{"id":14666,"date":"2019-12-22T02:24:46","date_gmt":"2019-12-22T02:24:46","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=14666"},"modified":"2026-04-03T07:50:22","modified_gmt":"2026-04-03T07:50:22","slug":"what-is-cyber-resilience-for-sme","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme","title":{"rendered":"What is Cyber-Resilience for SMEs in 2020?"},"content":{"rendered":"\n<p>There are many definitions online &#8211; most of which are just too complex to understand. We prefer simplicity. At BackupAssist, we define cyber-resilience as \u201c<strong>an organization\u2019s ability to recover from an adverse cyber-event<\/strong>\u201d. <\/p>\n\n\n\n<p>Put simply&#8230; <strong>You get cyber-punched. You can get back up on your feet.<\/strong><\/p>\n\n\n\n<p>Why is it so important? Almost every organization in the\nworld relies on computer systems to function. And today, there are more ways\nthese systems can be hacked, sabotaged, and otherwise \u201cknocked offline\u201d in ways\nthat threaten our survival.<\/p>\n\n\n\n<p>Every business owner must have a plan for cyber-resilience, or risk one of the following outcomes:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Being forced out of business.<\/li><li>Having to pay a hefty ransom to cyber criminals.<\/li><li>Breaking regulatory requirements, which in turn may result in financial penalties which threaten the viability of the company, or turn into personal liabilities against the company directors.<\/li><\/ol>\n\n\n\n<p>In this blog, I\u2019ll cover Part 1 of this topic in <strong>plain\nEnglish<\/strong> so anyone can understand it: the basics of cyber-resilience in plain\nEnglish, what it is, and why it\u2019s important.<\/p>\n\n\n\n<p>Then in a future blog, I\u2019ll explain the \u201chow to\u201d.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Resilience in people \u2013 and how it relates to cyber<\/h2>\n\n\n\n<p class=\"has-text-align-center\"><em>\u201cTough times never last, but tough people do!\u201d \u2013 Robert H. Schuller<\/em><\/p>\n\n\n\n<p>I\u2019m sure we all know resilient people. It\u2019s a sports person\nwho suffered an injury, only to come back. It\u2019s a friend who got cancer, beat\nit and enjoys life more than ever before. A person who got crushed by a\ndivorce, only to find love and fulfilment later in life.<\/p>\n\n\n\n<p>There\u2019s one thing in common amongst all:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>They suffered an adverse event.<\/li><li>They bounced back \u2013 often stronger.<\/li><\/ol>\n\n\n\n<p>Cyber-resilience is the same\u2026 but different. Both involve being able to recover from an adverse event, but the <strong>how to<\/strong> is different. Personal resilience is all about how we deal with the situation <strong>after<\/strong> the event, focusing on personal attributes and how we react to the situation. In contrast, cyber-resilience depends largely on forward planning <strong>before<\/strong> the event, and following the plan during the emergency.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Personal resilience \u2013 how?<\/td><td>Cyber-resilience \u2013 how?<\/td><\/tr><tr><td> Positive attitude<br> Will power and mental fortitude<br> Courage <\/td><td> Risk identification and mitigation planning<br> The right backup system<br> Response plan and practice runs <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What are the risks \u2013 the adverse cyber events?<\/h2>\n\n\n\n<p>Let\u2019s be clear about the risks. There are <strong>many<\/strong> ways\nthat your I.T. infrastructure or data can be sabotaged or knocked offline. Here\nare some common ones:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Hacking, ransomware and other forms of cyber\nattack.<\/li><li>Physical destruction \u2013 such as fire, flood,\nearthquake.<\/li><li>Theft of equipment.<\/li><li>Hardware failures.<\/li><li>User deletions \u2013 whether accidentally, or\nintentionally (sabotage).<\/li><\/ol>\n\n\n\n<p>In our experience, the most common causes are accidental user deletions, ransomware and (in the last few years especially), hacking.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cyber-resilience measures the outcome \u2013 not the method<\/h2>\n\n\n\n<p>I personally love the term \u201ccyber-resilience\u201d because it\u2019s\nso richly descriptive and self-evident. It focuses you on the outcome, not the\nmethod.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Can you recover?<\/li><li>How quickly will you recover?<\/li><li>What will your loss be?<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">The consequences and costs of not being cyber-resilient<\/h2>\n\n\n\n<p>Here are three examples of the ramifications of not being cyber-resilient.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Ransom paid to cyber criminals<\/h3>\n\n\n\n<p>An engineering consulting company suffers a hacking penetration, where the hackers installed ransomware on the file server, which encrypts all data files and backups. The ransom is $180,000. With many projects currently in-progress, and payments from customers contingent on achieving future milestones, the company faces a cashflow crunch. If work is delayed, incoming cash will be delayed, while outgoings remain constant. The company will become insolvent within 2 weeks. To avoid this, the company pays the ransom as the \u201clessor of two evils\u201d.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Financial losses due to legal non-compliance<\/h3>\n\n\n\n<p>A private medical research firm takes advantage of tax concessions offered by the country\u2019s taxation office for performing Research and Development. As part of the company directors\u2019 obligations, stipulated records must be kept for 7 years to substantiate the company\u2019s concession claims. Records were kept on an on-premise file server, largely for security reasons as the I.T. director did not want to put patentable technologies in the cloud. Due to a fire, the on-premise servers are destroyed, and offsite backups were not performed so data was lost permanently. Two years later, the tax office issues a crackdown on claims, demanding supporting evidence, which the company is not able to provide. The claims are denied by the tax office, and back payments of tax are demanded. Unable to pay, the company is shut down. The tax office then takes legal action against the directors for the outstanding tax liability.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Forced out of business<\/h3>\n\n\n\n<p>A marketing company makes money from its list, which it built organically over 5 years. A disgruntled employee resigns and on his last day at work, deletes the list from the various cloud services and purges them. The cloud provider is unable to restore the data and denies responsibility because the action was performed by an authorized employee of the company. Now, unable to make incoming cashflow, but with payroll and fixed outgoings, the company is forced out of business. Although the employee is criminally prosecuted, the company nonetheless itself ceases to trade, all employees are laid off and 5 years of hard work by the founding entrepreneur goes to waste.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Other consequences &#8211; stress, loss of reputation, breaking of trust, consequential damages<\/h3>\n\n\n\n<p>Of course we haven&#8217;t considered the emotional anguish associated with the prospect of being wiped out due to a cyber event. Who can quantify the health issues due to stress that result &#8211; or the flow-on effects like broken businesses and broken relationships? <\/p>\n\n\n\n<p>Loss of reputation and the shattering of trust with customers may cause future lost business. In the worst case, if the business is unable to deliver previously promised services or products due to poor cyber-resilience, it may be liable for consequential damages, which adds insult to injury.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Stay tuned for Part 2 of this discussion on cyber resilience\u2026<\/h2>\n\n\n\n<p>Now that I\u2019ve covered the basics of cyber-resilience, we can move onto the nuts and bolts of how to be cyber-resilient. Please stay tuned for my next blog post on this subject!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber-resilience is \u201can organization\u2019s ability to recover from an adverse cyber-event\u201d. How well can you recover from hacking, ransomware, natural disasters?<\/p>\n","protected":false},"author":2,"featured_media":14677,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[757,1],"tags":[],"class_list":["post-14666","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-resilience","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Cyber-Resilience for SMEs in 2020? - Cyber Resilience Blog<\/title>\n<meta name=\"description\" content=\"What is cyber resilience? It&#039;s an organization\u2019s ability to survive and recover from an adverse cyber-event. Here we discuss the risks and consequences.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Cyber-Resilience for SMEs in 2020? - Cyber Resilience Blog\" \/>\n<meta property=\"og:description\" content=\"What is cyber resilience? It&#039;s an organization\u2019s ability to survive and recover from an adverse cyber-event. Here we discuss the risks and consequences.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-22T02:24:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-03T07:50:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/shutterstock_1452352298.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"679\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Linus Chang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linus Chang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme\"},\"author\":{\"name\":\"Linus Chang\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3\"},\"headline\":\"What is Cyber-Resilience for SMEs in 2020?\",\"datePublished\":\"2019-12-22T02:24:46+00:00\",\"dateModified\":\"2026-04-03T07:50:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme\"},\"wordCount\":1023,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/shutterstock_1452352298.jpg\",\"articleSection\":[\"Cyber Resilience\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme\",\"url\":\"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme\",\"name\":\"What is Cyber-Resilience for SMEs in 2020? - Cyber Resilience Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/shutterstock_1452352298.jpg\",\"datePublished\":\"2019-12-22T02:24:46+00:00\",\"dateModified\":\"2026-04-03T07:50:22+00:00\",\"description\":\"What is cyber resilience? It's an organization\u2019s ability to survive and recover from an adverse cyber-event. Here we discuss the risks and consequences.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/shutterstock_1452352298.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/shutterstock_1452352298.jpg\",\"width\":1500,\"height\":679},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Cyber-Resilience for SMEs in 2020?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3\",\"name\":\"Linus Chang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g\",\"caption\":\"Linus Chang\"},\"description\":\"*Founder &amp; Creator, BackupAssist* Linus Chang has been writing software since he was eight years old. He founded BackupAssist in 2002 \u2014 making him one of the longest-standing voices in Windows backup and data protection \u2014 and has spent the decades since talking to IT administrators around the world about what actually goes wrong, and why. His interest in data loss isn't abstract. Early in his career, he was working at the Monash University help desk when a student came in with a floppy disk that wouldn't read. They tried everything. None of their drives could read it either. The disk held her entire PhD dissertation \u2014 years of work \u2014 and it was the only copy. She broke down in tears. There was nothing he could do. Five years later, he wrote the first version of BackupAssist. Linus holds a Bachelor of Science in Computer Science and has held Microsoft Certified Solution Developer and Sun Certified Java Programmer credentials. More recently, he has completed digital forensics and cyber-security courses through the Black Hat Conference. He has spoken on information security and cryptography at Infosecurity Europe, addressed politicians and policymakers at Australian Parliament House, presented to SMB IT administrators at the IT Pro Experts Conference, and served as a guest lecturer to Cyber Security master's students at the University of Melbourne. On this blog, Linus writes about backup strategy and the technical side of cyber-resilience \u2014 drawing on 24 years of product development and direct conversation with the IT professionals BackupAssist is built for. [Connect with Linus on LinkedIn](https:\/\/www.linkedin.com\/in\/linuschang\/)\",\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/linus-chang\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Cyber-Resilience for SMEs in 2020? - Cyber Resilience Blog","description":"What is cyber resilience? It's an organization\u2019s ability to survive and recover from an adverse cyber-event. Here we discuss the risks and consequences.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme","og_locale":"en_US","og_type":"article","og_title":"What is Cyber-Resilience for SMEs in 2020? - Cyber Resilience Blog","og_description":"What is cyber resilience? It's an organization\u2019s ability to survive and recover from an adverse cyber-event. Here we discuss the risks and consequences.","og_url":"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme","og_site_name":"Cyber Resilience Blog","article_published_time":"2019-12-22T02:24:46+00:00","article_modified_time":"2026-04-03T07:50:22+00:00","og_image":[{"width":1500,"height":679,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/shutterstock_1452352298.jpg","type":"image\/jpeg"}],"author":"Linus Chang","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Linus Chang","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme"},"author":{"name":"Linus Chang","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3"},"headline":"What is Cyber-Resilience for SMEs in 2020?","datePublished":"2019-12-22T02:24:46+00:00","dateModified":"2026-04-03T07:50:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme"},"wordCount":1023,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/shutterstock_1452352298.jpg","articleSection":["Cyber Resilience"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme","url":"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme","name":"What is Cyber-Resilience for SMEs in 2020? - Cyber Resilience Blog","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/shutterstock_1452352298.jpg","datePublished":"2019-12-22T02:24:46+00:00","dateModified":"2026-04-03T07:50:22+00:00","description":"What is cyber resilience? It's an organization\u2019s ability to survive and recover from an adverse cyber-event. Here we discuss the risks and consequences.","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/shutterstock_1452352298.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/shutterstock_1452352298.jpg","width":1500,"height":679},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/what-is-cyber-resilience-for-sme#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"What is Cyber-Resilience for SMEs in 2020?"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3","name":"Linus Chang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g","caption":"Linus Chang"},"description":"*Founder &amp; Creator, BackupAssist* Linus Chang has been writing software since he was eight years old. He founded BackupAssist in 2002 \u2014 making him one of the longest-standing voices in Windows backup and data protection \u2014 and has spent the decades since talking to IT administrators around the world about what actually goes wrong, and why. His interest in data loss isn't abstract. Early in his career, he was working at the Monash University help desk when a student came in with a floppy disk that wouldn't read. They tried everything. None of their drives could read it either. The disk held her entire PhD dissertation \u2014 years of work \u2014 and it was the only copy. She broke down in tears. There was nothing he could do. Five years later, he wrote the first version of BackupAssist. Linus holds a Bachelor of Science in Computer Science and has held Microsoft Certified Solution Developer and Sun Certified Java Programmer credentials. More recently, he has completed digital forensics and cyber-security courses through the Black Hat Conference. He has spoken on information security and cryptography at Infosecurity Europe, addressed politicians and policymakers at Australian Parliament House, presented to SMB IT administrators at the IT Pro Experts Conference, and served as a guest lecturer to Cyber Security master's students at the University of Melbourne. On this blog, Linus writes about backup strategy and the technical side of cyber-resilience \u2014 drawing on 24 years of product development and direct conversation with the IT professionals BackupAssist is built for. [Connect with Linus on LinkedIn](https:\/\/www.linkedin.com\/in\/linuschang\/)","url":"https:\/\/www.backupassist.com\/blog\/author\/linus-chang"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/14666","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=14666"}],"version-history":[{"count":13,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/14666\/revisions"}],"predecessor-version":[{"id":20215,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/14666\/revisions\/20215"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/14677"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=14666"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=14666"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=14666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}