Computerz R Us

Computerz R Us recommended backup solutions • Residential + Business • 3-2-1-1 rule

Built for real life: homes + businesses

3-2-1-1 Backup Rule (and how to survive ransomware)

Use this page to learn the rule, then apply it based on your environment. Choose Residential or Business to see the right checklist, scenarios, and recommendations.

Pick your environment to tailor the training.
Start training
Key takeaway: A backup is only a backup if it can be restored quickly, cleanly, and when things are on fire.
Rule summary
3 copies • 2 media • 1 offsite • 1 offline/immutable
That last “1” is your ransomware seatbelt.
Most common failure
Backups are online + writable
Ransomware hits the backup repo too.
Minimum habit
Monthly restore test
Restore a file + one “full” restore test.
Module 1 • What the rule means

3-2-1-1, in plain English

Use this as your “must-haves” checklist for any backup plan:

✅ The 3-2-1-1 breakdown
  • 3 copies: your live data + two backup copies.
  • 2 media types: different storage types or isolation boundaries.
  • 1 offsite: a copy not in the same building/network.
  • 1 offline or immutable: not writable by attackers during an incident.
Offline vs immutable:
  • Offline / air-gapped = physically disconnected (or unreachable from production).
  • Immutable = cannot be changed or deleted until retention expires.

Shortcut: if an attacker can reach it with the same credentials or network path, it’s not the “1”.

Module 1 • Why it exists

Why “1 offline/immutable” matters

Modern ransomware doesn’t just encrypt files—it hunts backups.

Common ways backups get destroyed
  • Backup target is a writable share → encrypted like everything else.
  • Backup console or cloud account compromised → backups deleted.
  • No MFA on backup/cloud portals.
  • Backups stored in the same place as the disaster (fire/flood/theft).
Reality check: If backups are online + writable + reachable from production, assume they will be hit during an attack.

Good practice: protect backup infrastructure like it’s a bank vault (even in a home).

Module 2 • Recommendations

Recommended backup approach

Choose an audience above to see the best-fit designs.

Pattern A
    Pattern B
      Tip: The “1 offline/immutable” is the part most people skip—and the part ransomware hates the most.
      Module 2 • What to protect

      What should you back up?

      This list changes slightly for residential vs business.

      Priority data
        Key vocabulary (so nobody can snow you)
        • RPO: how much data you can lose (time).
        • RTO: how fast you must be back online.
        • Snapshots: helpful, but not always safe if an attacker can delete them.
        • Backups: should be independent and protected (offline/immutable).
        Module 3 • Implementation checklist

        Do-this-next checklist (saves progress)

        Check these off as you build or audit a backup plan.

        Checklist progress
        0% complete
        0 / 0
        Minimum baseline: MFA on backup/cloud, separate credentials, immutable/offline copy, monthly restore test, and documented steps.
        Module 4 • Scenarios

        What would you do?

        Read each scenario, then expand the “best response”.

        Module 4 • Mini playbook

        Ransomware mini-playbook (backup-focused)

        These are the first steps that protect your recovery path.

        Immediate actions
          Recovery sequence
            Rule: If you restore into a still-compromised network, you can re-infect your restored systems.
            Module 5 • Quiz

            Quiz (score saved locally)

            Answer all questions, then click Grade quiz. (Quiz matches your selected audience.)