SlideShare a Scribd company logo
1 of 21
Disaster Happens!
Backing Up Your Data

Protecting and Securing your
 Systems & Data
Disaster Recovery Planning
Backups:
Would you suffer financial hardships if you
experienced a loss of data?

What data exists on your computers that would be
difficult, if not impossible, to recreate in the case of
loss or damage?

A proper backup consists of multiple copies of
data stored in different locations. If the only
backup of your data sits on the shelf beside your
computer and there’s a fire or theft, chances are
your backup is going to be lost as well.
Offsite Storage and Online
Backups
Carbonite, Mozy, MyPCBackup,
SoHo Remote


File Synchronizing
iCloud, SkyDrive, SugarSync

          01100100011
          011
In 2009, 7,500 users of online backup provider
Carbonite found out the company lost their
backups.
Amazon Cloud Service crash loses customer
data in 2011
Megaupload, out of business in 2012,
customers lose access to all their data
Cloud storage and backup is one tool
to use in your data backup strategy,
but do not rely on it as the be all
answer to your data backups
Local Backups

 Utilize local backups along with
  the cloud to maintain multiple
 copies of data stored in different
              locations
Image Backups
• Image backups create a mirror
  image copy of your computer,
• Image backups protect you from
  hardware failures and severe data
  corruption from viruses or other
  malware.
• With an optional “restore to
  dissimilar hardware” an image
  backup can protect you from loss
  from theft, fire etc. by enabling a
  full restore to newer or different
For the Small Business, Online
Cloud Backups combined with Local
 Image Backups provide your best
 defense against catastrophic data
loss and prolonged recovery time in
       the event of disaster!
Don’t be this guy!
Secure your Data
 Install a firewall between you and the Internet
 Install and maintain antivirus/antimalware software
    Mac users, you are not immune!
 Use strong passwords on all computers and web
  services
 Utilize encryption with sensitive data on mobile
  devices, offsite data storage, email containing
  sensitive attachments or content and other methods
  of data transmission
Secure your Data
 Physical safeguards; lockup data backups,
  logoff/lock computers or shutdown, remove from
  areas with public access
 Keep plastic sheets or trash bags close by in case of
  water leaks or sprinkler activations
 Elevate computers off the floor to protect from flood
  & floor washings
Business Continuity Planning
 Continuing operations during and after a disaster
  Lighting, power surges/sags and outages
   Protect computer equipment with battery backups
    (Uninterruptible Power Supplies) or minimally, surge
    protectors
   Emergency generator power
       The wrong generator can damage sensitive electronics
       Generators should include Automatic Voltage Regulation
        (AVR), better, Digital AVR or best for computers, Inverter
        technology
Super-Quiet EU series.




     More about generators…
      Power output quality of brushless, AVR and Inverter
      generators
Business Continuity
 Internet access and communications when the lines
 are down
   3G/4G data service from your cell phone provider
       Smartphone WiFi “hotspot”
       “MiFi” devices
   Connect your wireless PC’s, laptops, tablets and other
    devices through a smartphone or MiFi device
   Check that your business phone service can forward
    calls to your cell phone, home or temporary office
    space
Business in the Cloud
 Before disaster strikes, move your business applications to the cloud
        Cloud Services or Software as a Service (SaaS)
          E-mail, messaging and collaboration

             Microsoft Office 365, Google Apps

          Accounting, inventory, POS, Merchant services

             Quickbooks online

             Netsuite (ERP)

             Credit card processing from your smartphone or iPad

             Project Management

             Sales/Marketing/Customer Relationships (CRM)
Business in the Cloud
 Utilize colocation facilities to host your servers or provide a hot
  or warm backup site
      Secure facilities, hardened building structures
      Backup battery and generator power
      Multiple Internet carriers
      Geographic diversity
 Disaster Recovery Service Providers
    Temporary office space
    PC’s workstations and servers (cold backups)
    Generators
    Satellite communications
 DRaaS
    Hosted Virtual Machine snapshots of the servers at your
     data center or business location
Disasters are not always the result of high
winds and rain. In the past two years, 52% of
businesses experienced an unforeseen
interruption, and the vast majority (81%) of
these interruptions caused the business to be
closed for one or more days.



Source: 2009 Disaster Recovery & Business Continuity
Survey
Thank you!



www.soho-consulting.net
      781-261-3173
info@soho-consulting.net

More Related Content

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

Soho disaster prep

  • 1.
  • 3. Backing Up Your Data Protecting and Securing your Systems & Data Disaster Recovery Planning
  • 4.
  • 5. Backups: Would you suffer financial hardships if you experienced a loss of data? What data exists on your computers that would be difficult, if not impossible, to recreate in the case of loss or damage? A proper backup consists of multiple copies of data stored in different locations. If the only backup of your data sits on the shelf beside your computer and there’s a fire or theft, chances are your backup is going to be lost as well.
  • 6. Offsite Storage and Online Backups Carbonite, Mozy, MyPCBackup, SoHo Remote File Synchronizing iCloud, SkyDrive, SugarSync 01100100011 011
  • 7. In 2009, 7,500 users of online backup provider Carbonite found out the company lost their backups. Amazon Cloud Service crash loses customer data in 2011 Megaupload, out of business in 2012, customers lose access to all their data Cloud storage and backup is one tool to use in your data backup strategy, but do not rely on it as the be all answer to your data backups
  • 8. Local Backups Utilize local backups along with the cloud to maintain multiple copies of data stored in different locations
  • 10. • Image backups create a mirror image copy of your computer, • Image backups protect you from hardware failures and severe data corruption from viruses or other malware. • With an optional “restore to dissimilar hardware” an image backup can protect you from loss from theft, fire etc. by enabling a full restore to newer or different
  • 11. For the Small Business, Online Cloud Backups combined with Local Image Backups provide your best defense against catastrophic data loss and prolonged recovery time in the event of disaster!
  • 13. Secure your Data  Install a firewall between you and the Internet  Install and maintain antivirus/antimalware software  Mac users, you are not immune!  Use strong passwords on all computers and web services  Utilize encryption with sensitive data on mobile devices, offsite data storage, email containing sensitive attachments or content and other methods of data transmission
  • 14. Secure your Data  Physical safeguards; lockup data backups, logoff/lock computers or shutdown, remove from areas with public access  Keep plastic sheets or trash bags close by in case of water leaks or sprinkler activations  Elevate computers off the floor to protect from flood & floor washings
  • 15. Business Continuity Planning  Continuing operations during and after a disaster Lighting, power surges/sags and outages  Protect computer equipment with battery backups (Uninterruptible Power Supplies) or minimally, surge protectors  Emergency generator power  The wrong generator can damage sensitive electronics  Generators should include Automatic Voltage Regulation (AVR), better, Digital AVR or best for computers, Inverter technology
  • 16. Super-Quiet EU series. More about generators… Power output quality of brushless, AVR and Inverter generators
  • 17. Business Continuity  Internet access and communications when the lines are down  3G/4G data service from your cell phone provider  Smartphone WiFi “hotspot”  “MiFi” devices  Connect your wireless PC’s, laptops, tablets and other devices through a smartphone or MiFi device  Check that your business phone service can forward calls to your cell phone, home or temporary office space
  • 18. Business in the Cloud  Before disaster strikes, move your business applications to the cloud  Cloud Services or Software as a Service (SaaS)  E-mail, messaging and collaboration  Microsoft Office 365, Google Apps  Accounting, inventory, POS, Merchant services  Quickbooks online  Netsuite (ERP)  Credit card processing from your smartphone or iPad  Project Management  Sales/Marketing/Customer Relationships (CRM)
  • 19. Business in the Cloud  Utilize colocation facilities to host your servers or provide a hot or warm backup site  Secure facilities, hardened building structures  Backup battery and generator power  Multiple Internet carriers  Geographic diversity  Disaster Recovery Service Providers  Temporary office space  PC’s workstations and servers (cold backups)  Generators  Satellite communications  DRaaS  Hosted Virtual Machine snapshots of the servers at your data center or business location
  • 20. Disasters are not always the result of high winds and rain. In the past two years, 52% of businesses experienced an unforeseen interruption, and the vast majority (81%) of these interruptions caused the business to be closed for one or more days. Source: 2009 Disaster Recovery & Business Continuity Survey
  • 21. Thank you! www.soho-consulting.net 781-261-3173 info@soho-consulting.net

Editor's Notes

  1. A computer disaster can come from a devastating event like fire, flood or storm or simply a hardware failure like a hard drive crash or inadvertent deleting of data
  2. 3 areas I will cover tonight
  3. Your backup plan should include multiple backups stored in different locations
  4. Copy data offsite to a cloud storage provider.Depending on the amount of data this can be free to $100’s or $1000’s per year5-10 GB of free cloud storage is available from several sources
  5. Don’t rely only on cloud backups, most providers cannot guarantee you will never lose your data
  6. Perform local backups along with cloud storage to maintain multiple copies of data stored in different locations
  7. Image backups are designed to fully restore a PC or server from “bare metal”, even to dissimilar hardware.
  8. Image backups are designed to fully restore a PC or server from “bare metal”, even to dissimilar hardware. A single Windows computer with a crashed hard drive can be restored to full functionality in less than an hour after the hard drive is physically replaced.A data only backup of that same computer would require a re-installation of Windows and all application software along with all the appropriate configuration modifications, re-authenticating/registering and updates for the operating system and applications, then the data can be restored. That process can take hours or even daysAcronis True Image, Norton Ghost, Windows Backup & Restore (Vista, W7, 2003 server) Windows Server Backup (W2008), Symantec System Recovery, Acronis Backup & Recovery
  9. Use this 2 tier backup plan of local full image and offsite data backups as a solid defense against catastrophic data loss and long recovery times
  10. A firewall helps prevent outside intrusionUse antivirus software EVEN YOU, MAC USERSIf you are sharing data via email, ftp, dropbox, etc that contains sensitive information like health or financial info or moving this data offsite for backup purposes, make sure data is encrypted. There are many options available to protect sensitive data while it is in transition. encryption tools are readily available to protect portable hard drives, thumb drives and encryption is typically used by Cloud storage providers during both the transfer and storage of your data.
  11. Computers do not run without clean power. Your Business Continuity Plan may include obtaining a standby generator The wrong generator can damage sensitive electronicsGenerators should include Automatic Voltage Regulation (AVR), better, Digital AVR or best for computers, Inverter technology
  12. Include options in your plan for phone and Internet interruption.Cell phones, smart phones, MiFi 4G devices to connect PC’s and tablets
  13. By moving core applications to the cloud you may be able to operate your business from anywhere if your office, store or facility is inaccessible.EmailFinance and accountingAccepting payments Square app for android, iphones, ipads to accept credit cards
  14. Move critical systems to hosting facilitiesSetup hot or warm backup systems at colo sitesConsider Disaster Recovery Service Providers that can provide temporary space, systems, power and communications or Disaster Recovery as a Service that can create failover systems in a virtual environment
  15. Even if your business is making sock puppets in a spare bedroom, a down computer can keep you from taking orders, shipping product and getting paid