Back to Articles

Air-Gapped Backups: Maximum Protection for Critical Data

Air-Gapped Backups: Maximum Protection for Critical Data

Ransomware has fundamentally changed the backup conversation for UK businesses. It is no longer sufficient to simply have backups — you need backups that cannot be compromised, encrypted, or deleted by an attacker who has gained access to your network. Traditional backup approaches, where backup data sits on a network-connected storage device or in a cloud repository accessible via standard credentials, are increasingly vulnerable to sophisticated ransomware attacks that specifically target backup systems before encrypting production data.

Air-gapped backups represent the ultimate line of defence against this threat. An air-gapped backup is a copy of your data that is physically or logically isolated from your network, making it impossible for ransomware — or any network-based attack — to reach, modify, or destroy the backup. If everything else fails — if your servers are encrypted, your cloud backups are compromised, and your online recovery options are exhausted — an air-gapped backup gives you a guaranteed path to recovery.

This guide explains what air-gapped backups are, why they have become essential for UK businesses, how different air-gap technologies work, and how to implement an air-gapped backup strategy that provides maximum protection without creating unmanageable operational complexity.

93%
of ransomware attacks now target backup systems
£820k
average ransomware recovery cost for UK mid-market firms
21 days
average recovery time without air-gapped backups
96%
recovery success rate with properly maintained air-gapped backups

Why Traditional Backups Are No Longer Enough

The ransomware threat landscape has evolved dramatically since the early days of indiscriminate attacks. Modern ransomware operators — many of them organised criminal gangs operating out of Eastern Europe and Russia — conduct targeted, methodical attacks that can unfold over weeks or months. They gain initial access through phishing emails, vulnerable remote access points, or compromised credentials, then move laterally through the network, escalating privileges and mapping the environment before deploying ransomware.

Critically, these attackers now specifically seek out and compromise backup systems as part of their attack methodology. They look for backup servers, identify backup schedules, compromise backup administrator credentials, and either encrypt or delete backup data before deploying ransomware to production systems. The goal is to eliminate every recovery option, leaving the victim with no choice but to pay the ransom.

This means that a backup stored on a network-attached storage device, a backup server connected to your domain, or a cloud backup accessible via credentials that an attacker could steal, is no longer a guaranteed recovery path. If the attacker can reach your backup, they will destroy it. Only data that is physically or logically unreachable from the compromised network remains safe.

The NCSC Position on Air-Gapped Backups

The National Cyber Security Centre (NCSC) explicitly recommends that UK organisations maintain an offline or air-gapped backup as part of their ransomware defence strategy. Their guidance states that organisations should "keep an offline backup of your data, in a location that is separate from your network and systems." The NCSC also recommends that this backup is tested regularly to ensure it can be used for recovery. For businesses seeking Cyber Essentials Plus certification, demonstrating a robust backup strategy including offline or air-gapped copies strengthens the overall security assessment.

What Is an Air-Gapped Backup?

An air-gapped backup is a copy of your data that is isolated from your network and systems by an "air gap" — a physical or logical separation that prevents any network-based access to the backup data. The term originates from military and government security practices, where classified systems are physically disconnected from all networks to prevent unauthorised access.

In the context of business data protection, air-gapping can be achieved through several methods, each offering different levels of isolation, convenience, and cost. The three primary approaches are physical air gaps (using removable media that is disconnected and stored separately), logical air gaps (using technology that makes backup data immutable and inaccessible to network-connected systems), and cloud-based immutable storage (using cloud features that prevent any modification or deletion of stored data, even by administrators).

Air-Gapped Backup: Protected

  • Physically or logically isolated from network
  • Cannot be encrypted by ransomware
  • Cannot be deleted by compromised admin accounts
  • Provides guaranteed recovery path
  • Meets NCSC and Cyber Essentials requirements
  • Survives total network compromise
  • Independent of production infrastructure
  • Time-locked retention prevents premature deletion

Network-Connected Backup: Vulnerable

  • Accessible from the network via standard protocols
  • Can be encrypted by ransomware alongside production data
  • Admin credentials can be used to delete backups
  • No recovery if attacker targets backup systems
  • May not satisfy regulatory requirements
  • Compromised when the network is compromised
  • Depends on production infrastructure
  • Backups can be silently corrupted over time

Air-Gap Technologies Compared

Understanding the different air-gap technologies helps you choose the approach that best fits your business requirements, budget, and operational capabilities. Each method has distinct advantages and trade-offs.

Method Isolation Level Automation Cost Best For
Removable USB/HDD (rotated off-site) Physical — highest Manual rotation required Low (£200-£500) Very small businesses
RDX Cartridges Physical — high Semi-automated Medium (£500-£2,000) SMEs with structured processes
LTO Tape Physical — highest Automated with tape library High (£3,000-£15,000) Larger businesses, compliance-driven
Immutable Cloud Storage (S3 Object Lock) Logical — high Fully automated Medium (per-GB pricing) Cloud-first businesses
Veeam Hardened Repository Logical — high Fully automated Medium-High Virtualised environments
Datto / BCDR Appliance Logical — high Fully automated High (subscription model) MSP-managed environments

Implementing a Physical Air Gap

A physical air gap provides the strongest isolation because the backup media is completely disconnected from all systems and networks when not actively being written to. The most common physical air-gap methods for UK businesses are rotating external drives and LTO tape.

For smaller UK businesses, a rotating set of external USB hard drives or RDX cartridges provides a simple and affordable physical air gap. The process works as follows: maintain at least three external drives in rotation. Each day (or each backup cycle), connect one drive to the backup server, run the backup, then disconnect the drive and store it in a secure location — ideally a fire-rated safe on-site and a secondary copy at an off-site location such as a bank safe deposit box or a director's home. The following day, use the next drive in the rotation. This ensures that even if one drive is connected during an attack, the other two drives are safely disconnected and available for recovery.

For larger organisations or those with more demanding compliance requirements, LTO tape remains the gold standard for physical air-gapped backup. Modern LTO-9 tapes store up to 18TB of native data (45TB compressed) per cartridge, with transfer speeds sufficient for enterprise backup windows. Tape libraries automate the backup process, and cartridges are physically removed and stored off-site for maximum protection. Many UK financial services firms, legal practices, and healthcare organisations use LTO tape specifically because it satisfies regulatory requirements for offline data protection.

UK businesses using some form of air-gapped backup 31%
Ransomware victims who recovered fully via air-gapped backups 96%
Ransomware victims who recovered via network-connected backups 57%
Businesses that test their air-gapped backups regularly 24%

Implementing a Logical Air Gap

A logical air gap uses technology rather than physical disconnection to isolate backup data. While not as absolute as a physical air gap, a properly implemented logical air gap provides strong protection against ransomware and is significantly easier to automate and manage.

The most common logical air-gap technologies for UK businesses include immutable cloud storage (such as AWS S3 Object Lock or Azure Immutable Blob Storage), which allows data to be written once and prevents any modification or deletion for a defined retention period. Even if an attacker compromises your AWS or Azure credentials, they cannot delete or modify data protected by immutability policies. The retention period is enforced at the platform level, making it immune to credential-based attacks.

Veeam's Hardened Linux Repository is another popular logical air-gap option for businesses with virtualised environments. This approach uses a dedicated Linux server configured with no SSH access and immutable backup flags, ensuring that backup data cannot be modified or deleted from the network. The server accepts backup data only through the Veeam backup engine and rejects all other access attempts.

The 3-2-1-1-0 Backup Rule

The traditional 3-2-1 backup rule (three copies, two media types, one off-site) has evolved to address the ransomware threat. The modern best practice for UK businesses is the 3-2-1-1-0 rule: three copies of your data, on two different media types, with one copy off-site, one copy air-gapped or immutable, and zero errors (verified through regular testing).

The addition of the air-gapped copy and the zero-errors requirement reflects the current threat landscape. The air-gapped copy ensures recovery even in the worst-case scenario, while the zero-errors requirement emphasises that untested backups are unreliable backups. A backup that has never been restored is a hope, not a strategy.

Recovery Success Rate by Backup Strategy
Air-Gapped + Tested
96%
Immutable Cloud
89%
Network Backup
57%
Local Only
23%
No Backup
4%

Testing Your Air-Gapped Backups

An air-gapped backup that has never been tested is a liability disguised as a safety net. Regular testing is essential to verify that backup data is complete, uncorrupted, and restorable within your recovery time objectives.

Conduct restore tests at least quarterly. For physical air-gapped media, this means connecting the backup drive or loading the tape, initiating a restore of representative data (a mixture of files, databases, and application data), and verifying that the restored data is complete and usable. For logical air-gap solutions, initiate a restore from the immutable storage to a test environment and verify data integrity.

Document the results of every test, including the time taken to restore, any errors encountered, and the actions taken to resolve them. This documentation serves dual purposes: it confirms that your backup strategy works, and it provides evidence for compliance audits and regulatory reviews. The ICO and other regulatory bodies look favourably on organisations that can demonstrate a tested and documented backup strategy.

Compliance and Regulatory Drivers for UK Businesses

Beyond the immediate ransomware protection benefits, air-gapped backups increasingly feature in UK regulatory and compliance frameworks. The Information Commissioner's Office (ICO) considers backup strategy as part of its assessment of whether an organisation has implemented appropriate technical and organisational measures under UK GDPR Article 32. Organisations that suffer a data breach and cannot demonstrate a robust, tested backup strategy — including offline or air-gapped copies — may face higher penalties and more critical regulatory scrutiny during incident investigations. The ICO's enforcement actions in recent years have consistently highlighted data recovery capability as a key factor in determining penalty severity.

For businesses operating in regulated sectors, the requirements are even more explicit. The Financial Conduct Authority (FCA) expects firms to maintain operational resilience, including the ability to recover critical data within defined tolerances. The Solicitors Regulation Authority (SRA) requires law firms to have robust data protection measures, and the ability to recover client files after a cyber incident is a fundamental expectation. Healthcare organisations processing NHS data must comply with the Data Security and Protection Toolkit (DSPT), which includes specific requirements around backup and recovery capabilities that air-gapped solutions directly address. These sector-specific obligations mean that air-gapped backups are not optional extras for regulated businesses — they are practical necessities for demonstrating compliance.

The Cyber Essentials Plus certification scheme, widely adopted across UK businesses and increasingly required for government contracts, evaluates backup practices as part of its assessment criteria. While Cyber Essentials does not explicitly mandate air-gapped backups, demonstrating an air-gapped or immutable backup strategy significantly strengthens your certification position and demonstrates mature security practices to clients and partners who review your certification status. Many organisations pursuing ISO 27001 certification also find that air-gapped backups satisfy multiple controls within Annex A, particularly those relating to information backup (A.12.3) and protection against malware (A.12.2). The combination of Cyber Essentials Plus and ISO 27001 is becoming a standard expectation for UK businesses bidding on government and enterprise contracts.

Insurance providers are also driving adoption of air-gapped backup strategies across the UK market. Cyber insurance underwriters increasingly ask about backup isolation during the application and renewal process. Businesses that can demonstrate air-gapped or immutable backup practices often receive more favourable premium terms, while those relying solely on network-connected backups may face higher premiums, coverage exclusions, or outright refusal of ransomware coverage. Several major UK cyber insurers now list offline or immutable backup as a prerequisite for ransomware coverage, making air-gapped backup not just a technical best practice but a commercial necessity for maintaining affordable cyber insurance. The cost savings on insurance premiums alone can offset a significant portion of the investment in air-gapped backup infrastructure.

Common Mistakes When Implementing Air-Gapped Backups

Even organisations that recognise the need for air-gapped backups often make implementation errors that undermine the effectiveness of their strategy. Understanding these common pitfalls helps you avoid them and ensures your air-gapped backups deliver genuine protection when you need them most.

The most frequent mistake is treating air-gapped backup as a one-time project rather than an ongoing operational discipline. Setting up an air-gapped backup rotation is only the beginning — without regular testing, documented procedures for staff turnover, and periodic reviews of backup scope and retention policies, the air-gapped backup gradually drifts into unreliability. Drives sit in safes untested for months. New servers and applications get added to the environment but never included in the air-gapped backup schedule. Staff who understood the rotation process leave the business, and their replacements are never properly trained on the procedures. The result is an air-gapped backup that exists in name only, providing false confidence rather than genuine protection.

Another common error is insufficient scope in the air-gapped backup strategy. Businesses often air-gap their server backups but overlook critical data stored in cloud SaaS applications, email archives, or specialist line-of-business systems. A comprehensive air-gapped backup strategy must account for all critical data repositories, not just on-premises file servers. This includes Microsoft 365 data (which Microsoft does not back up or air-gap on your behalf), cloud-hosted databases, configuration data for network equipment and security devices, and any data held in specialist industry applications that your business depends on for daily operations. A backup strategy that protects your file server but ignores your Microsoft 365 mailboxes and SharePoint data leaves a massive gap in your recovery capability.

Businesses also frequently underestimate the recovery process itself. Having air-gapped backup data is necessary but not sufficient — you also need the infrastructure, documentation, and trained staff to execute a full recovery under pressure. This means maintaining up-to-date documentation of recovery procedures, ensuring you have access to the hardware or cloud resources needed to restore systems, and verifying that application licence keys and configuration details are accessible independently of the compromised environment. A tabletop recovery exercise, conducted at least annually, reveals gaps in your recovery capability before a real incident forces you to discover them under extreme time pressure and stress. Many UK businesses that invested properly in air-gapped backups still experienced extended downtime during recovery because they had not practised or documented the restoration process itself.

Protect Your Business with Air-Gapped Backups

Cloudswitched designs and implements air-gapped backup solutions for UK businesses of all sizes. From rotating physical media for small offices to enterprise-grade immutable cloud storage and LTO tape libraries, we tailor the solution to your data volumes, compliance requirements, and recovery objectives.

Tags:Cloud Backup
CloudSwitched

London-based managed IT services provider offering support, cloud solutions and cybersecurity for SMEs.

CloudSwitched Service

Cloud Backup Solutions

Automated, encrypted backup with rapid recovery for total peace of mind

Learn More
CloudSwitchedCloud Backup Solutions
Explore Service

Technology Stack

Powered by industry-leading technologies including SolarWinds, Cloudflare, BitDefender, AWS, Microsoft Azure, and Cisco Meraki to deliver secure, scalable, and reliable IT solutions.

SolarWinds
Cloudflare
BitDefender
AWS
Hono
Opus
Office 365
Microsoft
Cisco Meraki
Microsoft Azure

Latest Articles

12
  • Internet & Connectivity

Leased Line Cost in the UK: 2026 Pricing Guide

12 Apr, 2026

Read more
23
  • IT Support

What is a Help Desk and How Should Your Business Use It?

23 Sep, 2025

Read more
11
  • IT Support

Why Your Business Needs a Dedicated IT Account Manager

11 Mar, 2026

Read more

Enquiry Received!

Thank you for getting in touch. A member of our team will review your enquiry and get back to you within 24 hours.