As I understand it, the problem enterprises hit isn't the lack of backups or that backups are compromised. The problem seems to be that the restore process has stopped being scalable - restore of all enterprise data can take weeks or longer, and so paying the hacker is cheaper than doing the restore even though the restore would work.
Some companies I've worked for have "disaster recovery" drills periodically. Those should involve restoring backups. From that you should have a timeline of how long it takes to perform a restore.
If it takes weeks to perform a restore then that should be a major red flag and be addressed.
Of course, if a company has the kind of security that allows them to be hit by ransomware, then they probably aren't diligent about their disaster recovery scenarios.
obvious problem here is that most dont perform dr test across all systems simultaneously - they do it by major component, and usually have a working system.. ransomware can take down ALL of that, so you are left with bare metal recovery, and no infra to build off of.
That depends, with modern enterprise backup software it can be faster to recover that way than rely on the (sometimes slow) decryption software. This was the case with Colonial Pipeline for example, https://www.theregister.com/2021/05/13/colonial_pipeline_ran...