Backup Basics

Backup Basics Guide

If the content is King, then data is Queen! If you want to know how you can protect your data in a more secure way, You’re at the right place. Read about the Backup Basics Guide, one way to protect your data.

There should be three copies of any data you really care about. If it’s critical data, loss of which would cause you to lose business, financial documents, photos etc.

The 3–2–1 broken down to the basics is

(1) Your active copy that you’re using on your computer.

(2) An on-site backup copy (usually external hdd).

(3) An off-site backup copy(usually cloud backup).

Let’s go through the pros and cons of local and cloud backups though you should be using both.

Pros of Local (Backup):

Fast to recover from and fast to backup to and recover from

Independent of internet speed, availbility, and stability.

Cons of Local (Backup):

Vulnerable to the same issues as the computer, it’s backing up; Such as in the event of theft, fire, flood general drive failures, viruses.

Pros of Cloud (Backup):

Cloud is not affected by any of these physical issues, in addition, cloud backup isn’t prone to viruses, etc.

Proper versioning and file history so if you change or delete a file and you need back the version before it.

Cons of Cloud (backup):

On the other hand, backing up and recovering all the data from the cloud can take time and depends on network stability in case of a catastrophic failure, so for individuals or business where full quick recovery is essential local is necessary too.

Options

Local Backup Is usually some form of external hard drive or flash drive. The tool I use is Syncback Pro though there are many other options like Microsoft Synctoy. Synctoy tutorial and Syncback Tutorial

For cloud backup I recommend Backblaze. Heres their guide.

--

--

--

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

9 ways to stay safe from cyberattacks

Retrospective Roadmap: Q4

{UPDATE} Wallpop! Hack Free Resources Generator

Signature and Encryption Options for OAuth 2.0 and OIDC — part 1

Threat Intelligence is Dead

{UPDATE} 雑学キング-暇つぶし知識クイズ- Hack Free Resources Generator

New Features in OpenRMF Professional 2.3

4 Ways to Protect Against Social Engineering Attacks

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Avrohom Gross

Avrohom Gross

More from Medium

Wool Event #2

It’s time to get excited about Chris Wilder’s Middlesbrough