Planning for potential disasters, is the first stage of a Backup Disaster Recovery Plan.  In this article we look at identifying the data that will be needed in order to speed up the recovery process.  Part of data backup planning is looking at what data exists, where it is located and how it is protected. By the end of this blog you will have a much better idea on how to carry out this process in order to identify the right data to protect your business from data loss.

Background

Hopefully, your business is insured against most threats but the loss of business information is one of the biggest contributors to businesses failing.  The UK’s NCSC give some great advice to small business and backing up your data is a key part of their national campaign to protect businesses.  As an IT company we are often asked if we are able to assist in data recovery.  Most of the time this is due to the failure of a hard drive or the encryption of data after a ransomware attack.  Although it is sometimes possible to recover data it can cost hundreds and often thousands of pounds and even more frustrating is that recovery can take a long time and quite often it is not possible.

By taking time to review your entire business and where all of the data resides in your business it is possible to protect the data with backups which allow almost instant recovery with little or no cost.

What data needs backing up?

This might sound like a simple question but the answer can sometimes take a while to answer.  Each business will have its own way of “doing things” so there is no definitive answer but here are a few general rules to get you started.

Server Backup

If your business uses a server the general rule is to take a bare-metal backup.  This essentially means if the server is damaged or stolen you could get another physical box and have it up and running within a few hours.

Some people decide to back up only the files and data stored on the server and this can certainly reduce the cost of ongoing data backup.  However, in the case of a complete server failure this can leave your business vulnerable to a long and costly rebuild exercise.  A server not only has data and programs but also contains information about the computers and staff that are able to access this information.  It does this via a series of tokens which are unique to that particular setup.  Without a full server backup it would be necessary to rebuild the server, add all of the users and computers, redefine the security rules and finally setup all of the computers again so they can use the right tokens.

The bottom line is if you have a server ensure you utilise a full server backup which will protect the server setup and the data contained on it.

 

Workstations and laptops

Should computers, workstations and laptops be backed up?  This is a more complex answer as it depends on how your staff are working.  If your staff are saving documents to centralised storage such as a server, a NAS or even a cloud share such as SharePoint or Dropbox then potentially the individual computers may not need backing up.  If your staff have a habit of saving documents to their desktops, my docs or somewhere else on the physical PC then you need to have a backup in place.

Most of the time a simple file-based backup would work for these computers but beware of programs that are generating data for your business (see below)

 

Cloud Storage

Cloud Storage has revolutionised the way that businesses work by removing the requirement to invest in complex and expensive centralised storage.  However, unless you are paying for a specific backup system there is a high probability that all of this data is unprotected.

It is true that many cloud providers have your data stored in several locations and as such this is protecting the data from a specific failure. Namely a failure of the cloud hardware.  However, it does not necessarily protect data from a ransomware attack which would encrypt everything.

Cloud based storage is easy and simple to backup and having a copy stored in a second location will protect the data from all potential losses.

Cyber Security Concept

Email backup

You may be surprised to find out that unless you are paying for a specific backup, your emails are not protected.  Microsoft for instance does not backup Office 365 emails, calendars, tasks etc.  As a business you are probably more dependent on email correspondence than you realise.  How many customer and supplier contracts and agreements are stored in your email folders?  Do you have copies of these anywhere else?

Once again backing up this data should not be too difficult and whilst you are arranging it you may as well ensure data is retained for 10 years as well.  This means if a member of staff deletes information that you later need to rely on it is possible to recover individual emails right through to entire mailboxes.  For businesses that are regulated (IFAs, mortgage brokers and solicitors for example) the retention of data for a specified period of time may be part of the regulation.  For limited businesses, HMRC expects evidence to be retained for 6 years from end of the accounting period.  To be on the safe side I would always recommend 10 years.

 

Data generated from programs or applications

One of the areas often overlooked is data generated from programs that your business uses.  For instance a CRM, Sage, Quickbooks, customized databases etc.

These types of programs are made up of two parts: the actual application which you install and data which you input into the program.  For some programs a single file or folder is generated and as long as you have a copy of this then it would be possible to restore your program to a working state on another device.

Other programs have data stored in multiple files in multiple locations and they will often have an inbuilt backup utility.  This utility will generate a single file which can be used to recover your data in the case of a failure.

The important thing to note is that where this data is located is often “buried” and you will need to either ensure the entire machine is backed up or that this location is included in the backup schedule.  Backing up the file produced by the programs “inbuilt backup” is the key to easily recovering your precious data.

 

Next blog

Now the data has been identified the question is, what is the best way to back it up?  Next time we will look at the differences between onsite and offsite backups as well as how the method you choose will determine the speed of your recovery.

How can I get help

A good IT support company will be able to assist you with planning for a disaster.  If you would like us to check through your IT disaster planning document we have engineers available.

 

What next?

If your business would like to talk about planning for disasters or secure data storage then fill out our contact form, phone us or click on the appointment button below and lets start a conversation to see if we are able to help you and your business.

Our guarantee:

  • There are no hidden charges – this is a 100% free 15 minute consultation with no hidden charges.
  • We will never spam you or sell on your contact details.
  • We will treat your information with absolute confidentiality.

Better Battery Life for Windows 11 Laptops

Windows 11 may soon get a new feature called Adaptive Energy Saver which will help your Windows 11 Laptop battery last longer. In the long term it might also help the lifespan of your laptop, meaning savings for your business. Find out more about this feature that has not yet been released.

Say Goodbye to Hours Wasted on PowerPoint Slides

Say goodbye to hours wasted on PowerPoint slides. The latest release of Copilot allows you to create PowerPoint presentations using a Word file. It will save you hours of stress, and the result is actually quite good.

Averting Disaster with a Checklist

Often a check list, when done regularly, will show early signs of issues. Acting on those issues whilst they are small saves a bigger problem or potential disaster.

Backup Disaster Recovery – Protected

Backup disaster planning allows your business to recover quickly and simply and has an affordable budget which is consistent. Choosing what, how and where to backup will be explained within this series of articles and allow you as a business owner to make an informed choice about how to protect your business.

Backup Disaster Recovery – Backup Options

Backup disaster recovery includes onsite and cloud-based backup options. Which is the best option for your business and what is the difference between them.

Super Deduction, HMRC pays for IT

HMRC have a tax relief available called super deduction. Super deduction allows your business to buy IT equipment and offset 130% of its cost against your corporation tax. In order to take advantage of this relief you need to purchase equipment before 31st March 2023.

Disaster Planning

Is Disaster Planning a useful exercise?  For this business, the worst nightmare possible happened last weekend.  They had a major fire!  What actually happens when a fire occurs in a business and is it something you should plan for? Today we look at planning for the...

Business IT Security – Using 2FA

Business IT security is often about doing the basics really well, like securing your accounts using 2FA. In this post find out why 2FA helps to keep your business cyber secure

Business IT – Planning a successful IT strategy

Business IT systems need to support business operations as well as allow business growth. Making an IT business plan allows your business to gain the maximum benefit of its existing IT as well as plan future investment.

Another Cyber Security zero-day exploit

On 9th November Microsoft released a fix for Windows based computers that allowed an attacker to take control of your systems as an admin.  This was known as CVE-2021-41379 and was the latest in a series of cyber security issues involving Elevation of Privilege...

Business IT Security – Using 2FA

Business IT security is often about doing the basics really well, like securing your accounts using 2FA. In this post find out why 2FA helps to keep your business cyber secure

New Dark Web Monitoring Tool Available from Absolutely PC

How much of your business and personal data is available online? The results could surprise you. With small business in the UK alone targeted by up to 65,000 attempted cyber attacks per day, data breaches and leaks are becoming an increasingly common occurrence. Once...

Have you made these IT upgrades?

Technology is constantly changing and adapting; as such, it is important to always stay on top of upgrades to ensure you are running at optimum efficiency. At Absolutely PC, IT upgrades are a necessary and consistent part of our monthly and annual maintenance...

New Password Management Tool Available from Absolutely PC

With cyber attacks on the rise and remote working becoming commonplace, now, more than ever - businesses need to keep on top of the security of their passwords or be at risk of suffering a costly data breach. A study by Verizon Data Breach Investigations found that...

Can your business cope with winter disruption?

Thanks to the unseasonably mild weather we’ve enjoyed this autumn, it’s easy to forget that winter, and all the potential havoc it can wreak, is soon to follow. It’s hard not to feel that our weather has become more unpredictable and freak storms just aren’t, well,...

Another Cyber Security zero-day exploit

On 9th November Microsoft released a fix for Windows based computers that allowed an attacker to take control of your systems as an admin.  This was known as CVE-2021-41379 and was the latest in a series of cyber security issues involving Elevation of Privilege...

LastPass Security Breach

LastPass is a password management utility and application allowing companies and people to store their passwords. After a recent breach there are some serious security issues that need attention. This article looks at what these issues are and how to re-secure your passwords.

Ransomware – Behind the Hack [Video Guide]

How would your business react if you were locked out of every single file stored on any PC or cloud platform in your network, with the only way to free your data being to pay vast sums of money to a hacker? Well, ransomware does just that. Despite how crippling this...

How To Fix Windows ‘PrintNightmare’ Vulnerability – Video

Microsoft is warning Windows users about a currently unpatched security flaw in the Windows Print Spooler service which is being actively exploited. Whilst waiting on a fix from Microsoft, Window's PCs are potentially vulnerable to be hacked whenever they are switched...

Cyber Security Infographic

With cyber attacks becoming increasingly common for businesses of all sizes, it is critical that your organisation understands the most common types of cyber attack and what you can do to protect yourself. Take a look at our cyber security infographic which takes you...