3. Backing Up Your Data
Protecting and Securing your
Systems & Data
Disaster Recovery Planning
4.
5. Backups:
Would you suffer financial hardships if you
experienced a loss of data?
What data exists on your computers that would be
difficult, if not impossible, to recreate in the case of
loss or damage?
A proper backup consists of multiple copies of
data stored in different locations. If the only
backup of your data sits on the shelf beside your
computer and there’s a fire or theft, chances are
your backup is going to be lost as well.
7. In 2009, 7,500 users of online backup provider
Carbonite found out the company lost their
backups.
Amazon Cloud Service crash loses customer
data in 2011
Megaupload, out of business in 2012,
customers lose access to all their data
Cloud storage and backup is one tool
to use in your data backup strategy,
but do not rely on it as the be all
answer to your data backups
8. Local Backups
Utilize local backups along with
the cloud to maintain multiple
copies of data stored in different
locations
10. • Image backups create a mirror
image copy of your computer,
• Image backups protect you from
hardware failures and severe data
corruption from viruses or other
malware.
• With an optional “restore to
dissimilar hardware” an image
backup can protect you from loss
from theft, fire etc. by enabling a
full restore to newer or different
11. For the Small Business, Online
Cloud Backups combined with Local
Image Backups provide your best
defense against catastrophic data
loss and prolonged recovery time in
the event of disaster!
13. Secure your Data
Install a firewall between you and the Internet
Install and maintain antivirus/antimalware software
Mac users, you are not immune!
Use strong passwords on all computers and web
services
Utilize encryption with sensitive data on mobile
devices, offsite data storage, email containing
sensitive attachments or content and other methods
of data transmission
14. Secure your Data
Physical safeguards; lockup data backups,
logoff/lock computers or shutdown, remove from
areas with public access
Keep plastic sheets or trash bags close by in case of
water leaks or sprinkler activations
Elevate computers off the floor to protect from flood
& floor washings
15. Business Continuity Planning
Continuing operations during and after a disaster
Lighting, power surges/sags and outages
Protect computer equipment with battery backups
(Uninterruptible Power Supplies) or minimally, surge
protectors
Emergency generator power
The wrong generator can damage sensitive electronics
Generators should include Automatic Voltage Regulation
(AVR), better, Digital AVR or best for computers, Inverter
technology
16. Super-Quiet EU series.
More about generators…
Power output quality of brushless, AVR and Inverter
generators
17. Business Continuity
Internet access and communications when the lines
are down
3G/4G data service from your cell phone provider
Smartphone WiFi “hotspot”
“MiFi” devices
Connect your wireless PC’s, laptops, tablets and other
devices through a smartphone or MiFi device
Check that your business phone service can forward
calls to your cell phone, home or temporary office
space
18. Business in the Cloud
Before disaster strikes, move your business applications to the cloud
Cloud Services or Software as a Service (SaaS)
E-mail, messaging and collaboration
Microsoft Office 365, Google Apps
Accounting, inventory, POS, Merchant services
Quickbooks online
Netsuite (ERP)
Credit card processing from your smartphone or iPad
Project Management
Sales/Marketing/Customer Relationships (CRM)
19. Business in the Cloud
Utilize colocation facilities to host your servers or provide a hot
or warm backup site
Secure facilities, hardened building structures
Backup battery and generator power
Multiple Internet carriers
Geographic diversity
Disaster Recovery Service Providers
Temporary office space
PC’s workstations and servers (cold backups)
Generators
Satellite communications
DRaaS
Hosted Virtual Machine snapshots of the servers at your
data center or business location
20. Disasters are not always the result of high
winds and rain. In the past two years, 52% of
businesses experienced an unforeseen
interruption, and the vast majority (81%) of
these interruptions caused the business to be
closed for one or more days.
Source: 2009 Disaster Recovery & Business Continuity
Survey
A computer disaster can come from a devastating event like fire, flood or storm or simply a hardware failure like a hard drive crash or inadvertent deleting of data
3 areas I will cover tonight
Your backup plan should include multiple backups stored in different locations
Copy data offsite to a cloud storage provider.Depending on the amount of data this can be free to $100’s or $1000’s per year5-10 GB of free cloud storage is available from several sources
Don’t rely only on cloud backups, most providers cannot guarantee you will never lose your data
Perform local backups along with cloud storage to maintain multiple copies of data stored in different locations
Image backups are designed to fully restore a PC or server from “bare metal”, even to dissimilar hardware.
Image backups are designed to fully restore a PC or server from “bare metal”, even to dissimilar hardware. A single Windows computer with a crashed hard drive can be restored to full functionality in less than an hour after the hard drive is physically replaced.A data only backup of that same computer would require a re-installation of Windows and all application software along with all the appropriate configuration modifications, re-authenticating/registering and updates for the operating system and applications, then the data can be restored. That process can take hours or even daysAcronis True Image, Norton Ghost, Windows Backup & Restore (Vista, W7, 2003 server) Windows Server Backup (W2008), Symantec System Recovery, Acronis Backup & Recovery
Use this 2 tier backup plan of local full image and offsite data backups as a solid defense against catastrophic data loss and long recovery times
A firewall helps prevent outside intrusionUse antivirus software EVEN YOU, MAC USERSIf you are sharing data via email, ftp, dropbox, etc that contains sensitive information like health or financial info or moving this data offsite for backup purposes, make sure data is encrypted. There are many options available to protect sensitive data while it is in transition. encryption tools are readily available to protect portable hard drives, thumb drives and encryption is typically used by Cloud storage providers during both the transfer and storage of your data.
Computers do not run without clean power. Your Business Continuity Plan may include obtaining a standby generator The wrong generator can damage sensitive electronicsGenerators should include Automatic Voltage Regulation (AVR), better, Digital AVR or best for computers, Inverter technology
Include options in your plan for phone and Internet interruption.Cell phones, smart phones, MiFi 4G devices to connect PC’s and tablets
By moving core applications to the cloud you may be able to operate your business from anywhere if your office, store or facility is inaccessible.EmailFinance and accountingAccepting payments Square app for android, iphones, ipads to accept credit cards
Move critical systems to hosting facilitiesSetup hot or warm backup systems at colo sitesConsider Disaster Recovery Service Providers that can provide temporary space, systems, power and communications or Disaster Recovery as a Service that can create failover systems in a virtual environment
Even if your business is making sock puppets in a spare bedroom, a down computer can keep you from taking orders, shipping product and getting paid