We have developed a backup security standard to keep backups safe from attackers who will look to compromise them in a ransomware attack. We built our standard with the assumption that the network will be breached and that the attackers will obtain admin rights. Therefore, we completely segregate the backups from the network and put in place their own authentication. Our offsite backups also have ransomware protection built-in which allows for recovery if ever they were to be deleted. Our backup standard withstood penetration testing by multiple specialized security firms. We adapt our backup security standards constantly as the attackers change their tactics.