There are two possible scenarios where hackers could ask for ransom:
Scenario 1: Your app (e.g. Asana) account gets hacked and encrypted
In this case you would be able to recover and restore your data from the data backups. that Pro Backup backs up, scrambles and stores a separate versions of each backup cycle, you would be able to restore your data from the data backups.
Scenario 2: Pro Backup gets hacked and the hackers want to encrypt all the raw files
This scenario is covered by the following 3 measures.
We have a very tight access control to the raw backed up data. None of the developers, nor C-suite level members have access to it.
The raw data backups can only be accesses by the backup servers themselves. These servers are heavily monitored and rate limited. In case of any strange behaviour, the server will shut down immediately. This makes it impossible to perform bulk actions on the database.
Our AWS buckets are setup to add new revisions in case of same filenames instead of overwriting them. Allowing us to consume a previous sane revision rather than the corrupted data.