Backup Computer Data System

3-2-1 Computer backup slide

Your company needs to setup a system for assure backup computer data.

Most companies fully back up files on LANs and engineering workstations as a standard in today's business environment. However, companies commonly overlook backing up data files on stand-alone PCs.

The chances of a hard drive crash or a virus affecting your vital PC records occur far greater than a catastrophic event. Vital PC data files should be backed up and stored off site regularly. This improves recovery time and effort, and decreases the possibility of an extended business interruption or service reduction.

Vital PC records could include phone lists, financial records, project proposals, cost models, and many types of other important data. If no longer accessible, those records could interrupt daily business functions and increase the cost, time, and effort of full business recovery.

Employee Handbook Kit includes two Employee Handbook templates for Professional & Manufacturing. Includes over 60 policies and benefits templates.

Employee Handbook Policies & Benefits

Backup Computer Data Locations

Three backups should be maintained for all vital PC data files. Two of these backups should be on-site. One of these should be stored in a secure and fire protected area for operational recovery. Lastly one should be stored off-site for disaster recovery. This is called the 3-2-1 system of backup.

Follow these recommendations for off-site storage facilities:

  • The location should be far enough away so that it's not impacted by the disaster.
  • Physical controls, such as security, authorized access, environmental (heat, humidity, water, frost, etc.), and fire protection should be in place.
  • The facility should be accessible 24 hours a day, 365 days a year.

Once establishing the above controls, then document the backup procedures. Implement and teach these to the entire team of PC users. The documented backup procedures should include the following:

  • Label all backup files should to identify their content.
  • Document methods for transporting the media.
  • Compile a list of those authorized to retrieve off-site backups.
  • Create timetables for the creation and rotation of backup files.

Follow these steps to ensure that you are prepared. The time you take today could help avoid disaster tomorrow.

TrainingKeeper Software. Keep, organize and plan all your employees' training and activities. Software includes multi-user support with reports, certs, and calendars.

TrainingKeeper Software

Backup System Questions

Creating and labeling daily, weekly, and/or monthly backups of your information, based on how difficult it might be to recover / re-create, can save hours of heartache.

The time to create a backup computer data can range from five minutes to many hours depending on the size of the system or set of information you desire to have backed up. Always identify the contents, the date of the backup, and the data classification.

The information backed up, the number of backups, and the frequency of backups depends on your answers to the following questions:

  • What would happen to my business, my customer, and my colleagues if I lost this information and could not recover all or most of it?
  • Has data been added / modified / removed since the last backup?
  • Has there been a modification of the system, programs, or functions?
  • Do we have a system that automatically copies / backup PC files and folders to the Server?

You should make backup copies of all original software soon after installation. Follow these tips and never have to say "It's Gone"!

Widget is loading comments...

More Info

  • Learn the steps to conduct software installation and upgrade process within your business to prevent mishap.

    Software Installation and Upgrade Process

    Learn the steps to conduct software installation and upgrade process within your business to prevent mishap.

  • Learn how to protect against phishing. This article identifies the most common phishing attacks and the steps your company can take to eliminate them.

    How To Protect Against Phishing

    Learn how to protect against phishing. This article identifies the most common phishing attacks and the steps your company can take to eliminate them.

  • This article discusses how to prevent computer virus download. It covers methods of virus attacks, how to prevent company damage, and much more.

    Prevent Computer Virus Download

    This article discusses how to prevent computer virus download. It covers methods of virus attacks, how to prevent company damage, and much more.

  • Review this building security checklist for a list of do's and don'ts. Use this article to teach your employees about building security and social engineering threats.

    Building Security Checklist

    Review this building security checklist for a list of do's and don'ts. Use this article to teach your employees about building security and social engineering threats.

  • The future of computer security is biometric verification

    Biometric Verification

    The future of computer security is biometric verification

  • This article provides the key elements to include in an IT audit program. It considers current situation assesment, high level needs, organizational needs, PC user issues, manager responsibility, contigency, crisis, risk and a host of other issues.

    IT Audit Program

    This article provides the key elements to include in an IT audit program. It considers current situation assesment, high level needs, organizational needs, PC user issues, manager responsibility, contigency, crisis, risk and a host of other issues.

  • This article discusses business methods to prevent scary emails such as legal liability issues and describes other risks for allowing them.

    Prevent Scary Emails

    This article discusses business methods to prevent scary emails such as legal liability issues and describes other risks for allowing them.

  • This article covers network security information which focuses on IT Policy, Information Security Awareness, and IT Compliance

    Network Security Information

    This article covers network security information which focuses on IT Policy, Information Security Awareness, and IT Compliance

  • Data protection tips for your company. This article covers important issues for business data protection and data recovery

    Data Protection Tips

    Data protection tips for your company. This article covers important issues for business data protection and data recovery

  • This article covers a detailed corporate email policy. You can also freely download this policy.

    Corporate Email Policy

    This article covers a detailed corporate email policy. You can also freely download this policy.

  • This corporate internet policy covers criteria, personal use, violations, best practices and more. Download it for free and use it for your business!

    Corporate Internet Policy

    This corporate internet policy covers criteria, personal use, violations, best practices and more. Download it for free and use it for your business!

  • Company Strike Preparation guidelines minimize company risks and downtime during a company strike.

    Strike Preparation Guidelines

    Company Strike Preparation guidelines minimize company risks and downtime during a company strike.

  • Review this IT audit tool and guide. We cover scope, physical, access control, data and applications security issues. Learn what to look for and questions to ask during the audit. We also cover what to do prior and during an IT audit.

    IT Audit Tool and Guide

    Review this IT audit tool and guide. We cover scope, physical, access control, data and applications security issues. Learn what to look for and questions to ask during the audit. We also cover what to do prior and during an IT audit.

  • This article on information security notes and policy covers many key items your business needs to consider when setting up an information security system.

    Information Security Notes and Policy

    This article on information security notes and policy covers many key items your business needs to consider when setting up an information security system.

  • This article provides guidelines for creating a computer protection security policy at your workplace. It covers general principles, passwords, copyrights, licensing, protection, prevention, and security

    Computer Protection Security Guidelines

    This article provides guidelines for creating a computer protection security policy at your workplace. It covers general principles, passwords, copyrights, licensing, protection, prevention, and security


Quality Assurance Solutions
Robert Broughton
(805) 419-3344
USA
email
Enjoy this page? Please pay it forward. Here's how...

Would you prefer to share this page with others by linking to it?

  1. Click on the HTML link code below.
  2. Copy and paste it, adding a note of your own, into your blog, a Web page, forums, a blog comment, your Facebook account, or anywhere that someone would find this page valuable.

All Products

Software, Videos, Manuals, On-Line Certifications

PDCA Complete

An Organizational Task Management System. Projects, Meetings, Audits & more

8D Manager

Corrective Action Software

TrainingKeeper Software

Plan and Track Training

Snap Sampling Plans!

AQL Inspection Software

QAS Business Slide Deck

450+ Editable Slides with support links

TRIZ Kit

Learn and Train TRIZ

ISO 9001:2015 QA Manual

Editable Template

ISO 9001:2015 QMS Kit

Templates, Guides, QA Manual, Audit Checklists

ISO 14001:2015 EMS Kit

EMS Manual, Procedures, Forms, Examples, Audits, Videos

On-Line Accredited Certifications

Six Sigma, Risk Management, SCRUM

All Products

Software, Videos, Manuals, On-Line Certifications