What Is A Comprehensive Data Backup System?

We believe that there should be multiple levels of backup for all company data. When using modern backup, synchronization and virtualization tools, there is really no excuse for data loss, even small businesses can afford to have a robust backup platform. Having said that, we understand that every situation is different and all budgets are certainly not equal, but here are a few guidelines that we like to consider.

All servers should be backed up at a minimum of once per day with a copy of everything streaming to a secure off-site location.  Servers should be completely imaged, or better yet virtualized, to allow for easy restores or live fail-over to different hardware or even to a different location.

Desktop computers and laptops should also be imaged to minimize downtime when a hard drive fails, this way all updates, installed software, and drivers are preserved and ready to go with a simple restore.  There is no reason to have to rebuild a computer and reload everything from scratch just because a hard drive failed.

Laptops should also have a live file-backup running that will allow changed files to stream to the cloud while you are on the road, or out of the office.

At White Mountain, we make changing IT vendors EASY!

Thanks for visiting, we look forward to hearing from you.

Related Posts

Ransomware is One Problem that Leads to Many More

The Simple Fact is that Ransomware Hurts in Many Ways Let?s walk through what a modern ransomware attack might look like, acknowledging all the ways that the affected business would suffer as a result of the infection. A ransomware attack begins with an attacker reaching out and communicating with an intended victim as part of a phishing attack to gain access to said victim?s device or networ...

Browser Hijacking Attacks are a Serious Threat

Understanding Browser Hijacking Attacks Browser hijacking attacks involve the stealthy installation of malicious software onto a user's web browser. This malware can range from adware and spyware to more sophisticated forms like ransomware and keyloggers. The primary goal of these attacks is to gain unauthorized access to sensitive information or disrupt the user's browsing experience. Common Te...

Here are the Basics of the 3-2-1 Backup Rule

The 3-2-1 rule is a pretty standard reference for data backup and disaster recovery, but what does this rule actually entail? Today, we want to explain perhaps the most important concept to prolonging the life of your business, even in the face of difficult and trying circumstances. Explaining the 3-2-1 Rule In essence, the 3-2-1 rule references your backups, which are pivotal in your business...

Smishing: A Variety of Phishing Attacks Utilizing SMS

The Dangers of SMS Phishing, or ?Smishing? Ultimately, any plot carried out by a scammer that is trying to either pose as someone else or urge the user to do something particularly dangerous could be considered a phishing attack. This kind of definition goes beyond simple email scams, where you get a message in your inbox urging you to click on links or download infected attachments. There are ot...