Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You May Have a Backup, But Could it Be Better?

You May Have a Backup, But Could it Be Better?

Data backup is important for businesses that want to keep their data safe in the event of a disaster scenario, but each organization’s specific needs will vary. One thing is important to keep in mind, though, and it’s that your business can’t afford to not have data backup. In other words, you need to be prepared for any situation so that you aren’t left wondering if you’re ready to deal with a disaster scenario.

Here are four major topics to consider the next time you’re thinking about whether or not your data backup practices are up to snuff.

Which Data Are You Backing Up?
How much of your data are you realistically backing up? The answer we are looking for is “as much as possible.” Granted, if you have legal obligations to back up specific information, those obviously have to be prioritized. The last thing you want is to suffer from compliance-based fines on your organization for not properly handling sensitive information.

Are You Protecting Your Data Backups?
The last thing you want to do is store your data backups in an unsecured location, particularly if that location is on-site. If a hacker attacks the network or you experience a crippling data loss disaster due to a natural occurrence, such as a fire or a power surge, any unprotected backups on your infrastructure will be destroyed as well. It’s true that having a backup stored on your network is helpful, but it’s equally important that you protect it and have an extra stored off-site for later access.

Where Are Your Backups Stored?
It might be convenient to have an on-site data backup, but it’s equally important to have multiple copies of it backed up. To this end, we recommend implementing the 3-2-1 rule. You keep three backups of your data altogether--one on-site for easy access, and two either off-site or in the cloud for easy restoration in the event of an incident.

Have You Tested the Reliability of the System?
If your backup systems don’t work, then why are you using them? You’ll never know until you try to restore your data, in which case it will be too late. To avoid this situation, you should frequently be testing your backups to ensure they work. Otherwise, you could be staring a disaster in the face and not have a solution immediately on-hand to remedy it.

Decatur Computers Inc. can help your business implement a Backup and Disaster Recovery (BDR) solution that takes frequent backups and stores them securely in an off-site data center for later recovery. To get started, reach out to us at 217-475-0226.

Is Your Printer Wasting More Money Than it’s Worth...
Tech Term: Chromebook, Defined


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 24 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Network Security Hackers Business Computing Android Google Cybersecurity Smartphone IT Support Malware Software Backup Tech Term Email Small Business Managed IT Services Business Management User Tips Ransomware Internet Data Productivity Data Recovery Phishing Data Backup Efficiency Communications IT Management Business Cloud Cybercrime Windows 10 Artificial Intelligence Antivirus Mobile Device Management Blockchain Cost Management Hard Drive Update Saving Money App Network Hardware Computer Innovation Outsourced IT Gadgets Data Security Internet of Things Microsoft Start Menu Law Enforcement Passwords Bitcoin Microsoft Office Browser Business Technology Social Engineering Spam Word Digital Gmail Collaboration Patch Management Data Management Vulnerabilities Scam Laptop Disaster Recovery Websites Bandwidth Data Protection BDR Holiday Alert Smartphones Tech Terms Business Continuity Project Management Apps Access Control IT Services Data loss Hacking Mobile Device Windows SaaS Data Breach Office 365 VPN Encryption Money Search Applications Social Media Server Operating System Save Money Facebook Touchscreen Maintenance Remote Monitoring Mouse Password Cleaning Paperless Office Two-factor Authentication Computer Care Training Google Calendar eWaste Information Technology Running Cable Computers Solid State Drive Database WiFi Multi-factor Authentication Unified Threat Management Outlook Telephone Systems Equifax Document Management Robot IT Support Mobile Technology Disaster Vendor Mangement Cabling Nanotechnology Tactics Wireless Device security Excel Access Consultant Startup Google Docs Managed IT Services Augmented Reality SharePoint Business Mangement Uninterrupted Power Supply Addiction Website Unified Communications Tip of the week Redundancy Spyware Budget Computing Infrastructure Screen Reader Virtual Reality Knowledge Distributed Denial of Service Worker Tablet Printing Software as a Service Networking Analytics Legislation Communication Samsung Company Culture Freedom of Information Cloud Computing How to History Unified Threat Management HTML Government Cortana Business Cards Virtualization Comparison Automation Conferencing Identity Theft News Google Drive IBM Legal Virtual Assistant Virus Managed Service Provider Big Data Hosted Solutions Apple Automobile Chromebook Desktop Google Maps Fake News Telephony YouTube Best Practice Devices Downloads Downtime Emergency Employer-Employee Relationship Emails Backup and Disaster Recovery VoIP Settings Unsupported Software Compliance VoIp Hard Drive Disposal Piracy Vulnerability Specifications Bluetooth Audit Microsoft Excel Administration Regulations Mobility email scam Software License DDoS Television Wireless Headphones Printer Mobile Security Cryptocurrency Time Management Corporate Profile Upgrades Accountants Mobile Devices Managed IT Windows 10 Marketing Multi-Factor Security Office Users Office Tips Twitter CrashOverride

Latest Blog

In business, everything is measured. Every minute is quantified in order to run the most profitable business possible. When measuring data the measurements you’ll most hear are in bits and bytes. Today, we’ll get into the various ways bits and bytes are used to describe the ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.