat 3/2/1 as a baseline—not a finish line. Add immutability if you can. Test restores religiously. Segment your backup systems. Train staff. Because ransomware isn’t just a tech problem. It’s a human one.

And maybe, just maybe, keep a tape in a safe. Just in case. Suffice to say, the future of backup might be buried in the past.

💡 Key Takeaways

  • Is 6 a good height? - The average height of a human male is 5'10". So 6 foot is only slightly more than average by 2 inches. So 6 foot is above average, not tall.
  • Is 172 cm good for a man? - Yes it is. Average height of male in India is 166.3 cm (i.e. 5 ft 5.5 inches) while for female it is 152.6 cm (i.e. 5 ft) approximately.
  • How much height should a boy have to look attractive? - Well, fellas, worry no more, because a new study has revealed 5ft 8in is the ideal height for a man.
  • Is 165 cm normal for a 15 year old? - The predicted height for a female, based on your parents heights, is 155 to 165cm. Most 15 year old girls are nearly done growing. I was too.
  • Is 160 cm too tall for a 12 year old? - How Tall Should a 12 Year Old Be? We can only speak to national average heights here in North America, whereby, a 12 year old girl would be between 13

❓ Frequently Asked Questions

1. Is 6 a good height?

The average height of a human male is 5'10". So 6 foot is only slightly more than average by 2 inches. So 6 foot is above average, not tall.

2. Is 172 cm good for a man?

Yes it is. Average height of male in India is 166.3 cm (i.e. 5 ft 5.5 inches) while for female it is 152.6 cm (i.e. 5 ft) approximately. So, as far as your question is concerned, aforesaid height is above average in both cases.

3. How much height should a boy have to look attractive?

Well, fellas, worry no more, because a new study has revealed 5ft 8in is the ideal height for a man. Dating app Badoo has revealed the most right-swiped heights based on their users aged 18 to 30.

4. Is 165 cm normal for a 15 year old?

The predicted height for a female, based on your parents heights, is 155 to 165cm. Most 15 year old girls are nearly done growing. I was too. It's a very normal height for a girl.

5. Is 160 cm too tall for a 12 year old?

How Tall Should a 12 Year Old Be? We can only speak to national average heights here in North America, whereby, a 12 year old girl would be between 137 cm to 162 cm tall (4-1/2 to 5-1/3 feet). A 12 year old boy should be between 137 cm to 160 cm tall (4-1/2 to 5-1/4 feet).

6. How tall is a average 15 year old?

Average Height to Weight for Teenage Boys - 13 to 20 Years
Male Teens: 13 - 20 Years)
14 Years112.0 lb. (50.8 kg)64.5" (163.8 cm)
15 Years123.5 lb. (56.02 kg)67.0" (170.1 cm)
16 Years134.0 lb. (60.78 kg)68.3" (173.4 cm)
17 Years142.0 lb. (64.41 kg)69.0" (175.2 cm)

7. How to get taller at 18?

Staying physically active is even more essential from childhood to grow and improve overall health. But taking it up even in adulthood can help you add a few inches to your height. Strength-building exercises, yoga, jumping rope, and biking all can help to increase your flexibility and grow a few inches taller.

8. Is 5.7 a good height for a 15 year old boy?

Generally speaking, the average height for 15 year olds girls is 62.9 inches (or 159.7 cm). On the other hand, teen boys at the age of 15 have a much higher average height, which is 67.0 inches (or 170.1 cm).

9. Can you grow between 16 and 18?

Most girls stop growing taller by age 14 or 15. However, after their early teenage growth spurt, boys continue gaining height at a gradual pace until around 18. Note that some kids will stop growing earlier and others may keep growing a year or two more.

10. Can you grow 1 cm after 17?

Even with a healthy diet, most people's height won't increase after age 18 to 20. The graph below shows the rate of growth from birth to age 20. As you can see, the growth lines fall to zero between ages 18 and 20 ( 7 , 8 ). The reason why your height stops increasing is your bones, specifically your growth plates.