How to achieve complete data protection with invisible backups