According to Aron Brand, CTO, Ctera Networks, Ltd., “Effective protection must meet two critical requirements: it must retain previous versions of your files for a specific retention period (minimum of 30 days) where those files must be in a read-only repository so they cannot be deleted by a malicious software. And the archived copy must be physically separated from the main copy.”