{"id":16067,"date":"2023-03-16T12:36:25","date_gmt":"2023-03-16T11:36:25","guid":{"rendered":"https:\/\/www.whysecurity.it\/safe-backups\/"},"modified":"2023-03-22T17:46:46","modified_gmt":"2023-03-22T16:46:46","slug":"safe-backups","status":"publish","type":"page","link":"https:\/\/www.whysecurity.it\/en\/safe-backups\/","title":{"rendered":"Safe Backups"},"content":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;bounceInDown&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1529503216101{padding-top: 30px !important;padding-bottom: 80px !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;Centralized backup management&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center|color:%23000000&#8243; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221;]Backups of computer systems, data and information are the<strong> last chance<\/strong> before facing a real disaster. The management of backups of computer systems and data has been underestimated countless times, so much so as to send entire companies into crisis, because following a Ransomware attack, therefore an attack in which data has been encrypted for ransom purposes, backups are also encrypted.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; equal_height=&#8221;yes&#8221; css_animation=&#8221;none&#8221; bgimage=&#8221;12054&#8243; bgstyle=&#8221;jarallax&#8221; ptextcolor=&#8221;White&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1585664322371{margin-left: -15px !important;padding-top: 60px !important;padding-bottom: 80px !important;background-color: #231e1f !important;}&#8221; el_class=&#8221;bianco&#8221;][vc_column][vc_custom_heading text=&#8221;The importance of the Backup&#8221; font_container=&#8221;tag:h2|font_size:44|text_align:center&#8221; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; el_class=&#8221;equal-height-content&#8221; css=&#8221;.vc_custom_1539260614930{background-color: #231e1f !important;}&#8221;][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text css_animation=&#8221;fadeInLeft&#8221; css=&#8221;.vc_custom_1629791129201{padding-top: 20px !important;padding-right: 20px !important;padding-bottom: 20px !important;padding-left: 20px !important;}&#8221;]Having a backup outside the company, and having backups separate from production infrastructures are the<strong> minimum requirements<\/strong> that a serious approach to this function of computer systems, which is the <strong>real assurance<\/strong> for business continuity and survival of the company in the event of a disaster.<\/p>\n<p>Managing backups in your own way, with the best technologies and with your own methodologies, requires professionalism, training, and the ability to evaluate how to guarantee the best level of security to guarantee this fundamental function in the company.<\/p>\n<p>Having backups that are safe from the worst cyber threats that criminals put on the internet every day to carry out extortion is the <strong>first fundamental pillar<\/strong> that a company manager must be absolutely sure to have, and to have perfectly functional.<\/p>\n<p>Backups are periodically tested, carrying out recovery tests and verifying that the data is correctly recovered in an intact manner, as required by current legislation.[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;industriaUno&#8221; width=&#8221;1\/6&#8243; offset=&#8221;vc_hidden-xs&#8221;][vc_single_image image=&#8221;12183&#8243; alignment=&#8221;right&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;bounceInDown&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1529503216101{padding-top: 30px !important;padding-bottom: 80px !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;Centralized backup management&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center|color:%23000000&#8243; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221;]Backups of computer systems, data and information are the last chance before facing a real disaster. The management of backups of computer systems and data has been underestimated countless times, so much so as to send entire companies into [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":15958,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Safe Backups - Why Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.whysecurity.it\/en\/safe-backups\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Safe Backups - Why Security\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;bounceInDown&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1529503216101{padding-top: 30px !important;padding-bottom: 80px !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;Centralized backup management&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center|color:%23000000&#8243; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221;]Backups of computer systems, data and information are the last chance before facing a real disaster. The management of backups of computer systems and data has been underestimated countless times, so much so as to send entire companies into [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.whysecurity.it\/en\/safe-backups\/\" \/>\n<meta property=\"og:site_name\" content=\"Why Security\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-22T16:46:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.whysecurity.it\/wp-content\/uploads\/2021\/09\/iStock-1166272744-e1630580359932-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1264\" \/>\n\t<meta property=\"og:image:height\" content=\"368\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.whysecurity.it\/en\/safe-backups\/\",\"url\":\"https:\/\/www.whysecurity.it\/en\/safe-backups\/\",\"name\":\"Safe Backups - Why Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.whysecurity.it\/it\/#website\"},\"datePublished\":\"2023-03-16T11:36:25+00:00\",\"dateModified\":\"2023-03-22T16:46:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.whysecurity.it\/en\/safe-backups\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.whysecurity.it\/en\/safe-backups\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.whysecurity.it\/en\/safe-backups\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.whysecurity.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Safe Backups\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.whysecurity.it\/it\/#website\",\"url\":\"https:\/\/www.whysecurity.it\/it\/\",\"name\":\"Why Security\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.whysecurity.it\/it\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Safe Backups - Why Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.whysecurity.it\/en\/safe-backups\/","og_locale":"en_US","og_type":"article","og_title":"Safe Backups - Why Security","og_description":"[vc_row full_width=&#8221;stretch_row&#8221; css_animation=&#8221;bounceInDown&#8221; gradient_colors=&#8221;%5B%7B%7D%5D&#8221; css=&#8221;.vc_custom_1529503216101{padding-top: 30px !important;padding-bottom: 80px !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;Centralized backup management&#8221; font_container=&#8221;tag:h2|font_size:44px|text_align:center|color:%23000000&#8243; google_fonts=&#8221;font_family:Raleway%3A100%2C200%2C300%2Cregular%2C500%2C600%2C700%2C800%2C900|font_style:400%20regular%3A400%3Anormal&#8221;][common_title title=&#8221;&#8221; show_decor=&#8221;true&#8221;][vc_column_text css_animation=&#8221;fadeInRight&#8221;]Backups of computer systems, data and information are the last chance before facing a real disaster. The management of backups of computer systems and data has been underestimated countless times, so much so as to send entire companies into [&hellip;]","og_url":"https:\/\/www.whysecurity.it\/en\/safe-backups\/","og_site_name":"Why Security","article_modified_time":"2023-03-22T16:46:46+00:00","og_image":[{"width":1264,"height":368,"url":"https:\/\/www.whysecurity.it\/wp-content\/uploads\/2021\/09\/iStock-1166272744-e1630580359932-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.whysecurity.it\/en\/safe-backups\/","url":"https:\/\/www.whysecurity.it\/en\/safe-backups\/","name":"Safe Backups - Why Security","isPartOf":{"@id":"https:\/\/www.whysecurity.it\/it\/#website"},"datePublished":"2023-03-16T11:36:25+00:00","dateModified":"2023-03-22T16:46:46+00:00","breadcrumb":{"@id":"https:\/\/www.whysecurity.it\/en\/safe-backups\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.whysecurity.it\/en\/safe-backups\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.whysecurity.it\/en\/safe-backups\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.whysecurity.it\/en\/"},{"@type":"ListItem","position":2,"name":"Safe Backups"}]},{"@type":"WebSite","@id":"https:\/\/www.whysecurity.it\/it\/#website","url":"https:\/\/www.whysecurity.it\/it\/","name":"Why Security","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.whysecurity.it\/it\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16067"}],"collection":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/comments?post=16067"}],"version-history":[{"count":3,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16067\/revisions"}],"predecessor-version":[{"id":16155,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/pages\/16067\/revisions\/16155"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/media\/15958"}],"wp:attachment":[{"href":"https:\/\/www.whysecurity.it\/en\/wp-json\/wp\/v2\/media?parent=16067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}