{"id":31498,"date":"2025-07-04T10:28:58","date_gmt":"2025-07-04T08:28:58","guid":{"rendered":"https:\/\/stage2.convotis.com\/es\/?p=31498"},"modified":"2025-08-11T17:46:12","modified_gmt":"2025-08-11T15:46:12","slug":"cloud-backup-strategy","status":"publish","type":"post","link":"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/","title":{"rendered":"Independent and compliant: Strategies for resilient business cloud backups"},"content":{"rendered":"<p><span data-contrast=\"auto\">A well-thought-out cloud backup strategy is crucial today\u2014because companies in all industries are using cloud services more than ever before. The advantages are obvious: scalability, flexibility, and high availability. However, shifting workloads to the cloud also brings a frequently underestimated risk: the false assumption that the cloud provider is responsible for data security and recoverability. This is exactly where cloud backups come into play as a strategic security tool.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Especially in an environment shaped by geopolitical tensions, cyber risks, and regulatory requirements, this misconception can have serious consequences. Public cloud providers primarily secure their infrastructure\u2014but not automatically the content of customer data. The so-called shared responsibility model means that protecting against data loss (e.g. due to accidental deletion, malware, or misconfiguration) lies with the customer. This distinction between \u201csecurity of the cloud\u201d and \u201csecurity in the cloud\u201d clearly shows why professional cloud backup solutions are indispensable today.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<h2>Cloud backup strategy and digital sovereignty: Control is crucial<\/h2>\n<p><span data-contrast=\"auto\">With growing focus on data protection and digital sovereignty, companies are also faced with the challenge of complying with industry-specific and legal requirements such as the GDPR, the Swiss Federal Act on Data Protection (FADP), the NIS2 directive, or ISO 27001\u2014even in complex multi-cloud scenarios. An independent backup, separate from the primary cloud provider, is therefore essential to:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"42\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">ensure data access in the event of a crisis,<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"42\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">guarantee long-term archiving in accordance with regulatory requirements, and<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"42\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">establish transparent control mechanisms.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2>Cloud backup strategy according to the 3-2-1 rule: How to back up correctly<\/h2>\n<p><span data-contrast=\"auto\">A robust backup concept follows the 3-2-1 rule:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"43\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">3 copies of the data<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"43\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">2 different types of storage media<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"43\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">1 copy stored at a geographically separate location<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">This method minimizes risks from hardware failures, cyberattacks, and local disasters. For particularly sensitive data, an offline-capable tape or disk backup is additionally recommended\u2014physically disconnected from the network and therefore immune to ransomware.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<h2>Using backup technologies efficiently<\/h2>\n<p><span data-contrast=\"auto\">As data volumes grow and demands for fast response times increase, efficiency becomes a decisive factor for backup strategies. Modern backup solutions therefore rely on technical optimizations to minimize storage space, network load, and backup times:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">1. Incremental backups<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> Only the data that has changed since the last backup is saved. This reduces both the amount of storage required and the time needed for regular backups.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">2. Efficient compression<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> By selectively reducing file size (without data loss), storage space can be significantly saved. This is especially beneficial for large data volumes.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">3. Deduplication<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> Identical data blocks are stored only once and referenced\u2014rather than being saved multiple times. This method is lossless but requires regular checks, as faulty deduplication can lead to inconsistent restores.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">4. Fingerprinting \/ pattern recognition<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> By analyzing redundant data patterns, systems can identify and centrally manage duplicate data. Especially for regular backups of systems with only slight changes, this significantly reduces resource usage.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Altogether, these techniques enable a cost-efficient and high-performance backup architecture\u2014provided they are correctly implemented and regularly reviewed.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<h2>Backup strategy as a success factor \u2013 what matters<\/h2>\n<p><span data-contrast=\"auto\">A technical backup alone is not enough. What matters is strategic planning within the overall context of IT resilience. Important planning criteria include:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"44\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Data classification: Which data is particularly sensitive or business-critical?<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"44\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">RTO\/RPO definition: What recovery time (RTO) and data loss tolerance (RPO) are acceptable?<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"44\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Compatibility: Does the solution fit the existing IT environment?<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"44\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Compliance requirements: Are GDPR, GoBD, and industry-specific regulations met?<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"44\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">Testability: Regular restore tests to ensure the effectiveness of the solution.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2><strong>Which backup solution for which use case?\u00a0<\/strong><\/h2>\n<ol>\n<li><b><span data-contrast=\"auto\"> Mid-sized company using Microsoft 365:<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> A daily, incremental backup in a cloud-to-cloud backup solution is recommended. Providers offering native M365 support are ideal. Granular restore options and GDPR-compliant storage in EU data centers are essential.<\/span><\/li>\n<li><b><span data-contrast=\"auto\"> Small and medium-sized enterprises without M365:<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> SMEs that do not use typical SaaS suites like Microsoft 365 also require a reliable backup strategy. Depending on the system landscape\u2014such as local file servers, virtualized environments, or web-based tools\u2014the following is recommended:<\/span><\/li>\n<\/ol>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"45\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">For local servers and applications: image-based or file-based backups with agentless VM support.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"45\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">For web-based tools or smaller SaaS services: API-based SaaS backup services to secure collaboration tools, CRM or marketing platforms.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"45\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">For endpoints: endpoint backup solutions that automatically back up local data from laptops and PCs.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">A frequently overlooked aspect for SMEs is securing mobile or decentralized workstations. Here, a combined concept of local backup and cloud offsite copy helps create resilience against loss or ransomware.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n<ol start=\"3\">\n<li><b><span data-contrast=\"auto\"> Large IT infrastructures with a hybrid cloud strategy:<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> Here, a combination of agent-based backup for local workloads and cloud-native backup for hyperscaler instances is recommended. In addition, a disaster recovery plan with defined RTO\/RPO targets should be in place.<\/span><\/li>\n<li><b><span data-contrast=\"auto\"> Business-critical infrastructures:<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> For the highest security requirements, the use of an air-gap-capable, immutable, and encrypted solution is recommended\u2014physically and logically separated from other IT systems, with a tape or disk backup as a third copy. This effectively defends against attacks such as ransomware or state-motivated data manipulation.<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">Cloud services are indispensable in today\u2019s enterprise IT. But those who fail to establish an independent backup solution and do not actively protect their SaaS data are placing themselves in a risky dependency on the provider\u2014with potentially severe consequences in the event of outages, attacks, or political escalations. A well-thought-out, efficient, and compliant cloud backup concept is therefore imperative.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:278}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A well-thought-out cloud backup strategy is crucial today\u2014because companies in all industries are using cloud services more than ever before. The advantages are obvious: scalability, flexibility, and high availability. However, shifting workloads to the cloud also brings a frequently underestimated risk: the false assumption that the cloud provider is responsible for data security and recoverability. [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":31494,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[211],"tags":[],"class_list":["post-31498","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cloud backup strategy: Resilient &amp; compliant backup<\/title>\n<meta name=\"description\" content=\"Learn why a cloud backup strategy is crucial\u2014including the 3-2-1 rule, compliance requirements, and practical solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud backup strategy: Resilient &amp; compliant backup\" \/>\n<meta property=\"og:description\" content=\"Learn why a cloud backup strategy is crucial\u2014including the 3-2-1 rule, compliance requirements, and practical solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"CONVOTIS Iberia\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-04T08:28:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-11T15:46:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Cloud-Backup.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1090\" \/>\n\t<meta property=\"og:image:height\" content=\"670\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"elianamoldovanska\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"elianamoldovanska\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/\"},\"author\":{\"name\":\"elianamoldovanska\",\"@id\":\"https:\/\/www.convotis.com\/es\/#\/schema\/person\/43069367f8f43b4689f544f0d1e798af\"},\"headline\":\"Independent and compliant: Strategies for resilient business cloud backups\",\"datePublished\":\"2025-07-04T08:28:58+00:00\",\"dateModified\":\"2025-08-11T15:46:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/\"},\"wordCount\":886,\"publisher\":{\"@id\":\"https:\/\/www.convotis.com\/es\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Cloud-Backup.png\",\"articleSection\":[\"Cloud Solutions\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/\",\"url\":\"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/\",\"name\":\"Cloud backup strategy: Resilient & compliant backup\",\"isPartOf\":{\"@id\":\"https:\/\/www.convotis.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Cloud-Backup.png\",\"datePublished\":\"2025-07-04T08:28:58+00:00\",\"dateModified\":\"2025-08-11T15:46:12+00:00\",\"description\":\"Learn why a cloud backup strategy is crucial\u2014including the 3-2-1 rule, compliance requirements, and practical solutions.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/#primaryimage\",\"url\":\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Cloud-Backup.png\",\"contentUrl\":\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Cloud-Backup.png\",\"width\":1090,\"height\":670,\"caption\":\"Hands typing on a laptop with cloud and file transfer icons representing automated cloud backup and data synchronization.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.convotis.com\/es\/#website\",\"url\":\"https:\/\/www.convotis.com\/es\/\",\"name\":\"CONVOTIS\",\"description\":\"For Europe&#039;s digital future.\",\"publisher\":{\"@id\":\"https:\/\/www.convotis.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.convotis.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.convotis.com\/es\/#organization\",\"name\":\"CONVOTIS\",\"url\":\"https:\/\/www.convotis.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.convotis.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Convotis_blue_cmyk300dpi-scaled.png\",\"contentUrl\":\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Convotis_blue_cmyk300dpi-scaled.png\",\"width\":2560,\"height\":411,\"caption\":\"CONVOTIS\"},\"image\":{\"@id\":\"https:\/\/www.convotis.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/convotis-gmbh\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.convotis.com\/es\/#\/schema\/person\/43069367f8f43b4689f544f0d1e798af\",\"name\":\"elianamoldovanska\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.convotis.com\/es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g\",\"caption\":\"elianamoldovanska\"},\"sameAs\":[\"https:\/\/www.convotis.com\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cloud backup strategy: Resilient & compliant backup","description":"Learn why a cloud backup strategy is crucial\u2014including the 3-2-1 rule, compliance requirements, and practical solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/","og_locale":"en_US","og_type":"article","og_title":"Cloud backup strategy: Resilient & compliant backup","og_description":"Learn why a cloud backup strategy is crucial\u2014including the 3-2-1 rule, compliance requirements, and practical solutions.","og_url":"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/","og_site_name":"CONVOTIS Iberia","article_published_time":"2025-07-04T08:28:58+00:00","article_modified_time":"2025-08-11T15:46:12+00:00","og_image":[{"width":1090,"height":670,"url":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Cloud-Backup.png","type":"image\/png"}],"author":"elianamoldovanska","twitter_card":"summary_large_image","twitter_misc":{"Written by":"elianamoldovanska","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/#article","isPartOf":{"@id":"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/"},"author":{"name":"elianamoldovanska","@id":"https:\/\/www.convotis.com\/es\/#\/schema\/person\/43069367f8f43b4689f544f0d1e798af"},"headline":"Independent and compliant: Strategies for resilient business cloud backups","datePublished":"2025-07-04T08:28:58+00:00","dateModified":"2025-08-11T15:46:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/"},"wordCount":886,"publisher":{"@id":"https:\/\/www.convotis.com\/es\/#organization"},"image":{"@id":"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Cloud-Backup.png","articleSection":["Cloud Solutions"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/","url":"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/","name":"Cloud backup strategy: Resilient & compliant backup","isPartOf":{"@id":"https:\/\/www.convotis.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/#primaryimage"},"image":{"@id":"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Cloud-Backup.png","datePublished":"2025-07-04T08:28:58+00:00","dateModified":"2025-08-11T15:46:12+00:00","description":"Learn why a cloud backup strategy is crucial\u2014including the 3-2-1 rule, compliance requirements, and practical solutions.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.convotis.com\/es\/en\/news\/cloud-backup-strategy\/#primaryimage","url":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Cloud-Backup.png","contentUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/07\/Cloud-Backup.png","width":1090,"height":670,"caption":"Hands typing on a laptop with cloud and file transfer icons representing automated cloud backup and data synchronization."},{"@type":"WebSite","@id":"https:\/\/www.convotis.com\/es\/#website","url":"https:\/\/www.convotis.com\/es\/","name":"CONVOTIS","description":"For Europe&#039;s digital future.","publisher":{"@id":"https:\/\/www.convotis.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.convotis.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.convotis.com\/es\/#organization","name":"CONVOTIS","url":"https:\/\/www.convotis.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.convotis.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Convotis_blue_cmyk300dpi-scaled.png","contentUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Convotis_blue_cmyk300dpi-scaled.png","width":2560,"height":411,"caption":"CONVOTIS"},"image":{"@id":"https:\/\/www.convotis.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/convotis-gmbh\/"]},{"@type":"Person","@id":"https:\/\/www.convotis.com\/es\/#\/schema\/person\/43069367f8f43b4689f544f0d1e798af","name":"elianamoldovanska","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.convotis.com\/es\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g","caption":"elianamoldovanska"},"sameAs":["https:\/\/www.convotis.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/posts\/31498","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/comments?post=31498"}],"version-history":[{"count":4,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/posts\/31498\/revisions"}],"predecessor-version":[{"id":42809,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/posts\/31498\/revisions\/42809"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/media\/31494"}],"wp:attachment":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/media?parent=31498"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/categories?post=31498"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/tags?post=31498"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}