Back to Resources
Field Note April 2026 7 min read

Backup Strategies That Actually Survive Ransomware

Backups that don't survive ransomware aren't backups—they're liability. Learn what industrial organizations need to do differently.

C

Cascadia OT Security

Compliance Readiness

AUTHMFAAUDITCRYPTOKEYSVAULTACCESS CONTROLHARDEN

Ransomware targeting operational technology is no longer hypothetical. We've seen attacks on water utilities that encrypted both the engineering workstations and the backup files that the organization thought would let them recover. When your recovery plan itself is compromised, you're not recovering—you're starting from zero. Industrial organizations need backup strategies that anticipate encryption, network traversal, and the specific constraints of OT environments.

Most IT backup strategies won't work for OT. A cloud backup service is vulnerable if the attacker gains credentials to your cloud environment. A network-attached backup system is vulnerable if the attacker reaches your network and encrypts it along with your production systems. A backup that requires the engineering workstation to restore won't help if the workstation is the entry point for the attack. For OT, backup resilience means building multiple, isolated copies stored in locations an attacker cannot easily reach.

The Three-Copy Rule for OT

We recommend at minimum three independent copies of all critical OT assets: one live copy (your production systems), one cold copy (offline, physically stored), and one warm copy (available for rapid restore but isolated from your production network). The live copy operates normally. The offline copy is updated on a schedule (weekly, for most critical systems) and stored in a locked cabinet or external storage facility. The warm copy lives in an isolated network segment with restricted access—it can be brought online quickly but cannot be reached from normal operations or from the internet.

For PLC configurations and firmware, the offline copy should be on external media—USB drives, external hard drives, or tape. Store these in a physical location separate from your data center. For historians and databases, the warm copy can be a replicated instance in a segregated network or a regular backup file stored on isolated media, updated daily. The key is that an attacker who compromises your main network cannot automatically reach all three copies.

Backup Procedures That Work in OT

Backup Resilience in a Ransomware Response

In a ransomware incident, your backups are your primary recovery path. Your incident response plan should include explicit procedures for backup assessment: which backups are clean, how to verify them, and how to restore from them without re-introducing malware. If you've maintained true separation between production and backup, and if you've tested restores, you can recover without paying a ransom. That's the goal.

Building backup strategies that survive ransomware requires understanding both your OT assets and the threat landscape. We help industrial organizations design redundancy, test recovery procedures, and build confidence in their business continuity plans. Contact us to assess your backup resilience.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call