Most business owners say the same thing when we ask about their backups: "Yeah, we have something set up." When we ask the follow-up — "When was the last time someone tested a restore?" — the room usually goes quiet.
That silence is the gap between having a backup and being able to recover. And it's the gap that costs businesses everything when ransomware hits.
This Isn't Hypothetical
In August 2019, a ransomware attack hit PerCSoft, the company behind a dental records backup product called DDS Safe. The irony was brutal: DDS Safe was specifically marketed as ransomware protection. When the attack landed, roughly 400 dental practices across the country lost access to patient records, X-rays, appointment schedules, and payment ledgers simultaneously. Some couldn't process payroll. The average downtime was nearly ten days per practice.
Some of those practices never fully recovered their data — even after the ransom was paid and decryption keys were delivered. The decryptors simply didn't work for every file.
These aren't outliers. The FBI issued a direct warning to dental associations in May 2024 about active threats specifically targeting practices. A University of Florida study published in JAMA Health Forum found that ransomware attacks on healthcare organizations more than doubled between 2016 and 2021, exposing nearly 42 million patients' records.
And it's not just healthcare. The Florida Bar Association reported that 27% of law firms experienced a security breach in 2022, with another 25% admitting they didn't even know whether they'd been breached.
Three Questions Every Business Owner Should Ask
You don't need to understand encryption algorithms or network architecture. You need honest answers to three questions:
1. When was the last time someone tested a restore from your backups?
A backup that hasn't been tested is a hope, not a plan. Files corrupt. Configurations drift. Backup jobs fail silently. The only way to know your backups work is to restore from them on a regular schedule and verify the data matches. If your answer is "I'm not sure" or "never," you don't have a backup strategy — you have a liability.
2. Could you show documentation of backup verification to a regulator or auditor today?
If you're in healthcare, HIPAA doesn't just require backups — it requires proof that they work. If you're a law firm, your malpractice insurer may ask the same question. An accounting firm handling client financials has similar exposure. "We set it up a while ago" doesn't satisfy any of these requirements. You need dated records showing that data was backed up, that a restore was tested, and that the restored data matched the original.
3. If ransomware hit your systems right now, what's your actual recovery plan?
Not the theoretical plan. The real one. Who do you call? Where is the backup? How long until you're operational? If the backup is stored on the same network that got encrypted, it's gone too. If the backup is in the cloud but you've never actually restored from it, you're about to learn whether it works under the worst possible conditions.
The Difference Between Backup and Recovery
The businesses that survive ransomware share one thing in common: they had verified, tested, isolated backups that someone had actually restored from before the crisis hit.
A Pennsylvania dental practice was hit by ransomware in early 2025. Hackers encrypted their files, stole patient data, and issued a ransom demand. The practice didn't pay. They restored from backups and were operational within days. That outcome wasn't luck — it was preparation.
Compare that to the 400 practices that trusted DDS Safe, or the Indiana practice that spent two years pretending nothing happened. The difference is verification. Someone had tested those backups. Someone knew they worked. When the worst happened, recovery was a process, not a prayer.
What "Backup-Proof" Actually Looks Like
A backup strategy that actually protects your business has a few non-negotiable elements: your data is encrypted before it leaves your machine. It's stored in at least two physically separate locations. Restores are tested on a regular schedule — weekly is ideal — and the results are documented. If something fails, someone is notified immediately, not the next time they happen to check.
That's what managed data protection means. Not software you install and forget. Not a cloud service you signed up for three years ago. An active, verified, documented system that someone is watching.
Join Our Early Access List
Find out if your backups actually work — before you need them. No sales pitch, no obligation. Just honest answers about your current setup.