Skip to content
Home
About
E8
Services
Essential Eight Maturity Assessment
Implementation & Configuration Services
Security Hardening & Baseline Setup
Ongoing Compliance Monitoring
Staff Training & Awareness
Incident Readiness & Response Planning
Automated Essential 8 Compliance
Automated Essential 8 Monitoring
Frameworks
Application Control
Patch Applications
Configure Microsoft Office Macros
User Application Hardening
Restrict Administrative Privileges
Patch Operating Systems
Multi-Factor Authentication
Regular Backups
Transformation Roadmap
Contact Us
Home
About
E8
Services
Essential Eight Maturity Assessment
Implementation & Configuration Services
Security Hardening & Baseline Setup
Ongoing Compliance Monitoring
Staff Training & Awareness
Incident Readiness & Response Planning
Automated Essential 8 Compliance
Automated Essential 8 Monitoring
Frameworks
Application Control
Patch Applications
Configure Microsoft Office Macros
User Application Hardening
Restrict Administrative Privileges
Patch Operating Systems
Multi-Factor Authentication
Regular Backups
Transformation Roadmap
Contact Us
Regular Backups
Backup Strategies:
Your Last Line of Defense
Introduction:
Backups are the undo button for cyber attacks – when properly implemented. The ASD requires immutable, air-gapped backups because 42% of organizations that pay ransoms never recover their data.
Maturity Level Implementation:
Level 0:
(Non-Compliant)
No formal backup process
Single storage location
Untested restore capability
Level 1:
(Basic)
Daily backups
Onsite and offsite copies
Quarterly restore tests
Level 2
(Intermediate)
Immutable storage
Cryptographic verification
Weekly test restores
Level 3:
(Advanced)
Air-gapped backups
Automated integrity checks
1-hour RTO for critical systems
ASD References
PROTECT - Regular Backups