What Is A Comprehensive Data Backup System?

We believe that there should be multiple levels of backup for all company data. When using modern backup, synchronization and virtualization tools, there is really no excuse for data loss, even small businesses can afford to have a robust backup platform. Having said that, we understand that every situation is different and all budgets are certainly not equal, but here are a few guidelines that we like to consider.

All servers should be backed up at a minimum of once per day with a copy of everything streaming to a secure off-site location.  Servers should be completely imaged, or better yet virtualized, to allow for easy restores or live fail-over to different hardware or even to a different location.

Desktop computers and laptops should also be imaged to minimize downtime when a hard drive fails, this way all updates, installed software, and drivers are preserved and ready to go with a simple restore.  There is no reason to have to rebuild a computer and reload everything from scratch just because a hard drive failed.

Laptops should also have a live file-backup running that will allow changed files to stream to the cloud while you are on the road, or out of the office.

At White Mountain, we make changing IT vendors EASY!

Thanks for visiting, we look forward to hearing from you.

Related Posts

Insurance Companies Are Asking My Business About Its Cybersecurity. What’s the Deal?

You might have noticed that business insurance companies are starting to show an interest in how you are protecting your technology and data. If your org has been in touch with your insurance provider regarding modifying or renewing your business insurance, you were likely handed a lengthy questionnaire about your cybersecurity. Let’s take a look together to help you make informed decisions on how...

FTC Safeguards Gets a Crucial Update

What is the FTC Safeguards Rule? The FTC Safeguards Rule is a regulation that compels financial institutions under the FTC's jurisdiction to implement comprehensive measures to protect consumer data. The rule applies to a wide range of entities, including banks, mortgage lenders, credit unions, and other financial service providers. Its primary objective is to ensure that businesses establish and...

Browser Hijacking Attacks are a Serious Threat

Understanding Browser Hijacking Attacks Browser hijacking attacks involve the stealthy installation of malicious software onto a user's web browser. This malware can range from adware and spyware to more sophisticated forms like ransomware and keyloggers. The primary goal of these attacks is to gain unauthorized access to sensitive information or disrupt the user's browsing experience. Common Te...

The Advantages and Disadvantages of a Password Manager

Advantages Enhanced Security - Password managers excel in generating robust, unique passwords for each account, diminishing the threat of security breaches stemming from weak or reused passwords. Convenience - They offer a hassle-free means to store and automatically input login credentials, saving precious time and effort, with just one master password to remember. Organization - Password...