De4sec Technology
De4sec Technology
de4sec.technology
๐ŸŒ AU + KE

Backup and Disaster Recovery Guide

How to design, implement, and test a backup strategy that will actually protect your business when ransomware, hardware failure, or accidental deletion occurs.

Prepared by
De4sec Technology
Contact
support@de4sec.technology
Edition
2026 ยท Updated March
CONFIDENTIAL ยท FOR CLIENT USE ONLY
Contents
  1. Why Most Backups Fail When They Matter Most
  2. The 3-2-1 Backup Rule
  3. Immutable Backup Storage
  4. Microsoft 365 Backup
  5. Recovery Testing
  6. Recovery Time and Point Objectives
  7. De4sec Backup Implementation
01

Why Most Backups Fail When They Matter Most

The most dangerous backup is one you believe exists but hasn't been tested. We regularly encounter businesses whose backup solution appears to be running โ€” the job shows as completed โ€” but whose data is incomplete, corrupted, or stored on a system that's also encrypted in a ransomware event.

A proper backup strategy addresses three questions that most businesses haven't answered: What happens when the primary and backup are both encrypted? How long does it actually take to restore? And when did we last test it?

A backup that hasn't been tested isn't a backup โ€” it's a hypothesis.

02

The 3-2-1 Backup Rule

The 3-2-1 rule is the foundational backup design principle. It doesn't guarantee recovery, but it eliminates the most common single points of failure.

NumberMeaningExample
3Three copies of your dataPrimary, local backup, offsite backup
2Two different storage mediaLocal NAS + cloud storage
1One copy offsite or air-gappedAzure Backup, separate cloud region, or offline tape

In 2026, the 3-2-1 rule has evolved to 3-2-1-1-0 for ransomware resilience: three copies, two media, one offsite, one immutable, zero backup errors verified through automated testing.

03

Immutable Backup Storage

Standard backups can be encrypted by ransomware if the backup system is connected to and accessible from the compromised network. Immutable backup storage prevents this by making backup data impossible to modify or delete โ€” even by a compromised admin account.

Immutability options

โœ“Azure Blob Storage with immutability policies โ€” locked containers cannot be deleted or modified
โœ“AWS S3 Object Lock โ€” WORM (Write Once Read Many) protection
โœ“Veeam Hardened Repository โ€” Linux-based, root-inaccessible backup storage
โœ“Offsite tape โ€” physically air-gapped, immune to network-based attack

If the same account that manages your servers can also delete your backups, your backup is not protected against a compromised admin credential.

04

Microsoft 365 Backup

Microsoft 365 is not backed up by Microsoft in the way most businesses assume. Microsoft provides high availability โ€” data is replicated across multiple datacentres โ€” but this is not the same as backup. If a user deletes data, ransomware corrupts it, or an admin error causes mass deletion, native retention may be insufficient.

What Microsoft provides (and doesn't)

FeatureMicrosoft NativeThird-Party Backup Required
Deleted items recovery90 days maxLonger retention per policy
Version historyLimited versionsFull version history
Ransomware recoveryLimited rollbackPoint-in-time recovery
Admin error recoveryLimitedFull recovery from clean backup
Compliance archiveE3/E5 onlyIncluded in most 3rd party tools
โœ“Veeam Backup for Microsoft 365
โœ“Acronis Cyber Backup
โœ“Datto SaaS Protection
โœ“Microsoft 365 Backup (native, now generally available โ€” verify scope coverage)
05

Recovery Testing

A backup is only as good as the restore. Testing must be a scheduled, documented activity โ€” not something done ad hoc during an incident.

Recovery testing schedule

Test TypeFrequencyWhat to Test
Single file restoreMonthlyRestore a random file from 30 days ago
Mailbox restoreQuarterlyRestore a mailbox to a test account
Full system restoreAnnuallyRestore a non-critical server to isolated environment
RTO testAnnuallyTime the complete restore of a critical system

What to document

โœ“Date and time of test
โœ“What was restored, from what backup date
โœ“Time taken to restore
โœ“Any errors or issues encountered
โœ“Whether restored data was verified as correct and complete
06

Recovery Time and Point Objectives

RTO (Recovery Time Objective) and RPO (Recovery Point Objective) are the two metrics that determine whether your backup strategy actually meets your business needs.

MetricDefinitionExampleDesign implication
RTOHow long can the business tolerate downtime?4 hoursNeed warm standby or hot backup capability
RPOHow much data loss is acceptable?4 hoursBackup frequency must be at least every 4 hours

Most small businesses have never formally defined their RTO and RPO. When we ask 'how long could you operate without your email?' or 'how much transaction data could you afford to lose?', the answers drive the backup design โ€” and often reveal that the current solution doesn't meet the actual business requirement.

07

De4sec Backup Implementation

De4sec designs and implements backup strategies aligned to each client's RTO, RPO, and ransomware resilience requirements.

Assessment
Review current backup configuration, coverage gaps, and test history. Identify single points of failure.
Design
Define RTO and RPO. Design backup architecture covering all data sources โ€” Microsoft 365, on-premise, cloud workloads.
Implementation
Deploy backup solution, configure immutable storage, test initial restore, document recovery procedures.
Ongoing Management
Monitor backup job completion, quarterly restore testing, annual RTO/RPO review.
โœ“AU: support@de4sec.technology | +61 451 500 909
โœ“KE: support@de4sec.technology | +254 741 777 681
// NEXT STEP

Ready to implement this in your environment?

De4sec provides hands-on implementation, not just advice. Book a free discovery call โ€” we assess your current environment against this guide at no cost, no obligation.

Book a Free Discovery Call โ†’or visit de4sec.technology
De4sec
ยฉ 2026 DE4SEC TECHNOLOGY. ALL RIGHTS RESERVED.