Hard drive crash. Ransomware. Equipment failure. Accidental deletion. Theft.
There are plenty of reasons why end users want to have a secure and up-to-date backup of their most important files. And there are just as many approaches to backup and recovery as there are reasons to want it in place.
In this article, we’ll discuss practical strategies and best practices for backing up important data, including consumer-level options and how to get the most from an enterprise-grade backup solution. All told we want to explore how to create a robust backup strategy that can save an organization from disaster without breaking the bank.
What this article will cover:
What is data backup and recovery
Why Are backups important?
Top backup strategies
Best practices for backing up important data
Data backup and recovery
Thanks to its importance in the modern-day IT landscape, most people know the basic definition of a backup process. In brief, it’s the process of backing up data and setting up secure systems that allow you to recover your data in the event of a disaster or data loss.
A proper backup isn’t just a copy of a file, however. The copy must also be as up-to-date as needed. It must be easy to restore, and those restores must be reliable. It must also be protected so that it is not exposed to the same dangers as the original data.
With these requirements in place, end users can rest assured that their precious data is always available -- or at least recoverable.
Why are backups important?
A backup’s purpose is simple enough: create copies of data that can be recovered when the primary data fails. Primary data failures can arise in many ways, including software or hardware failure, human error, data corruption, ransomware attacks, and natural disasters. A quality backup solution allows the user to “turn back the clock” after one of these events and restore their data or the entire system to a point prior to the calamity.
The first rule of a backup is that backup copies must be stored on a separate medium to prevent corruption or loss. Traditionally, this meant using an external device -- anything from a USB stick to a tape drive. The more modern approach is to store the backup data remotely on the cloud.
What’s important is that the data is safely stored away from the primary data.
Backup copies then must be made on a regular and consistent basis to minimize the amount of data lost between backups. The frequency of backups depends on the user’s needs and depends on how much data they’re able to lose forever without significant negative effects. Unlike the process of “file syncing” which is often confused with backing up data, there should be no risk of malicious or accidental changes to the data overwriting the backup copies. (This would of course render them useless.)
7 backup strategies
There are many ways an end-user can execute their own backup strategy. Tradeoffs will be made in convenience, cost, reliability, and time as is usually the case with technology. While some of the least expensive options may be good enough for a lone user who wants to back up their personal files, they would be untenable for even a small business with multiple computers, shared drives, limited time, and an innate need to minimize risk.
Let’s look at the most common options out there:
1) Consumer plug-and-play devices
These options tend to be singled out by home users for their convenience. All one needs to do is buy the USB device, you plug it into their PC, and the backup starts. There’s no configuration needed, no software to install, and no fuss. Essentially, it’s a “foolproof” way for a consumer-level user to back up large amounts of data.
Unfortunately, this easy option comes with downsides. Firstly, there’s a blind reliance on the device itself. Because it’s so simple, it can be difficult for low-level users to ensure a complete and proper backup. For instance, some tested devices did not automatically back up all partitions of the hard drive even though they claimed to do so.
Another drawback can be cost. If someone wants to back up a multi-TB hard drive, they could be looking at devices that cost thousands of dollars. To get around this issue, it is possible to buy your own external hard drive and install automated backup software on that drive yourself.
Even if someone goes this route, it does leave one problem on the table. More than likely, this external hard drive will be sitting right next to the computer it’s backing up. This means it’s just as vulnerable to theft or destruction as the primary system.
2) Internet backup services
The above issue can be addressed as long as the user has a stable internet connection. Internet backup tools don’t require hardware, only software, and gives access to your data from any Internet-enabled computer. This saves the user the expense of buying a backup device or an external drive.
But…as you expected, there are drawbacks.
These systems are notoriously slow, for one. Complete backups can take days or even weeks because they run in the background and only use a minimal amount of data bandwidth while doing so. Because they’re so slow, most of these services don’t offer application or OS backups, so they’re not going to help much if a system is attacked with ransomware or fails outright.
3) Home network backups
Another consumer-level option is designed more for families who want to make sure every device in the household is protected. This simple setup involves buying a network-attached storage (NAS) storage device -- a box containing one or more hard drives -- and plugging it into your router via ethernet cable. Anyone on the network who has the right permission can access those hard drives.
NAS drives can store photo, video, and music files, as well as perform backups. Many NAS drives also work as print servers, giving connected PCs easy access to any network printer.
As you can imagine, this is not an ideal option for small businesses. Again we face the issue of backup data being stored in the same location as the primary data. There are also configuration issues to be considered because the NAS backup solution still needs its automation to be set up by the user. Then the hardware needs to be maintained, protected, and eventually replaced. If not, the user may have to try to recover data from a dead hard drive.
In the modern world of cloud backups, it’s really just more trouble than it’s worth for most businesses.
4) Manual media backups
We have to mention this backup method, even if it’s largely for nostalgic reasons.
These days, you won’t find many people copying all of their large media files to DVD-Rs, but it was and still is a viable means of backing up data. It is inexpensive, but it can be tedious. It would not be the ideal way for a business to back up their important data, much less their entire system.
5) System disaster recovery
Now we’re getting into the more commonplace modernized options. A system (or disaster recovery) backup solution allows users to restore everything in one fell swoop. A few button presses or a call to the MSP or IT department, and the entire system can be rolled back to a previous version.
These methods typically use cloning or imaging to back up entire drives. Cloning involves transferring an exact copy of your main hard drive to another drive. To restore Windows, the user can then clone in the other direction or physically swap the drives.
Imaging involves copying a drive’s structure and contents into a compressed, but still very large, file on another drive. To restore the image and bring the system back to a previous restore point, the user must use the same image-backup software that created the backup. Most commercial systems use this method to save on costs and speed up their processes.
Archiving is a slightly different cousin of backing up that mostly applies in two cases: businesses that need to adhere to data and privacy regulations, and users who want to preserve data for a very long time for personal reasons.
In the first case, businesses may need to archive emails or financial documents for a specified amount of time. Their IT specialist can easily meet these requirements using any number of tools, including backup solutions or dedicated archiving software.
For the personal user, archiving might simply mean saving digital media for posterity -- i.e. storing digital family photos on DVDs to make sure they’re never lost, even fifty years down the road. In these cases, the most important step is choosing physical media that will last without corruption. While DVDs are considered safe to store indefinitely, there still isn’t reliable data on how long these discs will actually store data without corruption. One would certainly have safe storage issues to consider, as heat and light exposure would definitely degrade the media over time.
7) Multiple backups
Number seven is less a singular backup method and more of a backup strategy proper. It’s simply to have redundant backups whenever possible.
While the likelihood that both a primary system and a backup system will fail at the same time may be low (lower in some cases than others), there’s still always a possibility. For the ultimate peace of mind, a user should have backups of their backups.
This can be as simple as using a cloud-based backup solution as a primary backup, and then manually creating backups every so often on an external drive. There is relatively little risk to running redundant backups like this, although users should consult with their IT professional to determine how to get the most “mileage” from this kind of setup.
Backup and recovery best practices
Regardless of the backup strategy in play, there are best practices that should be followed to ensure the quickest, easiest, and most reliable recovery after a disaster.
Configure the correct backup frequency
Choosing frequencies is usually a balancing act between safety and cost/resource usage. At one point, most small businesses could get away with relatively infrequent backups. This isn’t so much the case now.
Thanks to ransomware, experts recommend everyone increase the frequency of backups to daily, or even multiple times per day. Incremental backup technology enables these rapid backups of almost any data set in a matter of minutes because only the changed file, not the whole drive, is copied to backup storage.
In-place recovery is another rapid response solution that is often recommended. While not as common among SMEs, these systems act as a failover for the entire IT environment, allowing the backed-up version of the system to run remotely so that the user can continue operating almost instantly. This saves the time of copying backup files back to the production drives before work can resume.
Align the backup strategy to service-level demands
Most organizations, even small businesses, rely on more than a dozen applications these days. Larger organizations may have more than 50 applications considered critical or important to their function. Most IT professionals don’t have the time required to audit these applications and determine backup priorities.
The recovery service level is a simpler way to dictate recovery times across all applications. It also determines backup frequency. If the service level is 15 minutes, then backups need to be done at least every 15 minutes. This is feasible with Block-Level Incremental backups, but can be untenable using other methods. Naturally, you wouldn’t (and couldn’t) run full backups at such a cadence.
Organizations should keep three complete copies of their data, two of which are local but on different types of media, with at least one copy stored off site.
An organization using this rule could back up to a local on-premises backup storage system, copy that data to another on-premises backup storage system, and then replicate that data to the cloud.
Chose cloud backup tools wisely
Cloud backup is a key consideration for organizations looking to revamp their data protection and disaster recovery strategy. IT professionals and MSPs should be careful not to assume that all backup vendors support the cloud equally. While many vendors offer cloud data backup -- or even some close approximation of it -- not all backup systems are flexible or reliable enough to entrust with their clients’ data.
Automate disaster recovery
The most common recoveries are those of a single file or single application, not complete disaster recoveries. You may need to recover from a failed storage system from time to time but it is extremely rare that an MSP needs to recover from a full disaster where the entire system is lost.
Of course, you still need to plan for the possibility of this type of recovery, especially with the rising threat of ransomware. In a disaster or cyberattack, IT needs to recover dozens of applications and those applications may be dependent on other processes running on other servers. In many cases the other servers need to become available in a very specific order, so timing of when each recovery can start is critical to success.
This is all a race against the clock, which is why automation is the MSP’s best friend when it comes to rapid response. By automating recovery playbooks when applicable, precious hours can be saved and SLAs met on time.
Protect endpoints and SaaS applications
Endpoints are becoming the new preferred target for cyber attackers, largely due to the effectiveness of phishing attacks that enter through the end user. Laptops, desktops, tablets, and smartphones are also at risk for theft, and all contain valuable data that might be uniquely stored on them.
That said, we know that data on individual devices need backups just as readily as data on company servers. Endpoint protection is now more practical than ever thanks to the cloud. Modern endpoint backup systems enable endpoints to back up to the cloud, managed by the MSP.
Just as noteworthy, applications such as Office 365 and Salesforce are often overlooked by the organization under the assumption that data on these platforms is automatically protected. In truth, the user agreements for most common business applications make it very clear that data protection is the user/organization's responsibility. MSPs must look for a data protection application that can also protect the SaaS offerings that their clients use.
The list of risks impacting business technology is already long and growing every year. Whether natural, accidental, or malicious, disaster can strike at any time and bring an organization to a halt. Modern IT-dependent businesses simply can’t afford for this to happen.
Thus the backup process is under more pressure than ever. Expectations are for no downtime and zero data loss. Many of the strategies we’ve outlined above simply can’t deliver those results.
Fortunately, purpose-built backup software can provide capabilities such as frequent intermittent backups, recovery in-place, secure cloud, DRaaS, and disaster recovery automation. Thanks to these modern technologies, providers like NinjaOne can deliver backup and recovery solutions that enable the organization to offer rapid recovery to a high number of applications without breaking the IT budget.
Building an efficient and effective IT team requires a centralized solution that acts as your core service deliver tool. NinjaOne enables IT teams to monitor, manage, secure, and support all their devices, wherever they are, without the need for complex on-premises infrastructure.