The 10 backup mistakes to avoid
Most data loss happens because of a few fixable habits: treating sync as backup, skipping the 3-2-1 rule, not having an immutable/offline copy, keeping all backups in one place, never testing restores, having no retention plan, assuming Microsoft 365/Google already “back you up,” leaving backups unsecured, relying on manual runs, and forgetting laptops and drives. Fix these and your files will likely survive hardware failure, ransomware, and account lockouts.
Table of Contents
Why backups still fail in 2025
Ransomware and account lockouts are real.
Criminals now aim to encrypt live data and backup catalogs, which turns “we have backups” into “we can’t restore.” Even when payouts fell in 2024, incidents rose defenders improved, but attackers shifted targets. Treat immutability and MFA as table stakes.
Hardware still fails.
Backblaze’s 2024 report shows an overall annualized failure rate around 1.57% across large drive fleets. That risk compounds over years. Assume drives will fail and plan accordingly.
Mistake #1: Treating sync as backup
The problem: Services like Google Drive, OneDrive, Dropbox are great for access and collaboration. They mirror changes. If you delete or overwrite a file, the change can sync everywhere. That is not a safety net.
Fix it: Use a true backup app that runs automatically, keeps versions, and can restore yesterday’s clean copy. Keep sync for collaboration, backup for safety. Here’s the short view:
| Task | Sync | Backup |
|---|---|---|
| Mirrors changes instantly | Yes | No |
| Keeps historical versions | Limited | Yes (policy-based) |
| Restores a whole machine | No | Yes |
| Best for | Sharing across devices | Recovery from mistakes/ransomware |
Mistake #2: Skipping the 3-2-1 rule
The problem: One backup is not a strategy. The classic 3-2-1 rule: keep 3 copies, on 2 different media, with 1 offsite. Many people have only one external drive. That’s fragile.
Modern fix: Upgrade to 3-2-1-1-0: add one immutable copy and zero errors from verified restore tests. Example stack:
- 3 copies: your PC, an external drive, and cloud backup
- 2 media: external HDD + cloud object storage
- 1 offsite: cloud
- +1 immutable: cloud bucket with Object Lock/WORM
- 0 errors: monthly test restore until clean
Mistake #3: No immutable or offline copy
The problem: If ransomware can encrypt your backup or delete snapshots, you may have nothing to restore. That is why immutability matters.
Fix it: Turn on Object Lock (WORM) for your cloud backups. It prevents changing or deleting backup objects for a time window you set, even with admin credentials. If your provider supports “legal hold” or “compliance” modes, learn the difference and pick the strict one you can manage.
Short answer : Immutable backups store data in write-once, read-many mode so files can’t be modified or deleted until a set expiry. This blocks ransomware from encrypting or wiping your backup sets and is recommended by incident-response guidance for resilient recovery.
Mistake #4: Backups live in one place
The problem: Fire, theft, flood, or a single account suspension can take out your only copy. Keeping all backups on the same desk or in the same cloud tenant is a single point of failure.
Fix it: Separate locations and accounts. For home: external drive at home + cloud backup in a different vendor account. For SMB: primary onsite NAS + cloud backup in a separate account with limited roles. Air-gap at least one copy by unplugging a drive or using an object store with immutability.
Mistake #5: Never testing restores
The problem: A backup you never test is a backup you can’t trust. Corruption, mis-scoped folders, and expired versions show up only when you try to restore.
Fix it: the 15-minute monthly drill
- Pick one folder you’d hate to lose.
- Restore it to a temp location.
- Open random files to verify.
- Log the time taken and any errors.
- Fix issues and repeat next month.
Mistake #6: Vague or zero retention policy
The problem: Either you keep too little (can’t go back far enough) or too much (storage bills explode).
Fix it: Start with 30-90-365:
- 30 days of daily versions
- 12 weekly versions (≈90 days)
- 12 monthly versions (≈365 days)
Adjust for legal and project needs. Many admins keep 7/30/90/365 as a simple ladder. Document it so audits and handoffs are easy.
Mistake #7: Assuming Microsoft 365 or Google “already backs me up”
The problem: Cloud providers secure the infrastructure, but your data, accounts, and retention are largely your responsibility. Microsoft 365 now offers a native Backup service, but you still need to choose scope, retention, and recovery workflows. Google Workspace relies on Vault retention rules and holds; that’s not the same as a full backup with point-in-time restore for everything.
Fix it:
- On Microsoft 365, evaluate Microsoft 365 Backup or a third-party tool for granular restore and cross-tenant recoveries. Know its limits and retention defaults.
- On Google Workspace, define Vault retention for Mail/Drive/Chat and consider dedicated backups for quick item-level restores and ransomware rollback.
Mistake #8: Unsecured backups (no MFA, no encryption)
The problem: If your backup console has a weak password or your external drive isn’t encrypted, attackers and thieves can go straight for the crown jewels.
Fix it: Require MFA on every backup admin, rotate API keys, and encrypt backups at rest and in transit. CISA’s baseline guidance calls out strong authentication and regular updates as core hygiene.
Mistake #9: Manual backups only
The problem: Humans forget. Manual jobs get skipped, especially on laptops. Silent failures go unnoticed without alerts.
Fix it: Turn on automatic schedules, email or app alerts, and failure reports. Aim for near-continuous or hourly increments for active devices. Let software work while you sleep.
Mistake #10: Ignoring endpoints and external drives
The problem: The files that matter most often live on laptops, phones, and external HDDs. People also assume “a big RAID box” equals a backup. It doesn’t.
Fix it:
- Include laptops and NAS in your backup scope.
- If you use external drives, back them up too and power them periodically so your software protects them.
- Expect drives to age. Industry-level telemetry shows non-zero failure rates even in managed fleets. Be proactive.
Quick start: a sane 3-step plan for most people
- Buy once: external 4–8TB HDD + a reputable cloud backup that supports versioning and immutability.
- Set the rules: 3-2-1-1-0, 30-90-365 retention, MFA on the console.
- Test monthly: run the 15-minute drill, log results, fix issues.
Comparison Tables / Pros & Cons
Backup vs Sync (key differences) – see table in Mistake #1.
Where to keep your copies
| Option | Pros | Cons | Use it for |
|---|---|---|---|
| External HDD | Fast local restore; cheap per TB | Physical risks; can be stolen; needs rotation | Home and SMB local copy |
| Cloud backup | Offsite, versioning, anywhere restore | Ongoing fee; initial seed time | Immutable, offsite safety |
| NAS | Centralizes devices; snapshots | Not a backup by itself; admin overhead | Home/SMB hubs with cloud offload |
Frequently Asked Question
What’s better for home: external drive or cloud backup?
Use both. Drive for fast local restores, cloud for offsite and immutability.
Do I need a NAS?
Helpful for multi-device homes, but still back the NAS up to an immutable cloud bucket.
How long should I keep backups?
Start with 30-90-365 versions; extend for legal or client work.
Can Microsoft 365 restore a single email or file from months ago?
It depends on your configured backup/retention. Native M365 Backup and third-party tools enable granular, longer-term restores.
Is RAID a backup?
No. RAID improves availability; it does not replace versioned, offsite, immutable copies.
How do I know if my backup covers laptops?
Check your backup scope for each device and verify with a test restore monthly.
What if my cloud account gets suspended?
Another reason to maintain a separate provider or location for backups and keep an offline or immutable copy. Cases exist where single-vendor reliance caused lockout pain.
Do I need encryption?
Yes. Encrypt backups at rest/in transit, and require MFA for admin access.
Featured Answer Boxes
What is the 3-2-1 backup rule?
Keep 3 copies of your data on 2 different media with 1 copy stored offsite. In 2025, add one immutable copy (WORM/Object Lock) and verify zero errors via test restores for stronger ransomware resilience.
Is Google Drive or OneDrive a backup?
They’re mainly sync and collaboration tools. Changes replicate across devices, which isn’t the same as versioned, point-in-time recovery. Use a real backup app and keep cloud sync for sharing.
Why do I need immutable backups?
Immutability locks backup objects so they can’t be modified or deleted until your retention window ends, stopping attackers from wiping your safety net.
How often should I back up?
Automate continuous or hourly backups for active devices, plus daily snapshots server-side. Then run a 15-minute monthly restore drill to confirm everything works.
How bad is ransomware downtime?
Recent surveys put average downtime around the multi-week mark for many victims, even as total payouts dropped. Restoration speed depends on having clean, immutable backups and practiced drills.

