SlideShare a Scribd company logo
WELCOME TO:
BACKUP & DISASTER RECOVERY
FOR
BUSINESS OWNERS & DIRECTORS
Backup
backup
/ˈbakʌp/
noun
• In information technology, a backup, or the process of backing up,
refers to the copying and archiving of computer data so it may be
used to restore the original after a data loss event
Data repository models
Any backup strategy starts with a concept of a data repository. The backup data needs to be
stored, and should be organised.
Different approaches have different advantages. Part of the model is the backup rotation
scheme.
How to store your backups
Unstructured
An unstructured repository may be CDs, DVDs or USB drives. This is the most simple form but has
the lowest success rate for data recovery.
Incremental
An incremental-style repository aims to make it more feasible to store backups from more points in
time by organising the data into increments of change.
Differential
Each differential backup saves the data that has changed since the last full backup.
Continuous
Instead of scheduling periodic backups, the system continuously logs changes on the host system.
Storage Media
In order of reliability, the types of storage media for your backups are:
• Optical Disks
• Tapes
• USB Disk
• Disk to Disk
• Offsite Backup
• Cloud
Testing your backup
When was the last time you tested your backup?
All too often testing is the missing step in the Backup Strategy.
Companies make substantial investments and spend a lot of time backing up their data only to
find the backups won't work when something goes wrong with their data storage.
According to "The Symantec Disaster Recovery Research " report, 48% of the disaster
recovery tests run by companies fail.
Testing – what to do
Step 1. Test your backups regularly
Step 2. Test realistically
Step 3. Test systematically
Step 4. Test everything.
Director’s responsibility
Gartner Group says that 43% of companies were immediately put out of business by a “major loss” of
computer records, and another 51% permanently closed their doors within two years.
As a Business Owner or Director not only do you have a moral obligation to your staff, you also have a
legal obligation under your Duty of Care.
Many companies give the role of changing, storing or transporting their data backup to someone with no
knowledge of the procedure they are carrying out.
Imagine if that data went missing and you could no longer access it. How would you do business? How
long – hours or days – could you survive without your data?
The data that is stored in your system is often worth millions of pounds, if this was physical cash would
you take more steps to protect it?
Disaster Recovery
The terms Backup and Disaster Recovery (DR) are often misused and misunderstood when
discussing the growing need to protect data and IT systems. As security breaches become
more commonplace it is important to understand the difference between the two.
Having a Backup strategy is not the same as having a DR strategy. In basic terms a Backup is
having a copy of your data, whilst DR is the strategy to recover your essential IT environment
in the event that it is compromised.
The Ugly
A large company in Yorkshire trusted that their IT Support company was backing up
their system. Recently they fell victim to Cryptovirus and spent two weeks trying to
recover their critical data and server. The last viable backup they had was from May,
meaning they lost five months’ worth of data.
The cost to this company in lost revenue was £30k-£40k.
This doesn’t take into account the time to manually input data they could only
recover from paper records, and worse the emotional impact on the staff who were
unsure about the future of the company and therefore their jobs.
This company trusted that the people they employed to look after their backup were
doing this correctly, but had not tested it themselves. The result of this was that
when they truly needed their backup it failed.
How expensive is BUDR?
When looking at Backup and DR it is important that a cost versus value analysis is carried out.
If we break it down by turnover versus cost of BUDR, based on 254 working days per year, we
can calculate the cost versus value as:
£1m annual turnover = £3,937 per day or £82,677 per month.
Average cost of BUDR = £23.80 per day or £500 per month
With an annual turnover of £1 million, this is 0.7% of the monthly turnover cost to secure your
business’ data.
How expensive is BUDR?
ANNUAL TURNOVER DAILY REVENUE
(254 WORKING DAYS)
MONTHLY REVENUE
(21 WORKING DAYS)
£1 million £3,937 £82,677
£3 million £11,811 £248,031
£5 million £19,685 £413,385
£10 million £39,370 £826,770
The average cost of BUDR is just 0.13% of a 5 million turnover company.
When hit by a major catastrophe most companies experience 10-15 days of
lost business. With the above figures and based on £1 million annual turnover,
the loss incurred would pay for advanced cloud backup for 7.5 years.
Secure your business
Practical steps to improve your data security:
Cyber Scams:
• Do your staff know how to spot potential cyber scams such as fake invoices, the ‘bogus boss’ scam or
emails containing Cryptolocker?
• Would your staff know what to do if hit by a cyber scam?
Backup:
• Do you know how your company backs up its data?
• When was the last time you tested your backup?
• Do you know how long your business could survive without its data?
• Do you understand the reputational damage your business could sustain from a data loss?
Disaster Recovery:
• Identify the key systems the business cannot function without
• Decide how long the business can function with each of the key systems offline
• Decide how much data the business can afford to lose (if any)
• Decide how a DR system would take over (manual/automatic)
Summary
• If your business is important to you, it is worth protecting it with a Backup & Disaster Recovery strategy
that you can be confident works
• Educate your staff of the latest cyber scams and types of Ransomware attacks (ask AAG for posters
for your office)
• Test your current backup
• Review your disaster recovery plan
• Implement a Responsibilities chart
• Book an independent consultation with AAG to assist with the above.
sales@aagsystems.co.uk www.facebook.com/aagsystems 0114 399 0995

More Related Content

What's hot

bus43-copier-data-security
bus43-copier-data-securitybus43-copier-data-security
bus43-copier-data-securityEd Worthington
 
CLOUD-BASED BACKUP AND DISASTER RECOVERY. MANAGE. PROTECT. RECOVER
CLOUD-BASED BACKUP AND DISASTER RECOVERY. MANAGE. PROTECT. RECOVERCLOUD-BASED BACKUP AND DISASTER RECOVERY. MANAGE. PROTECT. RECOVER
CLOUD-BASED BACKUP AND DISASTER RECOVERY. MANAGE. PROTECT. RECOVER
Nexon Asia Pacific
 
Business Copier Data Security
Business Copier Data SecurityBusiness Copier Data Security
Business Copier Data Security
- Mark - Fullbright
 
Data_Protection_WP - Jon Toigo
Data_Protection_WP - Jon ToigoData_Protection_WP - Jon Toigo
Data_Protection_WP - Jon ToigoEd Ahl
 
The economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your businessThe economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your businessServium
 
Disaster Recovery - Deep Dive
Disaster Recovery - Deep DiveDisaster Recovery - Deep Dive
Disaster Recovery - Deep Dive
Envision Technology Advisors
 
Business Continuity for Mission Critical Applications
Business Continuity for Mission Critical ApplicationsBusiness Continuity for Mission Critical Applications
Business Continuity for Mission Critical Applications
DataCore Software
 
7 deadly sins of backup and recovery
7 deadly sins of backup and recovery7 deadly sins of backup and recovery
7 deadly sins of backup and recoverygeekmodeboy
 
Black Box Backup System
Black Box Backup SystemBlack Box Backup System
Black Box Backup System
CSCJournals
 
E-Discovery Infographic: Reasonable Preservation Process under FRCP Rule 37(e)
E-Discovery Infographic: Reasonable Preservation Process under FRCP Rule 37(e) E-Discovery Infographic: Reasonable Preservation Process under FRCP Rule 37(e)
E-Discovery Infographic: Reasonable Preservation Process under FRCP Rule 37(e)
Exterro
 
Mbrojtje e te Dhenave nga DellEMC - Sinteza Co
Mbrojtje e te Dhenave nga DellEMC - Sinteza CoMbrojtje e te Dhenave nga DellEMC - Sinteza Co
Mbrojtje e te Dhenave nga DellEMC - Sinteza Co
SintezaCo
 
Database admiistration
Database admiistrationDatabase admiistration
Database admiistration
Aashima Wadhwa
 
V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...VMware_EMEA
 
Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Iron Mountain
 
How Safe and Always-Available Data as Lifeblood Helps a University Medical Ce...
How Safe and Always-Available Data as Lifeblood Helps a University Medical Ce...How Safe and Always-Available Data as Lifeblood Helps a University Medical Ce...
How Safe and Always-Available Data as Lifeblood Helps a University Medical Ce...
Dana Gardner
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanRishu Mehra
 
Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backupPdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
lverb
 
Disaster recovery plan sample 2
Disaster recovery plan sample 2Disaster recovery plan sample 2
Disaster recovery plan sample 2
AbenetAsmellash
 
Bcp
BcpBcp
Bcp
madunix
 

What's hot (19)

bus43-copier-data-security
bus43-copier-data-securitybus43-copier-data-security
bus43-copier-data-security
 
CLOUD-BASED BACKUP AND DISASTER RECOVERY. MANAGE. PROTECT. RECOVER
CLOUD-BASED BACKUP AND DISASTER RECOVERY. MANAGE. PROTECT. RECOVERCLOUD-BASED BACKUP AND DISASTER RECOVERY. MANAGE. PROTECT. RECOVER
CLOUD-BASED BACKUP AND DISASTER RECOVERY. MANAGE. PROTECT. RECOVER
 
Business Copier Data Security
Business Copier Data SecurityBusiness Copier Data Security
Business Copier Data Security
 
Data_Protection_WP - Jon Toigo
Data_Protection_WP - Jon ToigoData_Protection_WP - Jon Toigo
Data_Protection_WP - Jon Toigo
 
The economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your businessThe economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your business
 
Disaster Recovery - Deep Dive
Disaster Recovery - Deep DiveDisaster Recovery - Deep Dive
Disaster Recovery - Deep Dive
 
Business Continuity for Mission Critical Applications
Business Continuity for Mission Critical ApplicationsBusiness Continuity for Mission Critical Applications
Business Continuity for Mission Critical Applications
 
7 deadly sins of backup and recovery
7 deadly sins of backup and recovery7 deadly sins of backup and recovery
7 deadly sins of backup and recovery
 
Black Box Backup System
Black Box Backup SystemBlack Box Backup System
Black Box Backup System
 
E-Discovery Infographic: Reasonable Preservation Process under FRCP Rule 37(e)
E-Discovery Infographic: Reasonable Preservation Process under FRCP Rule 37(e) E-Discovery Infographic: Reasonable Preservation Process under FRCP Rule 37(e)
E-Discovery Infographic: Reasonable Preservation Process under FRCP Rule 37(e)
 
Mbrojtje e te Dhenave nga DellEMC - Sinteza Co
Mbrojtje e te Dhenave nga DellEMC - Sinteza CoMbrojtje e te Dhenave nga DellEMC - Sinteza Co
Mbrojtje e te Dhenave nga DellEMC - Sinteza Co
 
Database admiistration
Database admiistrationDatabase admiistration
Database admiistration
 
V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...
 
Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?Are Your PCs and Laptops Recovery and Discovery Ready?
Are Your PCs and Laptops Recovery and Discovery Ready?
 
How Safe and Always-Available Data as Lifeblood Helps a University Medical Ce...
How Safe and Always-Available Data as Lifeblood Helps a University Medical Ce...How Safe and Always-Available Data as Lifeblood Helps a University Medical Ce...
How Safe and Always-Available Data as Lifeblood Helps a University Medical Ce...
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery Plan
 
Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backupPdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
 
Disaster recovery plan sample 2
Disaster recovery plan sample 2Disaster recovery plan sample 2
Disaster recovery plan sample 2
 
Bcp
BcpBcp
Bcp
 

Viewers also liked

[Name Sponged] Consulting Project (2)
[Name Sponged] Consulting Project (2)[Name Sponged] Consulting Project (2)
[Name Sponged] Consulting Project (2)Ryan Elder
 
بیخدایی و لاادری گری
بیخدایی و لاادری گریبیخدایی و لاادری گری
بیخدایی و لاادری گری
ketabbb
 
Vance Loiselle TU Automotive Keynote
Vance Loiselle TU Automotive KeynoteVance Loiselle TU Automotive Keynote
Vance Loiselle TU Automotive Keynote
TrueMotion
 
4_Steps_Retirement_Planning_v2
4_Steps_Retirement_Planning_v24_Steps_Retirement_Planning_v2
4_Steps_Retirement_Planning_v2David Kujawa ChFC
 
iRODS UGM 2016 Preso Summary FINAL
iRODS UGM 2016 Preso Summary FINALiRODS UGM 2016 Preso Summary FINAL
iRODS UGM 2016 Preso Summary FINALRandy Splinter
 
conceptos de informatica
conceptos de informaticaconceptos de informatica
conceptos de informatica
caritotrujillor
 
Relieve costero
Relieve costeroRelieve costero
Relieve costero
jcsar07
 
Informatica
InformaticaInformatica
Informatica
Sol64
 
Aplikom_UNSRI_3. 8 unsur_Santi Puspita Dewi
Aplikom_UNSRI_3. 8 unsur_Santi Puspita DewiAplikom_UNSRI_3. 8 unsur_Santi Puspita Dewi
Aplikom_UNSRI_3. 8 unsur_Santi Puspita Dewi
santi_puspita25
 
La evolución de la web
La evolución de la webLa evolución de la web
La evolución de la web
Santiagorr15
 
Google maps sol y kary
Google maps sol y karyGoogle maps sol y kary
Google maps sol y kary
Sol64
 
Ally and shadow Sample Plot
Ally and shadow Sample PlotAlly and shadow Sample Plot
Ally and shadow Sample Plot
Jaide Stepter
 
INFRASTRUCTURE-IT
INFRASTRUCTURE-ITINFRASTRUCTURE-IT
INFRASTRUCTURE-ITsundar raj
 
50 States Survey Complete with Notes 7-061
50 States Survey Complete with Notes 7-06150 States Survey Complete with Notes 7-061
50 States Survey Complete with Notes 7-061Abby Ruskey
 
FedEx SupplyChain Customer Success Story_Fulfillment
FedEx SupplyChain Customer Success Story_FulfillmentFedEx SupplyChain Customer Success Story_Fulfillment
FedEx SupplyChain Customer Success Story_FulfillmentDamian Gilbertson
 
Tarea 2 seminario
Tarea 2 seminarioTarea 2 seminario
Tarea 2 seminario
Sandra Garcia Portillo
 
Easytech Webpage doc
Easytech Webpage docEasytech Webpage doc
Easytech Webpage docEben Glaser
 

Viewers also liked (19)

[Name Sponged] Consulting Project (2)
[Name Sponged] Consulting Project (2)[Name Sponged] Consulting Project (2)
[Name Sponged] Consulting Project (2)
 
بیخدایی و لاادری گری
بیخدایی و لاادری گریبیخدایی و لاادری گری
بیخدایی و لاادری گری
 
Vance Loiselle TU Automotive Keynote
Vance Loiselle TU Automotive KeynoteVance Loiselle TU Automotive Keynote
Vance Loiselle TU Automotive Keynote
 
4_Steps_Retirement_Planning_v2
4_Steps_Retirement_Planning_v24_Steps_Retirement_Planning_v2
4_Steps_Retirement_Planning_v2
 
iRODS UGM 2016 Preso Summary FINAL
iRODS UGM 2016 Preso Summary FINALiRODS UGM 2016 Preso Summary FINAL
iRODS UGM 2016 Preso Summary FINAL
 
conceptos de informatica
conceptos de informaticaconceptos de informatica
conceptos de informatica
 
Avni YÜKSEL-CV
Avni YÜKSEL-CVAvni YÜKSEL-CV
Avni YÜKSEL-CV
 
Relieve costero
Relieve costeroRelieve costero
Relieve costero
 
Informatica
InformaticaInformatica
Informatica
 
Aplikom_UNSRI_3. 8 unsur_Santi Puspita Dewi
Aplikom_UNSRI_3. 8 unsur_Santi Puspita DewiAplikom_UNSRI_3. 8 unsur_Santi Puspita Dewi
Aplikom_UNSRI_3. 8 unsur_Santi Puspita Dewi
 
La evolución de la web
La evolución de la webLa evolución de la web
La evolución de la web
 
Google maps sol y kary
Google maps sol y karyGoogle maps sol y kary
Google maps sol y kary
 
Ally and shadow Sample Plot
Ally and shadow Sample PlotAlly and shadow Sample Plot
Ally and shadow Sample Plot
 
INFRASTRUCTURE-IT
INFRASTRUCTURE-ITINFRASTRUCTURE-IT
INFRASTRUCTURE-IT
 
50 States Survey Complete with Notes 7-061
50 States Survey Complete with Notes 7-06150 States Survey Complete with Notes 7-061
50 States Survey Complete with Notes 7-061
 
FedEx SupplyChain Customer Success Story_Fulfillment
FedEx SupplyChain Customer Success Story_FulfillmentFedEx SupplyChain Customer Success Story_Fulfillment
FedEx SupplyChain Customer Success Story_Fulfillment
 
Tarea 2 seminario
Tarea 2 seminarioTarea 2 seminario
Tarea 2 seminario
 
nsf-1701_testreport
nsf-1701_testreportnsf-1701_testreport
nsf-1701_testreport
 
Easytech Webpage doc
Easytech Webpage docEasytech Webpage doc
Easytech Webpage doc
 

Similar to Backup & Disaster Recovery for Business Owners & Directors

Backup and Disaster Recovery for Business Owners and Directors
Backup and Disaster Recovery for Business Owners and DirectorsBackup and Disaster Recovery for Business Owners and Directors
Backup and Disaster Recovery for Business Owners and Directors
Lucy Denver
 
Small Business Owners.pdf
Small Business Owners.pdfSmall Business Owners.pdf
Small Business Owners.pdf
CIOWomenMagazine
 
The cost of downtime
The cost of downtimeThe cost of downtime
The cost of downtime
BillyHosking
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planning
AureusIT
 
The Ultimate Data Protection Solution
The Ultimate Data Protection SolutionThe Ultimate Data Protection Solution
The Ultimate Data Protection Solution
Namtek Consulting Services
 
Disaster Recovery Plan
Disaster Recovery Plan Disaster Recovery Plan
Disaster Recovery Plan
Emilie Gray
 
The buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionThe buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protection
Kingfin Enterprises Limited
 
TechMD - Backup vs Business Continuity
TechMD - Backup vs Business ContinuityTechMD - Backup vs Business Continuity
TechMD - Backup vs Business Continuity
TechMD
 
Microsoft Whitepaper: Disaster Preparedness Guide
Microsoft Whitepaper: Disaster Preparedness GuideMicrosoft Whitepaper: Disaster Preparedness Guide
Microsoft Whitepaper: Disaster Preparedness Guide
DWP Information Architects Inc.
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recoverymrmwood
 
Delivering Backup as a service
Delivering Backup as a serviceDelivering Backup as a service
Delivering Backup as a service
4sl
 
The New Rules For IT Security - SME's
The New Rules For IT Security - SME'sThe New Rules For IT Security - SME's
The New Rules For IT Security - SME's
Bright Technology
 
9 Steps to Successful Information Lifecycle Management
9 Steps to Successful Information Lifecycle Management9 Steps to Successful Information Lifecycle Management
9 Steps to Successful Information Lifecycle Management
Iron Mountain
 
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and ResilienceMastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
MaryJWilliams2
 
Remote Data Backup Protection
Remote Data Backup ProtectionRemote Data Backup Protection
Remote Data Backup Protection
CrystaLink Inc.
 
Ultan kinahan dr - minasi 2010
Ultan kinahan   dr - minasi 2010Ultan kinahan   dr - minasi 2010
Ultan kinahan dr - minasi 2010
Nathan Winters
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
Policypros.co.uk
 
Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdf
Ashraf Hossain
 
HPE Data Protector Best Practice Guide
HPE Data Protector Best Practice GuideHPE Data Protector Best Practice Guide
HPE Data Protector Best Practice Guide
Andrey Karpov
 
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperWill You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Christian Caracciolo
 

Similar to Backup & Disaster Recovery for Business Owners & Directors (20)

Backup and Disaster Recovery for Business Owners and Directors
Backup and Disaster Recovery for Business Owners and DirectorsBackup and Disaster Recovery for Business Owners and Directors
Backup and Disaster Recovery for Business Owners and Directors
 
Small Business Owners.pdf
Small Business Owners.pdfSmall Business Owners.pdf
Small Business Owners.pdf
 
The cost of downtime
The cost of downtimeThe cost of downtime
The cost of downtime
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planning
 
The Ultimate Data Protection Solution
The Ultimate Data Protection SolutionThe Ultimate Data Protection Solution
The Ultimate Data Protection Solution
 
Disaster Recovery Plan
Disaster Recovery Plan Disaster Recovery Plan
Disaster Recovery Plan
 
The buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionThe buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protection
 
TechMD - Backup vs Business Continuity
TechMD - Backup vs Business ContinuityTechMD - Backup vs Business Continuity
TechMD - Backup vs Business Continuity
 
Microsoft Whitepaper: Disaster Preparedness Guide
Microsoft Whitepaper: Disaster Preparedness GuideMicrosoft Whitepaper: Disaster Preparedness Guide
Microsoft Whitepaper: Disaster Preparedness Guide
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
 
Delivering Backup as a service
Delivering Backup as a serviceDelivering Backup as a service
Delivering Backup as a service
 
The New Rules For IT Security - SME's
The New Rules For IT Security - SME'sThe New Rules For IT Security - SME's
The New Rules For IT Security - SME's
 
9 Steps to Successful Information Lifecycle Management
9 Steps to Successful Information Lifecycle Management9 Steps to Successful Information Lifecycle Management
9 Steps to Successful Information Lifecycle Management
 
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and ResilienceMastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
 
Remote Data Backup Protection
Remote Data Backup ProtectionRemote Data Backup Protection
Remote Data Backup Protection
 
Ultan kinahan dr - minasi 2010
Ultan kinahan   dr - minasi 2010Ultan kinahan   dr - minasi 2010
Ultan kinahan dr - minasi 2010
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
 
Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdf
 
HPE Data Protector Best Practice Guide
HPE Data Protector Best Practice GuideHPE Data Protector Best Practice Guide
HPE Data Protector Best Practice Guide
 
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperWill You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
 

Recently uploaded

Protected Workmen required today for growth
Protected Workmen required today for growthProtected Workmen required today for growth
Protected Workmen required today for growth
rivaraj2711
 
Founder-Game Director Workshop (Session 1)
Founder-Game Director  Workshop (Session 1)Founder-Game Director  Workshop (Session 1)
Founder-Game Director Workshop (Session 1)
Amir H. Fassihi
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
William (Bill) H. Bender, FCSI
 
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
tdt5v4b
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
Muhammad Adil Jamil
 
W.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest ExperienceW.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest Experience
William (Bill) H. Bender, FCSI
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
gcljeuzdu
 
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
juniourjohnstone
 
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
tdt5v4b
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
A. F. M. Rubayat-Ul Jannat
 
TCS AI for Business Study – Key Findings
TCS AI for Business Study – Key FindingsTCS AI for Business Study – Key Findings
TCS AI for Business Study – Key Findings
Tata Consultancy Services
 
Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
Jim Smith
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
tdt5v4b
 
Training- integrated management system (iso)
Training- integrated management system (iso)Training- integrated management system (iso)
Training- integrated management system (iso)
akaash13
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
tdt5v4b
 
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish GermanCV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
EUS+ Management & Consulting Excellence
 

Recently uploaded (16)

Protected Workmen required today for growth
Protected Workmen required today for growthProtected Workmen required today for growth
Protected Workmen required today for growth
 
Founder-Game Director Workshop (Session 1)
Founder-Game Director  Workshop (Session 1)Founder-Game Director  Workshop (Session 1)
Founder-Game Director Workshop (Session 1)
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
 
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
 
W.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest ExperienceW.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest Experience
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
 
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
 
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
 
TCS AI for Business Study – Key Findings
TCS AI for Business Study – Key FindingsTCS AI for Business Study – Key Findings
TCS AI for Business Study – Key Findings
 
Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
 
Training- integrated management system (iso)
Training- integrated management system (iso)Training- integrated management system (iso)
Training- integrated management system (iso)
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
 
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish GermanCV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
CV Ensio Suopanki1.pdf ENGLISH Russian Finnish German
 

Backup & Disaster Recovery for Business Owners & Directors

  • 1. WELCOME TO: BACKUP & DISASTER RECOVERY FOR BUSINESS OWNERS & DIRECTORS
  • 2. Backup backup /ˈbakʌp/ noun • In information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event
  • 3. Data repository models Any backup strategy starts with a concept of a data repository. The backup data needs to be stored, and should be organised. Different approaches have different advantages. Part of the model is the backup rotation scheme.
  • 4. How to store your backups Unstructured An unstructured repository may be CDs, DVDs or USB drives. This is the most simple form but has the lowest success rate for data recovery. Incremental An incremental-style repository aims to make it more feasible to store backups from more points in time by organising the data into increments of change. Differential Each differential backup saves the data that has changed since the last full backup. Continuous Instead of scheduling periodic backups, the system continuously logs changes on the host system.
  • 5. Storage Media In order of reliability, the types of storage media for your backups are: • Optical Disks • Tapes • USB Disk • Disk to Disk • Offsite Backup • Cloud
  • 6. Testing your backup When was the last time you tested your backup? All too often testing is the missing step in the Backup Strategy. Companies make substantial investments and spend a lot of time backing up their data only to find the backups won't work when something goes wrong with their data storage. According to "The Symantec Disaster Recovery Research " report, 48% of the disaster recovery tests run by companies fail.
  • 7. Testing – what to do Step 1. Test your backups regularly Step 2. Test realistically Step 3. Test systematically Step 4. Test everything.
  • 8. Director’s responsibility Gartner Group says that 43% of companies were immediately put out of business by a “major loss” of computer records, and another 51% permanently closed their doors within two years. As a Business Owner or Director not only do you have a moral obligation to your staff, you also have a legal obligation under your Duty of Care. Many companies give the role of changing, storing or transporting their data backup to someone with no knowledge of the procedure they are carrying out. Imagine if that data went missing and you could no longer access it. How would you do business? How long – hours or days – could you survive without your data? The data that is stored in your system is often worth millions of pounds, if this was physical cash would you take more steps to protect it?
  • 9. Disaster Recovery The terms Backup and Disaster Recovery (DR) are often misused and misunderstood when discussing the growing need to protect data and IT systems. As security breaches become more commonplace it is important to understand the difference between the two. Having a Backup strategy is not the same as having a DR strategy. In basic terms a Backup is having a copy of your data, whilst DR is the strategy to recover your essential IT environment in the event that it is compromised.
  • 10. The Ugly A large company in Yorkshire trusted that their IT Support company was backing up their system. Recently they fell victim to Cryptovirus and spent two weeks trying to recover their critical data and server. The last viable backup they had was from May, meaning they lost five months’ worth of data. The cost to this company in lost revenue was £30k-£40k. This doesn’t take into account the time to manually input data they could only recover from paper records, and worse the emotional impact on the staff who were unsure about the future of the company and therefore their jobs. This company trusted that the people they employed to look after their backup were doing this correctly, but had not tested it themselves. The result of this was that when they truly needed their backup it failed.
  • 11. How expensive is BUDR? When looking at Backup and DR it is important that a cost versus value analysis is carried out. If we break it down by turnover versus cost of BUDR, based on 254 working days per year, we can calculate the cost versus value as: £1m annual turnover = £3,937 per day or £82,677 per month. Average cost of BUDR = £23.80 per day or £500 per month With an annual turnover of £1 million, this is 0.7% of the monthly turnover cost to secure your business’ data.
  • 12. How expensive is BUDR? ANNUAL TURNOVER DAILY REVENUE (254 WORKING DAYS) MONTHLY REVENUE (21 WORKING DAYS) £1 million £3,937 £82,677 £3 million £11,811 £248,031 £5 million £19,685 £413,385 £10 million £39,370 £826,770 The average cost of BUDR is just 0.13% of a 5 million turnover company. When hit by a major catastrophe most companies experience 10-15 days of lost business. With the above figures and based on £1 million annual turnover, the loss incurred would pay for advanced cloud backup for 7.5 years.
  • 13. Secure your business Practical steps to improve your data security: Cyber Scams: • Do your staff know how to spot potential cyber scams such as fake invoices, the ‘bogus boss’ scam or emails containing Cryptolocker? • Would your staff know what to do if hit by a cyber scam? Backup: • Do you know how your company backs up its data? • When was the last time you tested your backup? • Do you know how long your business could survive without its data? • Do you understand the reputational damage your business could sustain from a data loss? Disaster Recovery: • Identify the key systems the business cannot function without • Decide how long the business can function with each of the key systems offline • Decide how much data the business can afford to lose (if any) • Decide how a DR system would take over (manual/automatic)
  • 14. Summary • If your business is important to you, it is worth protecting it with a Backup & Disaster Recovery strategy that you can be confident works • Educate your staff of the latest cyber scams and types of Ransomware attacks (ask AAG for posters for your office) • Test your current backup • Review your disaster recovery plan • Implement a Responsibilities chart • Book an independent consultation with AAG to assist with the above. sales@aagsystems.co.uk www.facebook.com/aagsystems 0114 399 0995

Editor's Notes

  1. Unstructured. This is the easiest to implement, but probably the least likely to achieve a high level of recoverability as it lacks automation. Incremental - Restoring the whole system to the date of the last incremental backup would require starting from the last full backup taken before the data loss, and then applying in turn each of the incremental backups Differential. It has the advantage that only a maximum of two data sets are needed to restore the data. One disadvantage, compared to the incremental backup method, is that as time from the last full backup (and thus the accumulated changes in data) increases, so does the time to perform the differential backup. Restoring an entire system would require starting from the most recent full backup and then applying just the last differential backup since the last full backup. Continuous-This is generally done by saving byte or block-level differences rather than file-level differences.[5] It differs from simple disk mirroring in that it enables a roll-back of the log and thus restoration of old images of data.
  2. Unstructured. This is the easiest to implement, but probably the least likely to achieve a high level of recoverability as it lacks automation. Incremental - Restoring the whole system to the date of the last incremental backup would require starting from the last full backup taken before the data loss, and then applying in turn each of the incremental backups Differential. It has the advantage that only a maximum of two data sets are needed to restore the data. One disadvantage, compared to the incremental backup method, is that as time from the last full backup (and thus the accumulated changes in data) increases, so does the time to perform the differential backup. Restoring an entire system would require starting from the most recent full backup and then applying just the last differential backup since the last full backup. Continuous-This is generally done by saving byte or block-level differences rather than file-level differences.[5] It differs from simple disk mirroring in that it enables a roll-back of the log and thus restoration of old images of data.
  3. Tapes – relatively low cost and high storage – prone to corruption USB Disks – cheap for high storage size , slow to recover from
  4. Regular - most large companies test DR plans at least once a year. Simple backups should be tested much more frequently -- at least once a quarter and whenever there is a major hardware or software change to your backup system. It's particularly important to run a test after upgrading the firmware in your backup system to make sure the new firmware works properly with the rest of your system. Realsitically - As much as possible, your test should duplicate the conditions you will face when you need to actually restore. The ideal situation would be to do a complete restoration of all your data to a second system with an identical configuration. This isn't always possible, of course, but you should test as much of the backup as you can on as much of the backup system as feasible. Systematically - Testing should consist of more than simply poking around. For example, if you just restore a couple of files you can't be sure that your directory trees and other features are working as they are supposed to. When you test a restore, take a minute to study the directories to make sure everything that should be backed up is actually backed up. The test should include restoring entire folders, complete with subfolders, as well as one or more critical applications. Everything -Every critical application should be tested regularly, if not on every test. Pay special attention to complex applications. Microsoft Exchange, for example, is a particular problem because of its complex database structure. (An Exchange database is actually several linked databases
  5. Regular - most large companies test DR plans at least once a year. Simple backups should be tested much more frequently -- at least once a quarter and whenever there is a major hardware or software change to your backup system. It's particularly important to run a test after upgrading the firmware in your backup system to make sure the new firmware works properly with the rest of your system. Realsitically - As much as possible, your test should duplicate the conditions you will face when you need to actually restore. The ideal situation would be to do a complete restoration of all your data to a second system with an identical configuration. This isn't always possible, of course, but you should test as much of the backup as you can on as much of the backup system as feasible. Systematically - Testing should consist of more than simply poking around. For example, if you just restore a couple of files you can't be sure that your directory trees and other features are working as they are supposed to. When you test a restore, take a minute to study the directories to make sure everything that should be backed up is actually backed up. The test should include restoring entire folders, complete with subfolders, as well as one or more critical applications. Everything -Every critical application should be tested regularly, if not on every test. Pay special attention to complex applications. Microsoft Exchange, for example, is a particular problem because of its complex database structure. (An Exchange database is actually several linked databases
  6. Regular - most large companies test DR plans at least once a year. Simple backups should be tested much more frequently -- at least once a quarter and whenever there is a major hardware or software change to your backup system. It's particularly important to run a test after upgrading the firmware in your backup system to make sure the new firmware works properly with the rest of your system. Realsitically - As much as possible, your test should duplicate the conditions you will face when you need to actually restore. The ideal situation would be to do a complete restoration of all your data to a second system with an identical configuration. This isn't always possible, of course, but you should test as much of the backup as you can on as much of the backup system as feasible. Systematically - Testing should consist of more than simply poking around. For example, if you just restore a couple of files you can't be sure that your directory trees and other features are working as they are supposed to. When you test a restore, take a minute to study the directories to make sure everything that should be backed up is actually backed up. The test should include restoring entire folders, complete with subfolders, as well as one or more critical applications. Everything -Every critical application should be tested regularly, if not on every test. Pay special attention to complex applications. Microsoft Exchange, for example, is a particular problem because of its complex database structure. (An Exchange database is actually several linked databases