Why Data Backup is Important for Your Business


In fact, if you review Cisco’s 2017 Annual Cybersecurity Report, you will see that the numbers related to ransomware and other attacks are quite alarming. In the report, we also learn that businesses have a lot more to lose than just data or money during an attack (and also why a corporate data backup strategy is so important.) Consider for a moment these sobering facts:

A Few Facts about Cyber Attacks and Data Loss

Data Backup for Business

  • More than half of all businesses that are victims of a cyber-attack or data breach are subsequently subject to public scrutiny and suffer losses in brand reputation, customer loyalty, and customer trust.
  • 29 percent of businesses that are victims of attacks lose revenue, and nearly 40 percent of those businesses lose more than 20 percent of total revenues.
  • Among companies that suffer attacks or breaches, nearly a quarter of them lose significant business opportunities following the data-loss event.
  • More than 20 percent of businesses that experience data loss or suffer a cyber-attack lose customers as well. And, 40 percent of those companies lose more than 20% of their customers.

Data loss
As you can see, the results of data loss due to cyber-attacks can be devastating for a business. However, as we will soon cover, cyber-attacks and ransomware are not the only threats to your business data. So, in this article, we will discuss the various threats to your business data and how an effective data disaster recovery plan can help protect against them.

Risks to Business Data Are Everywhere

Reports of malicious software and hackers are everywhere these days. And, while these types of threats do pose significant risks for businesses, they are also certainly not the only ones out there. So, with that in mind, we will cover some of the things that threaten your business data and put it at risk on a daily basis.

Hackers, Viruses, and Ransomware

As noted above, cyber-attacks are wreaking havoc for businesses everywhere. And, while hackers and ransomware outbreaks are certainly causing damage and making headlines, old-school malware, spyware, and old-fashioned viruses continue to be among the leading reasons for system breaches and data loss. With these types of threats, it is not a matter of when your business will become a victim; it’s just a question of when. Anti-malware and anti-virus software can help. Still, even with updated security software, most businesses remain exposed to the threat of data loss due to hackers, malware, and ransomware.

damage after the hurricane

Physical Disasters

With all the reports of cyber-attacks, hackers, and malware in the news these days, it is easy to overlook some of the more conventional physical threats your data faces every day. A fire, flood, or another type of natural disaster can wipe out all the data in your location and make recovery virtually impossible. And, if you don’t have multiple backups available, the simple theft of a hard drive or storage device could easily result in significant data loss. If that’s not enough, you should never take for granted the very real possibility of hard drive failures and other another types of hardware mishaps.

Protecting Business Data: Backup Basics

Simply put, a data backup is just a copy of files from your computer or device. And, as illustrated with the numerous threats described above, keeping a backup of your important business files and data is essential for several important reasons.
Virtually all computer and technology experts will tell you that any backup is better than none at all. Nevertheless, not all backup devices and technologies are the same; nor do they all offer the same levels of protection. Consequently, for optimal protection, it is best to safeguard your data using what we call the 3-2-1 rule. Put simply, the 3-2-1 rule states that you should:

  • Keep at least three (3) copies of your data (so no single event will destroy all copies);
  • Store the data in at least two (2) different formats (i.e. disk, tape, cloud, etc.);
  • Keep one (1) copy offsite to protect against fire, flood, theft, and other physical disasters.

To give you an idea of available options that can help you implement the 3-2-1 rule, let’s take a look at some of the most common methods businesses use to back up data.

Local and Network Backups

One of the easiest ways to create backups of business data is to simply store copies of important files on hard drives, tape drives or other storage devices connected to your systems or network. Copying files to hard drives, USB flash drives, external drives, or other devices attached to individual systems or devices connected via a local or wide area network is an effective way of ensuring backups are available locally when you need them. With any good data recovery plan, keeping local copies of backups is essential. However, due to risks associated with physical disasters, ransomware, theft, and other threats, keeping local backups should never be the only facet of your strategy. In addition to keeping up-to-date local backups of your files and data, you should always store at least one copy offsite as is required with the 3-2-1 rule (i.e. an offsite backup server or in the cloud.)

Cloud Backups

These days, it seems that wherever you turn, there is talk or news about businesses migrating to the cloud (or running software and systems remotely via the Internet.) And, backup solutions are no exception. In short, cloud backups are secure offsite copies of data that are stored on remote servers and accessed via an Internet connection. Cloud backups are an excellent option for providing additional redundancy and security for businesses that want to ensure their important data is available if and when onsite or physical data disasters strike.

Cloud Backups and Online File Storage Are Not the Same

Many businesses use Dropbox, Google Drive, and other online storage websites to store backup copies of important files. And, while these types of services are okay for storing and sharing a few files, limitations with online storage sites (i.e. limited file versioning, lack of automated backups, limited backup folders, etc.) prevent them from being true cloud backups. A true cloud backup service enables you to create automated backups of complete systems and store as many versions of backups as you need.)

Datto – The Proven Backup Solution for Business

As we covered above, there are many ways for your business to create backups of important data, and you should use multiple methods to ensure your files are always available when needed. Therefore, your business needs a backup solution that provides maximum ease of use and compatibility across all the mediums and platforms that you need and use. Our Datto appliances are a perfect solution.

Physical servers? Check! Virtual servers? Check! Workstations and laptops? Check! Google Apps, Office 365, Salesforce.com? Check! Check! Check! Datto gives you single–vendor accountability by offering on–prem devices, software for BYOD, and storage space in our own private cloud. The best part? With a ACS Datto solution, we can manage all these solutions in one single place for you.

Easily Automate and Quickly Deliver

Users lose files by deleting them, overwriting them, or when hardware fails. With our managed backup solutions, we simply schedule regular backups for a device… every 15-60 minutes

Hybrid Virtualization Options

If a business experiences a server failure, the protected systems can be virtualized almost instantly on the Datto device or in the secure Datto Cloud to have you up and operating while the affected system is being repaired or replaced

Image-Based Backup

Datto uses image-based backups to capture a complete picture of a protected workstation or server.

Get Up and Running Fast: World’s Fastest Data Recovery

Fast and Easy File Restoration

Always be a step ahead of ransomware and other threats with a quick and simple file restoration process that protects you from lost or corrupt data

Instant Virtualization – Recover with a single click

Datto provides image based backups that can be Instantly Virtualized within the device – or the secure Datto Cloud – with the click of a button.

First response after attack

When disaster strikes, you need to act fast! Get more than just one server back up and running; virtualize your entire Infrastructure with the click of a few buttons.

Advanced Screenshot Verification

Get a sense of security that a server has been properly constructed as a bootable image with a screenshot or take it to the next level with additional verification options.

Ransomware Detection and Alerting

Unique multi-stage detection finds lurking ransomware and sends alerts.

Point in time rollbacks

The only sure way to resolve a ransomware attack is to roll back the affected systems to make it as if it never happened. Datto, with point in time rollback, is designed to recover from just these scenarios.

Instant virtualization

In a disaster recovery scenario, seconds matter. Leveraging fully constructed “copy on write” snapshots, We can boot images of your servers in as little as 6 seconds.