{"id":8157,"date":"2025-12-19T08:39:53","date_gmt":"2025-12-19T07:39:53","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=8157"},"modified":"2025-12-19T08:39:54","modified_gmt":"2025-12-19T07:39:54","slug":"safest-network-backup-option-in-2025","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/safest-network-backup-option-in-2025\/","title":{"rendered":"Network Backup in 2025: Why Are SMB Shares and NAS Not Enough for Ransomware?"},"content":{"rendered":"\n<p>Many companies have been doing network backup (aka network share backup) the same way for ages (to be clear, \u2018ages\u2019 means something around 5 years in IT). An SMB share on Windows Server? An always-on NAS device on a local network? Sounds familiar? Read on to learn why these approaches are no longer enough and, most importantly, secure.<\/p>\n\n\n\n<!--more-->\n\n\n<div role=\"navigation\" aria-label=\"Spis tre\u015bci\" class=\"simpletoc wp-block-simpletoc-toc\"><h2 style=\"margin: 0;\"><button type=\"button\" aria-expanded=\"false\" aria-controls=\"simpletoc-content-container\" class=\"simpletoc-collapsible\">Spis tre\u015bci<span class=\"simpletoc-icon\" aria-hidden=\"true\"><\/span><\/button><\/h2><div id=\"simpletoc-content-container\" class=\"simpletoc-content\"><ul class=\"simpletoc-list\">\n<li><a href=\"#the-problem-of-not-100-safe-network-protocols-smbcifs-nfs-and-iscsi\">The Problem of Not 100% Safe Network Protocols (SMB\/CIFS, NFS, and iSCSI)<\/a>\n\n\n<ul><li>\n<a href=\"#smbcifs-little-stability-and-focus-on-sharing-not-data-protection\">SMB\/CIFS: Little Stability and Focus on Sharing, Not Data Protection<\/a>\n\n<\/li>\n<li><a href=\"#nfs-complex-security-configuration\">NFS: Complex Security Configuration<\/a>\n\n<\/li>\n<li><a href=\"#iscsi-efficient-but-not-perfect-security-for-critical-data\">iSCSI: Efficient, But Not Perfect Security for Critical Data<\/a>\n\n<\/li>\n<\/ul>\n<li><a href=\"#the-generalpurpose-hardware-trap-nas-devices-and-physical-servers\">The General-Purpose Hardware Trap (NAS Devices and Physical Servers)<\/a>\n\n\n<ul><li>\n<a href=\"#modern-nas-devices-functionality-above-all\">Modern NAS Devices: Functionality above All<\/a>\n\n<\/li>\n<li><a href=\"#windows-server-a-regular-os-with-all-its-painpoints\">Windows Server: A Regular OS with All Its Painpoints<\/a>\n\n<\/li>\n<li><a href=\"#linuxbased-servers-secure-yet-more-complex-to-configure\">Linux-Based Servers: Secure Yet More Complex to Configure<\/a>\n\n<\/li>\n<\/ul>\n<li><a href=\"#ransomwarefree-data-backup-the-quest-for-a-secure-protocol-and-storage\">Ransomware-Free Data Backup: The Quest for a Secure Protocol and Storage<\/a>\n<\/li><\/ul><\/div><\/div>\n\n<h2 class=\"wp-block-heading\" id=\"the-problem-of-not-100-safe-network-protocols-smbcifs-nfs-and-iscsi\"><strong>The Problem of Not 100% Safe Network Protocols (SMB\/CIFS, NFS, and iSCSI)<\/strong><\/h2>\n\n\n<p>There are several network protocols that you can use to communicate with network backup storages, such as SMB\/CIFS, NFS, or iSCSI. While they can be quite secure per se, their incorrect use or the way they make backup data available through network shares makes it easy for attackers to access backups. Let\u2019s discuss it in a little more detail.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"smbcifs-little-stability-and-focus-on-sharing-not-data-protection\"><strong>SMB\/CIFS: Little Stability and Focus on Sharing, Not Data Protection<\/strong><\/h3>\n\n\n<p>The SMB\/CIFS protocol was introduced in 1980\u2019s with the purpose of file\/printer sharing over a local area network (LAN). In contrast to its legacy versions, the latest one, SMB 3.X, supports end-to-end encryption and safe authentication (through integration with Kerberos). Another advantage is that SMB\/CIFS is widely supported across different OSes and allows for easy permission management (for example, through Active Directory).<\/p>\n\n\n\n<p>On the downside, SMB\/CIFS is a chatty protocol that offers poor performance when processing large volumes of data. It\u2019s also prone to any kinds of latency and LAN connectivity issues. To achieve an optimum level of security, it requires integration with Kerberos, which might be complex and require regular maintenance to ensure maximum protection at all points in the organization&#8217;s network. Finally, a storage mapped through SMB\/CIFS is an easy target for the lateral movement \/ ransomware attacks that usually involve scanning network shares on an infected endpoint.<\/p>\n\n\n\n<p>The problem is also that in practice, many organizations implement SMB\/CIFS in an unsafe way, either sticking to legacy versions (e.g., for compatibility-related reasons) or failing to take care of and maintain an optimally secure configuration.<\/p>\n\n\n\n<p><strong>In short: Why is SMB\/CIFS not the best idea for network backup in 2025?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Poor mass data transfer performance<\/li>\n\n\n\n<li>Stability issues<\/li>\n\n\n\n<li>No granular access controls, so greater attack surface<\/li>\n\n\n\n<li>Easy infiltration through scanning and accessing shares<\/li>\n\n\n\n<li>The risk of potentially vulnerable configurations (old versions, no Kerberos integration, etc.)<\/li>\n\n\n\n<li>No support for modern &amp; ransomware-resistant backup protection features, e.g., <a href=\"https:\/\/xopero.com\/blog\/en\/immutable-backup-what-is-it-why-you-need-it\/\">immutable backup<\/a>, logical separation, etc.<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"nfs-complex-security-configuration\"><strong>NFS: Complex Security Configuration<\/strong><\/h3>\n\n\n<p>This Unix\/Linux network communication standard offers better performance than its competitor, and is often chosen for <a href=\"https:\/\/xopero.com\/blog\/en\/virtual-machine-backup-a-step-by-step-guide-to-data-protection\/\">virtual machine backup<\/a>.&nbsp;<\/p>\n\n\n\n<p>When it comes to cons, NFS\u2019s main issue is complex configuration. First, special detailed care must be taken to set up the mapping of UID\/GID (numerical user identifiers). Second, Kerberos integration (to use best-in-class authentication) is fairly complex.<\/p>\n\n\n\n<p>Similar to SMB\/CIFS, NFS, as a file sharing protocol, allows for easy infiltration of locally mounted shares\/disks. It also doesn\u2019t support modern backup security features such as logical separation or immutability.<\/p>\n\n\n\n<p><strong>In short: Why is NFS not the best idea for network share backup in 2025?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Difficult access control and authentication configuration<\/li>\n\n\n\n<li>Easy infiltration through scanning and accessing shares<\/li>\n\n\n\n<li>The risk of potentially vulnerable configurations (old versions without encryption, no Kerberos integration, etc.)<\/li>\n\n\n\n<li>No support for modern &amp; ransomware-resistant backup protection features, e.g., immutability, logical separation, etc.<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"iscsi-efficient-but-not-perfect-security-for-critical-data\"><strong>iSCSI: Efficient, But Not Perfect Security for Critical Data<\/strong><\/h3>\n\n\n<p>iSCSI is a younger standard, established officially in 2003. It offers great performance for transferring large files or databases, and is commonly used with virtual environments like <a href=\"https:\/\/xopero.com\/blog\/en\/vmware-vsphere-vcenter-and-esxi-definitions-and-differences\/\">VMware vCenter Server<\/a>. It\u2019s also end-user friendly\u2014a user sees a remote disk (target) as a standard local disk on their device (initiator).<\/p>\n\n\n\n<p>Speaking of disadvantages, iSCSI is more complex to deploy. You need to configure a dedicated SAN\/VLAN network, target server with physical disk(s), and initiators (clients that access the iSCSI storage in target).<\/p>\n\n\n\n<p>In terms of using iSCSI as a backup storage, an infection of a client usually follows with infection of the target where backups are likely to be kept. There\u2019s no full logical separation, either.<\/p>\n\n\n\n<p><strong>In short: Why is iSCSI not the best idea for network backup in 2025?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Difficult initial and ongoing setup<\/li>\n\n\n\n<li>Easy infiltration through scanning and accessing target storage<\/li>\n\n\n\n<li>Partial support for modern backup protection features like logical separation; however, immutability can be achieved through the <a href=\"https:\/\/xopero.com\/blog\/en\/vmware-snapshot-technology-what-it-is-and-when-to-use-it\/\">snapshot feature<\/a><\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-generalpurpose-hardware-trap-nas-devices-and-physical-servers\"><strong>The General-Purpose Hardware Trap (NAS Devices and Physical Servers)<\/strong><\/h2>\n\n\n<p>It\u2019s a common practice to combine the above-mentioned protocols with a NAS device \/ physical server (by the way, often a decommissioned one) and a backup &amp; recovery software to create a network backup system for an organization.<\/p>\n\n\n\n<p>Unfortunately, though pretty cheap, such a solution usually only increases the attack surface. Unless you decide to keep the NAS\/server powered off outside the backup creation window, achieving a kind of \u2018manual\u2019 physical isolation of backups.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"modern-nas-devices-functionality-above-all\"><strong>Modern NAS Devices: Functionality above All<\/strong><\/h3>\n\n\n<p>Contemporary network attached storage (NAS) devices try to lure users with rich functionality. Media server? Webcam monitoring? Www server? Or Docker containers support? No problem! But the problem is that these are extra surfaces to introduce ransomware or other types of modern threats. A tiny vulnerability in a photo gallery app or an outdated Docker container is enough for an attacker to take control of the entire device and, consequently, critical data of your organization.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"windows-server-a-regular-os-with-all-its-painpoints\"><strong>Windows Server: A Regular OS with All Its Painpoints<\/strong><\/h3>\n\n\n<p>It\u2019s not a secret that Windows is the most common target of cyberattacks. It\u2019s also true that a fully-fledged OS offers multiple ways to interact and connect with it (like AD domain, RDP, PowerShell). This, again, increases the attack surface, making the use of Windows Server as a backup storage a risky undertaking.<\/p>\n\n\n\n<p>At the same time, a general-purpose OS gives you multiple ways to harden its security. Still, it requires careful and rigorous configuration (disable RDP, disconnect server from domain, etc.) and maintenance. Not to mention an ongoing engagement on the IT administrator&#8217;s part. In reality, the gap between theoretical security and practical maintenance is often too wide.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"linuxbased-servers-secure-yet-more-complex-to-configure\"><strong>Linux-Based Servers: Secure Yet More Complex to Configure<\/strong><\/h3>\n\n\n<p>A Linux-based backup server is possibly the best idea out of the ones presented so far; yet it\u2019s not the perfect solution.<\/p>\n\n\n\n<p>A Ubuntu, Debian, or RHEL-based server is much less likely to be affected because there are simply fewer threats targeted at Linux OS. The security level is also quite good\u2014you can transmit all the data with SSH or set an immutability flag on backup files (which takes a combination of the service mode and the root account to remove).<\/p>\n\n\n\n<p>On the downside, Linux is more complex to configure, requiring the knowledge of CLI, permissions, kernel management. Also, similar to Windows, it\u2019s a general purpose OS that requires regular updates, strict configuration, and hardening. And missing just one aspect might produce a tiny vulnerability that cybercriminals will readily exploit.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomwarefree-data-backup-the-quest-for-a-secure-protocol-and-storage\"><strong>Ransomware-Free Data Backup: The Quest for a Secure Protocol and Storage<\/strong><\/h2>\n\n\n<p>So, can network share backup efficiently protect your valuable data against contemporary, sneaky threats, ensuring reliable disaster recovery and business continuity? Yes. But to set up a bunker for an organization&#8217;s critical data for the coming years, you need to do away with DIY and half-measures.<\/p>\n\n\n\n<p><a href=\"https:\/\/xopero.com\/solutions\/data-protection\/xopero-unified-protection\/\">Xopero Unified Protection<\/a> (XUP) is an all-in-one (software &amp; hardware) backup appliance that combines the most secure protocols with a dedicated, air-gapped backup solution. Let\u2019s have a closer look.<\/p>\n\n\n\n<p>XUP implements the most modern transmission and storage protocols: <strong>HTTPS <\/strong>and Amazon Web Services\u2019s proprietary <strong>S3 Local Object Storage<\/strong>. In other words, with XUP, you can enjoy the same most secure, state-of-the-art technologies as used by public cloud vendors, like Amazon, Microsoft, or Google. But instead of backing up your organization\u2019s data in the cloud (which you can also do with XUP to ensure the <a href=\"https:\/\/xopero.com\/blog\/en\/backup-3-2-1-what-is-it-and-why-should-you-use-it-2\/\">3-2-1 backup rule<\/a>, for example), you can keep it on-premises, close to you.<\/p>\n\n\n\n<p>In technical terms, this means:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>End-to-end <a href=\"https:\/\/xopero.com\/blog\/en\/aes-encryption-101-why-you-should-use-encrypted-backup\/\">AES256 data encryption<\/a> in transit and at storage, using your own encryption key, so data is available to you only.<\/li>\n\n\n\n<li><strong>Secure access through S3 API<\/strong> using access key and secret key\u2014much more difficult to compromise than, for example, a domain password.<\/li>\n\n\n\n<li><strong>Backup-dedicated appliance<\/strong> with a closed Linux-based custom OS for minimal attack surface.<\/li>\n\n\n\n<li><strong>Data immutability by design<\/strong> with the native support for Object Lock (aka Single Write Repository (SWR)).<\/li>\n\n\n\n<li><strong>Maximum scalability and performance<\/strong> of an object-based system that bypasses limitations of traditional file-based systems.<\/li>\n\n\n\n<li><strong>Fast recovery time<\/strong> (even when compared to cloud, where internet connectivity can be the bottleneck) with minimized Recovery Time Objective (RTO)<\/li>\n<\/ul>\n\n\n\n<p>This is not the end of benefits, so let me mention just a few more of them: plug and play deployment (no complex and time-consuming upfront hardware configuration); multi source and storage support; intuitive central management; <a href=\"https:\/\/xopero.com\/blog\/en\/advantages-of-automated-backups-for-organizations\/\">backup automation<\/a>; test, granular, full or instant restore; quick single-vendor support (in case of an issue, you avoid the common back-and-forth between backup software and NAS\/server vendors).<\/p>\n\n\n\n<p>Summarizing, if you\u2019re taking security and network backup of your critical business data seriously, and want to repel modern threats like ransomware, Xopero Unified Protection can be your best, highly secure, and virtually maintenance-free ally. Just schedule a demo with our specialist to see it in action.<\/p>\n\n\n<span class='mb-center maxbutton-5-center'><span class='maxbutton-5-container mb-container'><a class=\"maxbutton-5 maxbutton maxbutton-xup-umow-demo-en\" title=\"See Xopero Unified Protection in action!\" href=\"https:\/\/calendly.com\/m-hanulak-xopero\/xopero-live-demo\"><span class='mb-text'>Schedule demo<\/span><\/a><\/span><\/span>","protected":false},"excerpt":{"rendered":"<p>Many companies have been doing network backup (aka network share backup) the same way for ages (to be clear, \u2018ages\u2019 means something around 5 years in IT). An SMB share on Windows Server? An always-on NAS device on a local network? Sounds familiar? Read on to learn why these approaches are no longer enough and, most importantly, secure.<\/p>\n","protected":false},"author":15,"featured_media":8143,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,661],"tags":[],"class_list":["post-8157","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-backup-all-around","category-on-premises-en-en","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What\u2019s the most secure approach to network backup in 2025<\/title>\n<meta name=\"description\" content=\"Find out why well-established network backup options (SMB\/CIFS shares, NAS, etc.) are no longer enough to protect you against modern threats like ransomware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/safest-network-backup-option-in-2025\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What\u2019s the most secure approach to network backup in 2025\" \/>\n<meta property=\"og:description\" content=\"Find out why well-established network backup options (SMB\/CIFS shares, NAS, etc.) are no longer enough to protect you against modern threats like ransomware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/safest-network-backup-option-in-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-19T07:39:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-19T07:39:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2025\/12\/secure-network-backup-in-2025.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"\u0141ukasz Dydek, Technical Content Writer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"\u0141ukasz Dydek, Technical Content Writer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/safest-network-backup-option-in-2025\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/safest-network-backup-option-in-2025\\\/\"},\"author\":{\"name\":\"\u0141ukasz Dydek, Technical Content Writer\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/608de6d75eb1ac2a48799895263fc00d\"},\"headline\":\"Network Backup in 2025: Why Are SMB Shares and NAS Not Enough for Ransomware?\",\"datePublished\":\"2025-12-19T07:39:53+00:00\",\"dateModified\":\"2025-12-19T07:39:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/safest-network-backup-option-in-2025\\\/\"},\"wordCount\":1557,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/safest-network-backup-option-in-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/secure-network-backup-in-2025.png\",\"articleSection\":[\"100% backup\",\"On-premises\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/safest-network-backup-option-in-2025\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/safest-network-backup-option-in-2025\\\/\",\"name\":\"What\u2019s the most secure approach to network backup in 2025\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/safest-network-backup-option-in-2025\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/safest-network-backup-option-in-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/secure-network-backup-in-2025.png\",\"datePublished\":\"2025-12-19T07:39:53+00:00\",\"dateModified\":\"2025-12-19T07:39:54+00:00\",\"description\":\"Find out why well-established network backup options (SMB\\\/CIFS shares, NAS, etc.) are no longer enough to protect you against modern threats like ransomware.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/safest-network-backup-option-in-2025\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/safest-network-backup-option-in-2025\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/safest-network-backup-option-in-2025\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/secure-network-backup-in-2025.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/secure-network-backup-in-2025.png\",\"width\":1600,\"height\":900,\"caption\":\"Network Backup in 2025: Why Are SMB Shares and NAS Not Enough for Ransomware?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/safest-network-backup-option-in-2025\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network Backup in 2025: Why Are SMB Shares and NAS Not Enough for Ransomware?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/608de6d75eb1ac2a48799895263fc00d\",\"name\":\"\u0141ukasz Dydek, Technical Content Writer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Lukasz-dydek-technical-content-writer_avatar.jpg\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Lukasz-dydek-technical-content-writer_avatar.jpg\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Lukasz-dydek-technical-content-writer_avatar.jpg\",\"caption\":\"\u0141ukasz Dydek, Technical Content Writer\"},\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/lukasz-dydek\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What\u2019s the most secure approach to network backup in 2025","description":"Find out why well-established network backup options (SMB\/CIFS shares, NAS, etc.) are no longer enough to protect you against modern threats like ransomware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/safest-network-backup-option-in-2025\/","og_locale":"pl_PL","og_type":"article","og_title":"What\u2019s the most secure approach to network backup in 2025","og_description":"Find out why well-established network backup options (SMB\/CIFS shares, NAS, etc.) are no longer enough to protect you against modern threats like ransomware.","og_url":"https:\/\/xopero.com\/blog\/en\/safest-network-backup-option-in-2025\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2025-12-19T07:39:53+00:00","article_modified_time":"2025-12-19T07:39:54+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2025\/12\/secure-network-backup-in-2025.png","type":"image\/png"}],"author":"\u0141ukasz Dydek, Technical Content Writer","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"\u0141ukasz Dydek, Technical Content Writer","Szacowany czas czytania":"10 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/safest-network-backup-option-in-2025\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/safest-network-backup-option-in-2025\/"},"author":{"name":"\u0141ukasz Dydek, Technical Content Writer","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/608de6d75eb1ac2a48799895263fc00d"},"headline":"Network Backup in 2025: Why Are SMB Shares and NAS Not Enough for Ransomware?","datePublished":"2025-12-19T07:39:53+00:00","dateModified":"2025-12-19T07:39:54+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/safest-network-backup-option-in-2025\/"},"wordCount":1557,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/safest-network-backup-option-in-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2025\/12\/secure-network-backup-in-2025.png","articleSection":["100% backup","On-premises"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/safest-network-backup-option-in-2025\/","url":"https:\/\/xopero.com\/blog\/en\/safest-network-backup-option-in-2025\/","name":"What\u2019s the most secure approach to network backup in 2025","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/safest-network-backup-option-in-2025\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/safest-network-backup-option-in-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2025\/12\/secure-network-backup-in-2025.png","datePublished":"2025-12-19T07:39:53+00:00","dateModified":"2025-12-19T07:39:54+00:00","description":"Find out why well-established network backup options (SMB\/CIFS shares, NAS, etc.) are no longer enough to protect you against modern threats like ransomware.","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/safest-network-backup-option-in-2025\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/safest-network-backup-option-in-2025\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/safest-network-backup-option-in-2025\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2025\/12\/secure-network-backup-in-2025.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2025\/12\/secure-network-backup-in-2025.png","width":1600,"height":900,"caption":"Network Backup in 2025: Why Are SMB Shares and NAS Not Enough for Ransomware?"},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/safest-network-backup-option-in-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"Network Backup in 2025: Why Are SMB Shares and NAS Not Enough for Ransomware?"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/608de6d75eb1ac2a48799895263fc00d","name":"\u0141ukasz Dydek, Technical Content Writer","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2025\/09\/Lukasz-dydek-technical-content-writer_avatar.jpg","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2025\/09\/Lukasz-dydek-technical-content-writer_avatar.jpg","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2025\/09\/Lukasz-dydek-technical-content-writer_avatar.jpg","caption":"\u0141ukasz Dydek, Technical Content Writer"},"url":"https:\/\/xopero.com\/blog\/author\/lukasz-dydek\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/8157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=8157"}],"version-history":[{"count":3,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/8157\/revisions"}],"predecessor-version":[{"id":8167,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/8157\/revisions\/8167"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/8143"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=8157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=8157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=8157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}