Cybercrime and a good database backup strategy
It’s Friday afternoon, your database is unavailable, and you need to perform an urgent recovery. You rely on your backup system, but at the critical moment it turns out you can’t access your backup files without the proper access to the third-party software. Oops! This scenario recently happened to one of our customers, for whom we had to carry out an emergency restore. The key question that arose from this: are SQL native backups or third-party tools better?
As a database specialist, you regularly face complex choices. Often, it comes down to the balance between internal control and external support. Do you choose the built-in functionality of SQL Server, or do you opt for the extensive capabilities of third parties? The decision is not black and white and depends on your specific situation. In this blog, Tino Dudink explains how to choose the right backup strategy for your SQL Server environment and why a hybrid approach is often the best card to play.
The native backup functionality of SQL Server has been around for years and has proven itself as a reliable method. As a DBA, I like this approach because I know exactly what is happening, with no surprises.
With SQL native backups, you get full control over the backup and restore process within SQL Server itself, without relying on external tools. This offers three major advantages:
For many database experts, this feels familiar. They know exactly where they stand and can manage, monitor, and test their entire backup chain with T-SQL scripts. In emergencies, you want to rely on something you know inside out.
However, there is also a drawback to keep in mind:
Vulnerability to ransomware: Because native backups are often stored on local or directly accessible storage, they are at risk of being encrypted as well if the SQL Server itself is compromised. (Thomas has already written a blog about that)
Although native backups have proven their value, third-party backup solutions have become an indispensable part of the modern IT landscape. Over the past years, they have matured and especially in complex or hybrid environments they offer significant advantages:
If encryption or deduplication weighs heavily in your decision, third-party tools can make the difference. Many solutions offer advanced capabilities in this area.
But beware: always test your restore! Encryption and deduplication are fantastic—until you can’t get the backup file out of its “wrapper” without the right software version or license.
An important aspect in the context of risk mitigation is the physical and logical separation of backup data. SQL native backups are often stored locally or on directly accessible shares. In the event of a ransomware attack on the SQL Server, this creates the risk that backup files will also be encrypted. Third-party backups, on the other hand, are managed via a separate application layer and stored externally, making them far less vulnerable to attacks on your primary environment. This isolation makes them a valuable line of defense in your backup strategy. We’ve written a blog about this before: Protect yourself against cybercrime with a solid backup strategy.
An important but often forgotten point in this discussion is cost—specifically licensing costs and scalability.
SQL Native Backup is included in the SQL Server license and requires no additional software or agents. You only need infrastructure to store backups, such as NAS, file shares, or blob storage – flexible and affordable.
Third-party backup tools, on the other hand, come with license costs per server or database, often supplemented with maintenance, support contracts, and costly restore options.
For large SQL environments, such as SaaS platforms or healthcare institutions, these costs can add up quickly. In addition, some functionalities (such as point-in-time restore or log shipping) are often only available natively, unless you opt for the expensive enterprise tier of the third-party vendor.
The real pain usually isn’t in the backup, but in the restore.
Third-party tools use their own methods to create and store backups. This means that for a restore, you are always dependent on that specific software. No access to the user interface or agent? No restore. License expired? No restore.
In the recent incident I mentioned in the introduction, we saw this scenario in action. The backup existed, but retrieving the correct version was not straightforward. SQL native backups are easier to verify with RESTORE VERIFYONLY or through a test restore. That gives you certainty at the moment you need it most.
Fortunately, you don’t necessarily have to choose between one or the other. For several customers, we have set up a hybrid strategy:
This approach provides the best of both worlds: protection against complete system failure or a ransomware attack and maximum control in normal operational recovery actions.
After years of experience with both strategies, I’d like to share six practical tips:
The choice between SQL native backup and third-party tools is not a matter of belief. It’s a trade-off between risk, management effort, cost, and availability. What happened to our customer was an important reminder: trust in technology is good, but control is better.
If you want a solid backup strategy, start with your restore requirements. Don’t be tempted into choosing one or the other, but design a combination that is robust, tested, and cost-efficient for your organization.
My colleague Harry already wrote a blog about this and emphasized the importance of regular testing: “Making a backup is one thing, but knowing that you can actually use it to restore data is a completely different story.”
Because in the heat of the moment, when the system goes down or ransomware strikes, you only want one thing: Restore. Now. And without surprises.
Do you want an objective look at your current backup strategy? Or do you need a comprehensive restore test to verify if your data is truly safe? Get in touch for a no-obligation consultation. We’ll be happy to help you optimize your database security before something goes wrong.