Category Archives: backup

Picking the Right Backup Strategy

As part of our backup series, we will be continuing our discussion on backing up your most valuable business asset, your data.

Having a great backup application, like the StaySafe Protection Program, isn’t enough if you don’t have a good backup plan.

A good backup plan includes three components:

  • schedule and frequency
  • retention
  • recovery

Schedule and frequency

When considering your backup strategy, you need to know how often and what time you want your backup to be performed.

Most businesses simply default their programs to nightly because that is what they were told. There was a time when that was the prevalent strategy because of technology limitations. Backups would take all night, clog bandwidth and cause any day time work to come to a screeching halt.

However, times have changed. Newer “smart” programs like StaySafe Protection Program can send data incrementally, thus reducing the network load. They can also detect what has changed and only update those files that have been altered.

Good backup strategy goes beyond technology. Businesses need to consider how they are using their data to properly devise a schedule and frequency.

For instance, let’s say you have an accounting program that is only run once a month after payroll. It would be a wasted effort then to perform daily checks and backup of the data since it only changes every month. Alternatively, there might be a program that collects critical information every second, such as a highly regulated environment. This data may require more frequent backup but only during office hours.

All data shouldn’t be treated the same. Some of your information is more critical for your operation than others. Correctly identifying this information and isolating it will help ensure your backup plan protects your business at the right levels.

Retention

Now that you’ve backed up your data, how long do you keep it?

In a hypothetical world, we’d love to keep the data forever and never risk losing anything. In the real world however, storing data takes up valuable space. Be it a local storage device or remote cloud service, that space is finite and costs your business to increase thus you can’t consider your retained copies as an infinite storage.

So what is the right retention policy?

In many ways it comes down to:

  • schedule and frequency of backup
  • size and type of data
  • BUDGET

If your backup schedule is only monthly and you only retain a month of data, then you will only be as good as the last copy of events. This is hardly any protection from loss or corruption. If you store large files, such as graphic images or videos, the space you require per file increases drastically. The biggest consideration is – how much are you willing to spend on something you may never look at again?

As you can imagine, there is much to consider in this space before you start any backup plan

Recovery

Most business owners are knowledgeable when thinking in terms of backup but many never really spend any time to think about recovery. They assume that as long as the data is “backed up” it must be recoverable.

Unfortunately, that is not always the case. In some situations, the process of backing up changes the data format, making it unreadable by the original application.

Alternatively, the process of recovery could take hours if not days to become operational once more.  Having the appropriate Business Continuity Device, such as the devices by Cornerstone Backup, a Solve-IT.ca partner, can ensure your operation is back in a short period of time.

In still other situations, such as email, newer information may be lost if the backup were to be restored. A decision and procedure needs to be in place to ensure important new information isn’t erased by the recovery procedure.

In still other situations, the business has not set up the right schedule/frequency and retention for backup and the necessary copy of the information is not available for recovery.

The worst situation is when there is an emergency occurs and the necessary people can’t be contacted to get the recovery started.

In all situations, it is advised that after the business has devised a backup plan, including recovery procedures, they include the plan as part of their Business Continuity Plan. At scheduled times this plan is reviewed and tested to ensure it works. Consider it as a “fire drill” for all components including your backup recovery.

Without considering all 3 aspects of recovery, the best backup program in the world cannot properly safeguard your data.

If you need help coming up with a properly developed plan or would like a demo of our StaySafe Protection Program, call us at 905-388-2597 or send Solve-IT.ca an email or contact us directly and we will be happy to work through a plan with you.

 

Safeguarding Your Laptop

In today’s fast paced world, business is always on the move. If you are like many businesses today, this means more than just some glossy metaphor. With lighter, more powerful laptops, your office can travel with you. You don’t have to be out of touch with your critical information simply because you’re “on the road”. With cloud computing and virtual desktops, every aspect of your business can be available to you at the tips of your fingers.

But what happens when you lose the ability to use that laptop? What happens when you have information stored on your laptop that you just can’t afford to lose? Perhaps it’s that latest details of your next major project or the start of a presentation you’re planning on delivering. Perhaps it’s a copy of an agreement or revision notes you’ve taken while you were speaking with a client. Can you afford to lose that work?

As we’ve discussed before, information is one of the most valuable assets of your business. Losing it can cost you and your business a lot.

There are many ways you could lose your laptop, including but not limited to:

  • theft
  • hardware failure
  • damage or dropping your device
  • hard drive corruption

Is the information on your laptop safe from these situations?

According to FBI’s Computer Crime Survey, the estimated cost of computer security incidents is $67.2 billion annually. And based on a recent study by Ponemon Institute, organizations lose up to $7.2 million each data breach and an average of $49,246 of data per lost laptop.

If you are concerned at all, consider the StaySafe Protection program. The Protection program is the newest member of our StaySafe suite of services all designed to help keep your most valuable asset, your data, safe. What makes StaySafe Protection unique is that is has a laptop specific component, Mobile Vault, designed for the “on-the-go” business person.  Mobile Vault provides your laptop will receive industry leading business-class backup service, fully encrypted data transfers, IP tracing and remote data removal. Compare this with traditional backup strategies.

Traditional Backup Plans StaySafe Protection Mobile Vault
Business-class backup of data
AES 256-bit encryption of data ?
Load balance/silent data transfer ?
IP Tracing of devices
Remote data destruction

Business-class backup of data

Let’s face it, not all backups are created equal. Business-class backup comes with a level of integrity that you can’t get from at home versions of backup. Business-class backup includes:

  • redundant systems to ensure optimal uptimes
  • professional level software enabling greater level of control over data
  • ability to apply policies and create procedures the increase compliance of data

AES 256-bit encryption of data

One of the greatest dangers of working with data over the Internet these days is the fear the information can be stolen. Without proper encryption, your business intelligence and competitive advantage is just floating out there for someone to pick up and steal. AES 256-bit encryption is the latest and greatest in industry techniques.

Load balancing and silent transfer of data

Most traditional backup plans will require you set a time to “run” the backup. It utilizes all of your system’s resources to upload the computer’s information into a remote location. This process can take hours to complete and tie up critical systems, slowing down the internet and any other operations on that system. As such, most businesses schedule traditional backup plans to run late at night, when they expect low traffic on their network.

But with remote systems, you can’t always predict when you’ll be hooked up to the internet and available to do this backup. Under the traditional backup plans, that could mean your computer will miss these critical backups. Or worse, your already slow remote connection will move even slower because you’re trying to share the bandwidth with your backup process. Many times, you’re not connected to these remote internet services long enough to truly perform a full backup, thus potentially corrupting your backups and losing your critical data.

Under Mobile Vault, the service is intelligent enough to perform data transfer in increments, transferring small packets so it not only using less bandwidth but can optimize on your limited remote access. If you lose connection to the internet, it will simply resume where it left off and thus prevent data corruption.

IP Tracing and Remote data destruction

One of the scariest things that can happen to any business person is losing their laptop. Not only is it a physical asset loss, it could also mean the loss of critical information and compromise of the business. With Mobile Vault, businesses are now able to track and remove critical information even if the computer is physically lost.

Using the administrative interface, Mobile Vault can put a listener out on the Internet. As soon as the computer tries to connect to the internet again (which is a standard process triggered when most computers turn on), the system will retrieve the location of the computer via IP address. From here, the lost device can be located and any critical information removed remotely from the system.

Interested to learn more about what StaySafe Protection or any services under the StaySafe line can offer your computer? Just give us a call or email today. We’d be happy to assist you further and help evaluate if this service is right for your business.

Get Your Data in Order

In today’s business world, information is your most precious commodity.  Data you keep on your computers can make or break your company.  That is why it is so critical to safeguard the data you store on your network.

There are many solutions these days for you to consider such as remote and local backup systems, ghosting, cloud storage.  Before you can consider any of these options, you really need to take a moment and consider the most critical non-technical decision you will need to make:

How is my data organized?

Organizing your data on your computer is about having a system and sticking to it.  It is the filing system of today and should be taken with as much integrity and seriousness as maintaining critical business records in any other form.

When we talk about data organization on the computer, obviously we’re talking about files.  All too often, I find people putting files everywhere, mixing types and using names that aren’t Windows friendly.  These all lead to complications down the line, difficulty in backing up and recovery, and increased storage costs.

The best organized data has the following characteristics:

  • Information is easy to identify and locate
  • Files are all consolidated into one main area/folder
  • Different types of files are separated where appropriate
  • Files names do not exceed 256 characters (this includes the folder tree and filename itself)

Information is easy to identify and locate

The best test for a good system is when you’re out of the office and you need to send someone instructions on how to find the files to a particular project.  If you can direct someone to locate the necessary file within a sentence or two, your structure is probably good.  If you have to hunt and peck, trying to pick different folders across the network, then you may want to consider spending some time in harmonizing your file structure.

Consolidate files into one folder

Often, people are in a rush and decide to put something up on their desktop so they can access it quickly.  This is fine for the one-off solution but if it’s a file that you need to retain, you should have a designated location for this file.  Having everything in one folder, such as “My Documents”, makes it easier to locate and easier to establish a backup procedure.

Separate file types

In some businesses, projects are run with a large number of different types of files, such as music, video, and images.  These types of files tend to be very large and can be costly in terms of storage and backup.  But if you can isolate them to specific folders, it becomes easier to identify these files and isolate them for different, less expensive forms of backup.

The other key is to separate personal files from business files.  Many people maintain personal data, such as iPod music, downloaded pictures, and personal documents.  While these may be important to the individual, they have no place on your business’ network.  If they are mixed in with business data, you’ll be wasting backup space to these “other” types of information.

Smart file names

When Microsoft allowed the use of long file names they created an annoying “Catch 22”. This was a great boost for many companies who wanted a more descriptive file name.  Unfortunately, one item that many businesses are not aware of is that most backup applications (and other operational programs) don’t like these logical file names.  They end up truncating the filesnames and folder paths making it a challenge to restore.  Best case, they cause you to have to restart the application. In the worst case scenario, they can corrupt your information, making it unreadable and unrecoverable by any program.

Rather than trying to fit everything in the file name, use detailed file structures.  If you’re working in Microsoft Office, you can also use file attributes such as title or subject instead to extend the information you have on the document.

Choosing a good file structure before you move on to implementing a backup solution will save your company a great deal of time and money.