Having had a good year (so far) experience of direct ransomware attacks and DRs, ransomware can only spread to mapped drives and the current users profile who is the victim - it is a myth that it can spread anywhere on the network and people need to understand how it works.
The reg keys and scripts it runs basically just searches for mapped drives and in alphabetical order e.g. C:, D:, O:, U: encrypts the data (if the victim user has permission to files in the locations).
Also to note - If the encryption is say at D: and you take it off the network (internet) it will stop encrypting as it cannot speak to the C&C (attackers server). Although normally you wont know until its finished encrypting, unless its a large amount of data.
So its safe to have AND should have network backups as long as they are not mapped!
A safe option for file servers is to use DFS, as its architecture does not use mapped drives, instead it centralizes shared folders (from any network location) and shares them via a root location.
There are alot of benefits with DFS (might be worth reading up on it) Main simple benefit is, you do not need to update anything on any end user each time you rename the shared folders.
unfortunately we have old file server still we have not migrated yet to our DFS and still have mapped drives.