{"id":19830,"date":"2024-08-01T04:47:33","date_gmt":"2024-08-01T04:47:33","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=19830"},"modified":"2026-04-03T13:24:08","modified_gmt":"2026-04-03T13:24:08","slug":"the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia","title":{"rendered":"The Role of Backups in Cyber Security Frameworks and Cyber Insurance in Australia"},"content":{"rendered":"\n<p>In today&#8217;s digital age, the significance of robust cyber security measures cannot be overstated. Cyber threats are evolving rapidly, and organizations must stay vigilant to protect their sensitive data and systems. Backups play a crucial role in any cyber security framework, offering a safety net in the event of data breaches, ransomware attacks, or other cyber incidents.<\/p>\n\n\n\n<p>In a recent <a href=\"https:\/\/www.youtube.com\/watch?v=CSINItHfi9s\" target=\"_blank\" rel=\"noreferrer noopener\">technical webinar<\/a>, Wilson Nheu, CEO of BackupAssist, shed light on the role of backups in cyber security frameworks and cyber insurance in Australia. This blog delves into the key takeaways from the webinar.<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\">\n  <table style=\"border-collapse:collapse;border:none;width:100%;background:#d1dff1;border-radius:5px;\">\n    <tbody>\n      <tr>\n        <td style=\"width:9%;pading:30px;border-collapse:collapse;border:none;color:#282561;text-align:left;vertical-align:top;\"><br>\n          <img decoding=\"async\" src=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2022\/02\/tips.svg\">\n        <\/td>\n        <td style=\"width:91%;pading:30px;border-collapse:collapse;border:none;color:#282561;text-align:left;\"><br>\n          <b>Note:<\/b> While this article focuses on Australia\u2019s cyber security frameworks, it\u2019s worth noting that the US has the <a href=\"https:\/\/www.backupassist.com\/blog\/navigating-the-nist-framework-a-deep-dive-into-data-protection-and-backups\" target=\"_blank\" rel=\"noopener noreferrer\">NIST framework<\/a>, which shares some similarities with the Essential 8 but also has distinct differences in its approach and scope.\n          \n          <br><br>\n        <\/td>\n      <\/tr>\n    <\/tbody>\n  <\/table>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Understanding the Essential 8<\/h2>\n\n\n\n<p>The Australian Signals Directorate&#8217;s (ASD) Australian Cyber Security Centre (ACSC) has developed the <a href=\"https:\/\/www.cyber.gov.au\/resources-business-and-government\/essential-cyber-security\/essential-eight\" target=\"_blank\" rel=\"noreferrer noopener\">Essential 8<\/a>, a set of eight mitigation strategies to help organizations bolster their cyber security posture. These strategies are designed to protect against various cyber threats and are publicly available for free. The Essential 8 Maturity Model outlines four levels of maturity (0-3), with higher levels offering more comprehensive protection against complex cyber attacks.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2024\/08\/Essential-8.jpg\"><img decoding=\"async\" src=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2024\/08\/Essential-8.jpg\" alt=\"ACSC Essential 8\" class=\"wp-image-19830\"\/><\/a><\/figure><\/div>\n\n\n\n<p>While all eight strategies are vital, this blog focuses on the controls for <strong>regular backups<\/strong>, a cornerstone of any effective cyber security plan.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Controls for Regular Backups<\/h2>\n\n\n\n<p>The ACSC outlines 11 specific controls for regular backups, with the maturity level progressively increasing for each control. These 11 controls can be boiled down to:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li><strong>Perform and Retain Backups<\/strong>: Organizations should perform and <a href=\"https:\/\/www.backupassist.com\/blog\/data-archiving-and-retention-101-best-practices-with-backupassist\" target=\"_blank\" rel=\"noreferrer noopener\">retain<\/a> backups of data, applications, and settings according to business criticality and continuity requirements. This involves classifying data, determining recovery point objectives (RPO) and recovery time objectives (RTO), and deciding the frequency and retention period of backups.<\/li><li><strong>Synchronization<\/strong>: Backups should be synchronized to enable restoration to a common point in time. This is crucial for applications like databases, where related files must be restored together. Using point-in-time snapshots, such as VSS snapshots, ensures consistency across all files.<\/li><li><strong>Secure and Resilient Storage<\/strong>: Backups must be stored securely and resiliently. This includes using <a href=\"https:\/\/www.backupassist.com\/blog\/onsite-vs-offsite-backup-recovery-which-is-best-for-your-business\" target=\"_blank\" rel=\"noreferrer noopener\">offsite and offline backups<\/a>, ensuring reliable backup processes, encrypting backups at rest and in transit, and having quick access to backups when needed.<\/li><li><strong>Disaster Recovery Testing<\/strong>: The ACSC recommends full disaster recovery tests at least once a year, rather than simple file restore tests. However, we strongly recommend that you carry out more frequent, and better yet, <a href=\"https:\/\/www.backupassist.com\/blog\/non-negotiable-why-your-business-needs-an-automated-backup-test-plan\" target=\"_blank\" rel=\"noreferrer noopener\">automated testing<\/a> of your backups to ensure their reliability.<\/li><li><strong>Access Control<\/strong>: Backups should be protected from unauthorized access and modifications. Unprivileged accounts should not access or modify backups in order to meet maturity level 1 requirements. However, this control also needs to extend to privileged accounts for higher maturity levels to protect backups from more sophisticated cyber attacks.<\/li><li><strong>Immutable Storage<\/strong>: Implementing immutable storage solutions can prevent the modification or deletion of backups during their retention period. This adds an extra layer of security, ensuring data integrity even if the backup administrator account is compromised.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Cyber Insurance and Backups<\/h2>\n\n\n\n<p>As cyber threats increase, so does the importance of cyber insurance. In Australia, the cyber insurance market is expanding rapidly, with a growth rate of approximately 20% year-over-year. However, only about 20% of SMEs currently have cyber insurance, highlighting a significant gap in coverage.<\/p>\n\n\n\n<p>Cyber insurance provides financial protection against losses resulting from cyber incidents, including data breaches, ransomware attacks, and business interruptions. Insurers typically assess an organization&#8217;s risk exposure through detailed questionnaires, focusing on various aspects of cyber security, including backup practices.<\/p>\n\n\n\n<p>Some key questions related to backups in cyber insurance assessments include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Do you regularly back up all sensitive and critical data?<\/li><li>Are backups stored offline and offsite to protect against network-based attacks?<\/li><li>Do you have a comprehensive disaster recovery plan, and is it tested annually?<\/li><\/ul>\n\n\n\n<p>Effective backup practices not only enhance an organization&#8217;s cyber security posture but also influence their cyber insurance premiums. Organizations with robust backup strategies are perceived as lower risk, potentially leading to lower insurance costs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>The webinar by Wilson Nheu underscored the pivotal role of backups in cyber security frameworks and cyber insurance. By adopting the ACSC&#8217;s Essential 8 strategies, organizations can significantly improve their resilience against cyber threats. Regular, secure, and well-tested backups are critical components of a robust cyber security plan. Additionally, these practices can positively impact an organization&#8217;s eligibility for cyber insurance and reduce premiums.<\/p>\n\n\n\n<p>In an era where cyber threats are increasingly sophisticated, investing in effective backup solutions and adhering to <a href=\"https:\/\/www.backupassist.com\/blog\/top-cybersecurity-resources-for-smes-a-guide-to-global-agencies\" target=\"_blank\" rel=\"noreferrer noopener\">established cyber security frameworks<\/a> is not just advisable but essential. As the cyber landscape continues to evolve, staying informed and proactive in implementing best practices will be key to safeguarding digital assets and ensuring business continuity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover the crucial role of backups in cyber security frameworks and cyber insurance in Australia. Learn how implementing the ACSC&#8217;s Essential 8 strategies can enhance your protection against cyber threats and reduce insurance premiums.<\/p>\n","protected":false},"author":22,"featured_media":19831,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[757],"tags":[],"class_list":["post-19830","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-resilience"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Role of Backups in Cyber Security Frameworks and Cyber Insurance in Australia<\/title>\n<meta name=\"description\" content=\"Learn why backups are vital for cyber frameworks and insurance in Australia. See how ACSC Essential 8 boosts protection and can lower premiums.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Role of Backups in Cyber Security Frameworks and Cyber Insurance in Australia\" \/>\n<meta property=\"og:description\" content=\"Learn why backups are vital for cyber frameworks and insurance in Australia. See how ACSC Essential 8 boosts protection and can lower premiums.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-01T04:47:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-03T13:24:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/08\/shutterstock_2289818675.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Wilson Nheu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wilson Nheu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia\"},\"author\":{\"name\":\"Wilson Nheu\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db\"},\"headline\":\"The Role of Backups in Cyber Security Frameworks and Cyber Insurance in Australia\",\"datePublished\":\"2024-08-01T04:47:33+00:00\",\"dateModified\":\"2026-04-03T13:24:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia\"},\"wordCount\":793,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/08\/shutterstock_2289818675.jpg\",\"articleSection\":[\"Cyber Resilience\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia\",\"url\":\"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia\",\"name\":\"The Role of Backups in Cyber Security Frameworks and Cyber Insurance in Australia\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/08\/shutterstock_2289818675.jpg\",\"datePublished\":\"2024-08-01T04:47:33+00:00\",\"dateModified\":\"2026-04-03T13:24:08+00:00\",\"description\":\"Learn why backups are vital for cyber frameworks and insurance in Australia. See how ACSC Essential 8 boosts protection and can lower premiums.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/08\/shutterstock_2289818675.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/08\/shutterstock_2289818675.jpg\",\"width\":1000,\"height\":343},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Role of Backups in Cyber Security Frameworks and Cyber Insurance in Australia\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db\",\"name\":\"Wilson Nheu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g\",\"caption\":\"Wilson Nheu\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/wilson-nheu\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Role of Backups in Cyber Security Frameworks and Cyber Insurance in Australia","description":"Learn why backups are vital for cyber frameworks and insurance in Australia. See how ACSC Essential 8 boosts protection and can lower premiums.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia","og_locale":"en_US","og_type":"article","og_title":"The Role of Backups in Cyber Security Frameworks and Cyber Insurance in Australia","og_description":"Learn why backups are vital for cyber frameworks and insurance in Australia. See how ACSC Essential 8 boosts protection and can lower premiums.","og_url":"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia","og_site_name":"Cyber Resilience Blog","article_published_time":"2024-08-01T04:47:33+00:00","article_modified_time":"2026-04-03T13:24:08+00:00","og_image":[{"width":1000,"height":343,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/08\/shutterstock_2289818675.jpg","type":"image\/jpeg"}],"author":"Wilson Nheu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Wilson Nheu","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia"},"author":{"name":"Wilson Nheu","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db"},"headline":"The Role of Backups in Cyber Security Frameworks and Cyber Insurance in Australia","datePublished":"2024-08-01T04:47:33+00:00","dateModified":"2026-04-03T13:24:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia"},"wordCount":793,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/08\/shutterstock_2289818675.jpg","articleSection":["Cyber Resilience"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia","url":"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia","name":"The Role of Backups in Cyber Security Frameworks and Cyber Insurance in Australia","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/08\/shutterstock_2289818675.jpg","datePublished":"2024-08-01T04:47:33+00:00","dateModified":"2026-04-03T13:24:08+00:00","description":"Learn why backups are vital for cyber frameworks and insurance in Australia. See how ACSC Essential 8 boosts protection and can lower premiums.","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/08\/shutterstock_2289818675.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2024\/08\/shutterstock_2289818675.jpg","width":1000,"height":343},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/the-role-of-backups-in-cyber-security-frameworks-and-cyber-insurance-in-australia#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"The Role of Backups in Cyber Security Frameworks and Cyber Insurance in Australia"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/b7ec1c439b77d74950adc3fe89b037db","name":"Wilson Nheu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a5077f2ff9a78cfc256564406460cb41f9b18984bfaec0e938e9a5e26c9eb392?s=96&d=mm&r=g","caption":"Wilson Nheu"},"url":"https:\/\/www.backupassist.com\/blog\/author\/wilson-nheu"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/19830","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=19830"}],"version-history":[{"count":1,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/19830\/revisions"}],"predecessor-version":[{"id":19832,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/19830\/revisions\/19832"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/19831"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=19830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=19830"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=19830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}