SlideShare a Scribd company logo
Data Backup and Recovery
Presenter
Ashraf Hossain
Sr. Executive IT
Content
➢ What is Data Backup?
➢ Why we Backup?
➢ Backup Steps: The Basics
➢ Backup Considerations
➢ Methods of Backups
➢ Security Considerations for Backup Data
➢ Backup Frequency
What is Data Backup?
Data backup is the act of copying critical organizational data
to a secondary storage location. Data backup helps to protect
businesses against data loss by providing redundancy to the
primary storage location in case that location is compromised
or fails.
Why we Backup?
There are many reasons why your organization may want to back
up their data. The primary reason is to recover data after its loss.
The loss can occur by accidental deletion, a virus attack, or a
software or hardware failure. If any of those things occur and your
files are backed up, you can easily restore those files. Preventing
events that result in loss of data is most desired, but backing up
data provides the protection for data after a system failure.
Individual computers being backed up are different than servers
being backed up. Individual computer users can back up their own
information when desired and using methods they desire, whereas
data on organization servers need more formal backup procedures
Backup Steps: The Basics
 Find the files that you want to backup (documents,
spreadsheets, databases, etc.)
 Copy the files to backup media (USB Drive, external drive,
cloud storage drive, etc.)
 Repeat above at scheduled frequency.
Note: This is a primary level of backup. Ideally, you
should keep your files organized in folders for easy
identification of files needing backup.
Backup Considerations
 Method:
There are multiple methods of storing backup data. Some
methods are described in the Methods of Backups section.
 What to Backup:
There is a wide range of information that can be backed up. Files
that are stored can be backed up on desktops, notebooks, laptops,
and servers. In addition, data managed by applications you use
such as email programs, client intake programs and other programs
should also be backed up. An organization should discuss which
information is most important. It is important that organization
information be backed up whether it resides in the office, and/or on
any home computers that people may be working on for office
work.
Backup Considerations
 Frequency:
Backups must occur regularly in order to prevent data loss. The
more scheduled backups that take place the better off your
organization. Frequent backups take time, money, and resources
but the benefits outweigh these negatives.
 Storage Location:
It is a good practice to keep some backup information offsite. In
the event that a natural disaster occurs, your backup will mean
nothing if it got destroyed with all the computers and the building.
Backup Considerations
 Security:
Whether the backup data is onsite or offsite, you will want to
ensure the backup information is secure and accessible only by
those authorized to use it to restore lost data.
 Retention:
The amount of history to be saved is another thing to consider.
Depending on the nature of your business, you may want to keep
backups that are years, months, weeks, or even just a day old. Keep
in mind that the more backups you wish to save, the more space
you will need to have (increased cost).
Methods of Backups
You can setup regular backups of data in-house (locally), or via an
external service (vendor).
 Locally-Managed Backups
Many Windows operating systems such as XP and Windows 7
include Backup utilities for setting up regular backups of important
files. There are also software packages (free and purchased) that
can be used to backup data. In either case, wizards typically guide
you through the process of setting up your backup, and include
things such as designating the destination device for your backups
(see options below), choosing the folders/files to be backed up, and
specifying the frequency of backup. Keep in mind that if you use
any of the non-cloud-based destination options for your backup
data, it is advisable to keep a copy of the backup device contents in
a secured location separate from the office.
Methods of Backups
 Backup Destination Options
● Flash storage or USB drives
● CD/DVD
● External hard drive
● Cloud storage
Methods of Backups
 Vendor-Managed Backups
A backup service is another option where you pay companies that
specialize in performing backups for you. Your data is stored on
servers they own.
Below is a list of some backup services.
Security Considerations for
Backup Data
Security attacks — whether in the form of malicious Internet
content, theft of physical devices, login violations, or denials of
service (meaning others are prevented from accessing your site) —
can catch nonprofits off-guard, especially smaller and mid-sized
organizations that may be unaware of possible threats, and
unprepared to deal with them once they occur.
Yet data leakage to the public, systems down-time, and reputation
loss resulting from such security violations can easily turn away
new and existing constituents if such situations are not handled
appropriately and quickly. This may, in turn, impact on the
organization’s reputation and future opportunities for growth.
A computer virus outbreak or a network breach can cost an
organization thousands of dollars. In some cases, it may even lead
to legal liability and lawsuits. Because of these risks, you should
ensure your backup data is protected against unauthorized access.
THANK YOU
Ad

More Related Content

What's hot (20)

Data backup and disaster recovery
Data backup and disaster recoveryData backup and disaster recovery
Data backup and disaster recovery
catacutanjcsantos
 
Backup & restore in windows
Backup & restore in windowsBackup & restore in windows
Backup & restore in windows
Jab Vtl
 
03 backup-and-recovery
03 backup-and-recovery03 backup-and-recovery
03 backup-and-recovery
hunny garg
 
Backup And Recovery
Backup And RecoveryBackup And Recovery
Backup And Recovery
Wynthorpe
 
Backup
BackupBackup
Backup
AboubacarAhamadaRouf
 
Database Security And Authentication
Database Security And AuthenticationDatabase Security And Authentication
Database Security And Authentication
Sudeb Das
 
Backup strategy
Backup strategyBackup strategy
Backup strategy
mrscjrobertson
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Tehmina Gulfam
 
Cloud Computing: Hadoop
Cloud Computing: HadoopCloud Computing: Hadoop
Cloud Computing: Hadoop
darugar
 
Network and System Administration chapter 2
Network and System Administration chapter 2Network and System Administration chapter 2
Network and System Administration chapter 2
IgguuMuude
 
Database recovery
Database recoveryDatabase recovery
Database recovery
Student
 
Introduction to distributed file systems
Introduction to distributed file systemsIntroduction to distributed file systems
Introduction to distributed file systems
Viet-Trung TRAN
 
Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5
Muhammad Talha Zaroon
 
File system in operating system e learning
File system in operating system e learningFile system in operating system e learning
File system in operating system e learning
Lavanya Sharma
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
Dr. Sunil Kr. Pandey
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
Mehul Jariwala
 
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recovery
dhawal mehta
 
Protection and security
Protection and securityProtection and security
Protection and security
mbadhi
 
User administration concepts and mechanisms
User administration concepts and mechanismsUser administration concepts and mechanisms
User administration concepts and mechanisms
Duressa Teshome
 
Database backup & recovery
Database backup & recoveryDatabase backup & recovery
Database backup & recovery
Mustafa Khan
 
Data backup and disaster recovery
Data backup and disaster recoveryData backup and disaster recovery
Data backup and disaster recovery
catacutanjcsantos
 
Backup & restore in windows
Backup & restore in windowsBackup & restore in windows
Backup & restore in windows
Jab Vtl
 
03 backup-and-recovery
03 backup-and-recovery03 backup-and-recovery
03 backup-and-recovery
hunny garg
 
Backup And Recovery
Backup And RecoveryBackup And Recovery
Backup And Recovery
Wynthorpe
 
Database Security And Authentication
Database Security And AuthenticationDatabase Security And Authentication
Database Security And Authentication
Sudeb Das
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Tehmina Gulfam
 
Cloud Computing: Hadoop
Cloud Computing: HadoopCloud Computing: Hadoop
Cloud Computing: Hadoop
darugar
 
Network and System Administration chapter 2
Network and System Administration chapter 2Network and System Administration chapter 2
Network and System Administration chapter 2
IgguuMuude
 
Database recovery
Database recoveryDatabase recovery
Database recovery
Student
 
Introduction to distributed file systems
Introduction to distributed file systemsIntroduction to distributed file systems
Introduction to distributed file systems
Viet-Trung TRAN
 
File system in operating system e learning
File system in operating system e learningFile system in operating system e learning
File system in operating system e learning
Lavanya Sharma
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
Dr. Sunil Kr. Pandey
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
Mehul Jariwala
 
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recovery
dhawal mehta
 
Protection and security
Protection and securityProtection and security
Protection and security
mbadhi
 
User administration concepts and mechanisms
User administration concepts and mechanismsUser administration concepts and mechanisms
User administration concepts and mechanisms
Duressa Teshome
 
Database backup & recovery
Database backup & recoveryDatabase backup & recovery
Database backup & recovery
Mustafa Khan
 

Similar to Data Backup and Recovery.pdf (20)

2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
mrmwood
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
MISY
 
10 Latest Trends in Data Backup and Recovery You Need to Know
10 Latest Trends in Data Backup and Recovery You Need to Know10 Latest Trends in Data Backup and Recovery You Need to Know
10 Latest Trends in Data Backup and Recovery You Need to Know
civil hospital parasia
 
Small Business Owners.pdf
Small Business Owners.pdfSmall Business Owners.pdf
Small Business Owners.pdf
CIOWomenMagazine
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backup
Rita Crawford
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignment
naterator
 
Black Box Backup System
Black Box Backup SystemBlack Box Backup System
Black Box Backup System
CSCJournals
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
Sejahtera Affif
 
Understanding Memory in Computing part 1.pptx
Understanding Memory in Computing part 1.pptxUnderstanding Memory in Computing part 1.pptx
Understanding Memory in Computing part 1.pptx
Pravash Chandra Das
 
A brief introduction to data storage
A brief introduction to data storageA brief introduction to data storage
A brief introduction to data storage
Preludedx
 
Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16
Ken Tucker
 
Presentation on BACKUP(Nursing informatics )
Presentation on BACKUP(Nursing informatics )Presentation on BACKUP(Nursing informatics )
Presentation on BACKUP(Nursing informatics )
dapilahjoshua18
 
Remote Data Backup Protection
Remote Data Backup ProtectionRemote Data Backup Protection
Remote Data Backup Protection
CrystaLink Inc.
 
Backup & Its Relevance
Backup & Its RelevanceBackup & Its Relevance
Backup & Its Relevance
Revolucion
 
Enterprise data protection meeting
Enterprise data protection meetingEnterprise data protection meeting
Enterprise data protection meeting
csandit
 
An Ultimate Guide on Air Gap Backup
An Ultimate Guide on Air Gap BackupAn Ultimate Guide on Air Gap Backup
An Ultimate Guide on Air Gap Backup
StoneFly
 
StoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesStoreGrid : Introduction & Features
StoreGrid : Introduction & Features
Revolucion
 
Disaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the differenceDisaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the difference
jeetendra mandal
 
Disaster Proof
Disaster ProofDisaster Proof
Disaster Proof
DigeratiGroup
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery Plan
Rishu Mehra
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
mrmwood
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
MISY
 
10 Latest Trends in Data Backup and Recovery You Need to Know
10 Latest Trends in Data Backup and Recovery You Need to Know10 Latest Trends in Data Backup and Recovery You Need to Know
10 Latest Trends in Data Backup and Recovery You Need to Know
civil hospital parasia
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backup
Rita Crawford
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignment
naterator
 
Black Box Backup System
Black Box Backup SystemBlack Box Backup System
Black Box Backup System
CSCJournals
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
Sejahtera Affif
 
Understanding Memory in Computing part 1.pptx
Understanding Memory in Computing part 1.pptxUnderstanding Memory in Computing part 1.pptx
Understanding Memory in Computing part 1.pptx
Pravash Chandra Das
 
A brief introduction to data storage
A brief introduction to data storageA brief introduction to data storage
A brief introduction to data storage
Preludedx
 
Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16
Ken Tucker
 
Presentation on BACKUP(Nursing informatics )
Presentation on BACKUP(Nursing informatics )Presentation on BACKUP(Nursing informatics )
Presentation on BACKUP(Nursing informatics )
dapilahjoshua18
 
Remote Data Backup Protection
Remote Data Backup ProtectionRemote Data Backup Protection
Remote Data Backup Protection
CrystaLink Inc.
 
Backup & Its Relevance
Backup & Its RelevanceBackup & Its Relevance
Backup & Its Relevance
Revolucion
 
Enterprise data protection meeting
Enterprise data protection meetingEnterprise data protection meeting
Enterprise data protection meeting
csandit
 
An Ultimate Guide on Air Gap Backup
An Ultimate Guide on Air Gap BackupAn Ultimate Guide on Air Gap Backup
An Ultimate Guide on Air Gap Backup
StoneFly
 
StoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesStoreGrid : Introduction & Features
StoreGrid : Introduction & Features
Revolucion
 
Disaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the differenceDisaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the difference
jeetendra mandal
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery Plan
Rishu Mehra
 
Ad

Recently uploaded (20)

Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Automation Hour 1/28/2022: Capture User Feedback from Anywhere
Automation Hour 1/28/2022: Capture User Feedback from AnywhereAutomation Hour 1/28/2022: Capture User Feedback from Anywhere
Automation Hour 1/28/2022: Capture User Feedback from Anywhere
Lynda Kane
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
"PHP and MySQL CRUD Operations for Student Management System"
"PHP and MySQL CRUD Operations for Student Management System""PHP and MySQL CRUD Operations for Student Management System"
"PHP and MySQL CRUD Operations for Student Management System"
Jainul Musani
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Hands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordDataHands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordData
Lynda Kane
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Salesforce AI Associate 2 of 2 Certification.docx
Salesforce AI Associate 2 of 2 Certification.docxSalesforce AI Associate 2 of 2 Certification.docx
Salesforce AI Associate 2 of 2 Certification.docx
José Enrique López Rivera
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5..."Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
Fwdays
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Automation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From AnywhereAutomation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From Anywhere
Lynda Kane
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Automation Hour 1/28/2022: Capture User Feedback from Anywhere
Automation Hour 1/28/2022: Capture User Feedback from AnywhereAutomation Hour 1/28/2022: Capture User Feedback from Anywhere
Automation Hour 1/28/2022: Capture User Feedback from Anywhere
Lynda Kane
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
"PHP and MySQL CRUD Operations for Student Management System"
"PHP and MySQL CRUD Operations for Student Management System""PHP and MySQL CRUD Operations for Student Management System"
"PHP and MySQL CRUD Operations for Student Management System"
Jainul Musani
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Hands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordDataHands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordData
Lynda Kane
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Salesforce AI Associate 2 of 2 Certification.docx
Salesforce AI Associate 2 of 2 Certification.docxSalesforce AI Associate 2 of 2 Certification.docx
Salesforce AI Associate 2 of 2 Certification.docx
José Enrique López Rivera
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5..."Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
Fwdays
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Automation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From AnywhereAutomation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From Anywhere
Lynda Kane
 
Ad

Data Backup and Recovery.pdf

  • 1. Data Backup and Recovery Presenter Ashraf Hossain Sr. Executive IT
  • 2. Content ➢ What is Data Backup? ➢ Why we Backup? ➢ Backup Steps: The Basics ➢ Backup Considerations ➢ Methods of Backups ➢ Security Considerations for Backup Data ➢ Backup Frequency
  • 3. What is Data Backup? Data backup is the act of copying critical organizational data to a secondary storage location. Data backup helps to protect businesses against data loss by providing redundancy to the primary storage location in case that location is compromised or fails.
  • 4. Why we Backup? There are many reasons why your organization may want to back up their data. The primary reason is to recover data after its loss. The loss can occur by accidental deletion, a virus attack, or a software or hardware failure. If any of those things occur and your files are backed up, you can easily restore those files. Preventing events that result in loss of data is most desired, but backing up data provides the protection for data after a system failure. Individual computers being backed up are different than servers being backed up. Individual computer users can back up their own information when desired and using methods they desire, whereas data on organization servers need more formal backup procedures
  • 5. Backup Steps: The Basics  Find the files that you want to backup (documents, spreadsheets, databases, etc.)  Copy the files to backup media (USB Drive, external drive, cloud storage drive, etc.)  Repeat above at scheduled frequency. Note: This is a primary level of backup. Ideally, you should keep your files organized in folders for easy identification of files needing backup.
  • 6. Backup Considerations  Method: There are multiple methods of storing backup data. Some methods are described in the Methods of Backups section.  What to Backup: There is a wide range of information that can be backed up. Files that are stored can be backed up on desktops, notebooks, laptops, and servers. In addition, data managed by applications you use such as email programs, client intake programs and other programs should also be backed up. An organization should discuss which information is most important. It is important that organization information be backed up whether it resides in the office, and/or on any home computers that people may be working on for office work.
  • 7. Backup Considerations  Frequency: Backups must occur regularly in order to prevent data loss. The more scheduled backups that take place the better off your organization. Frequent backups take time, money, and resources but the benefits outweigh these negatives.  Storage Location: It is a good practice to keep some backup information offsite. In the event that a natural disaster occurs, your backup will mean nothing if it got destroyed with all the computers and the building.
  • 8. Backup Considerations  Security: Whether the backup data is onsite or offsite, you will want to ensure the backup information is secure and accessible only by those authorized to use it to restore lost data.  Retention: The amount of history to be saved is another thing to consider. Depending on the nature of your business, you may want to keep backups that are years, months, weeks, or even just a day old. Keep in mind that the more backups you wish to save, the more space you will need to have (increased cost).
  • 9. Methods of Backups You can setup regular backups of data in-house (locally), or via an external service (vendor).  Locally-Managed Backups Many Windows operating systems such as XP and Windows 7 include Backup utilities for setting up regular backups of important files. There are also software packages (free and purchased) that can be used to backup data. In either case, wizards typically guide you through the process of setting up your backup, and include things such as designating the destination device for your backups (see options below), choosing the folders/files to be backed up, and specifying the frequency of backup. Keep in mind that if you use any of the non-cloud-based destination options for your backup data, it is advisable to keep a copy of the backup device contents in a secured location separate from the office.
  • 10. Methods of Backups  Backup Destination Options ● Flash storage or USB drives ● CD/DVD ● External hard drive ● Cloud storage
  • 11. Methods of Backups  Vendor-Managed Backups A backup service is another option where you pay companies that specialize in performing backups for you. Your data is stored on servers they own. Below is a list of some backup services.
  • 12. Security Considerations for Backup Data Security attacks — whether in the form of malicious Internet content, theft of physical devices, login violations, or denials of service (meaning others are prevented from accessing your site) — can catch nonprofits off-guard, especially smaller and mid-sized organizations that may be unaware of possible threats, and unprepared to deal with them once they occur. Yet data leakage to the public, systems down-time, and reputation loss resulting from such security violations can easily turn away new and existing constituents if such situations are not handled appropriately and quickly. This may, in turn, impact on the organization’s reputation and future opportunities for growth. A computer virus outbreak or a network breach can cost an organization thousands of dollars. In some cases, it may even lead to legal liability and lawsuits. Because of these risks, you should ensure your backup data is protected against unauthorized access.