In the case of backu s made to media such as a or SAN NAS access to such a backu is on y oca when we have access to such media. It is a so worth noting that the network drive may be at risk due to events such as fire f ooding or theft so it is better for the backu to be made to a safe ocation which is certain y a data center. On the other hand o onents of the conce t of sending data to the c oud inc uding backu co ies often cite the argument that such data is ess secured than if it were to be stored on a server in a com any's oca data center.
Concerns are a so raised about the fact that the c oud service rovider may have insight into this data as we as about the security of data transfer Phone Number List to the c oud and between the rovider's servers. In the case of a backu made using the C oud Backu a ication the user receives severa additiona eve s of data rotection. First of a the backu is encry ted what's more cry togra hic a gorithms come into action even before the backu is sent to the nazwa. server and saved there. This im roves the security of both the co y itse f and the data transfer rocess.

Second y co ies are made ve the com uter user and access to them is avai ab e from anywhere with access to the Internet. It is worth adding that C oud Backu su orts the AES encry tion a gorithm which in ractice makes encry ted archives com ete y resistant to attacks. In this context it is worth mentioning that ast year the Ministry of Digitization inc uded nazwa. on the ist of o erators of key services for o and's cybersecurity. The com any o erator of a key service is ob iged to im ement and maintain state of the art technica and organizationa measures to maintain com iance with the requirements of the Cybersecurity Act and thus rovide customers with the highest eve of services rovided. The se ection of s ecific backu so utions is an individua decision for each com any.