• HOME
  • SERVICES
    • CYBER SECURITY
    • RISK MANAGEMENT
    • DATA PRIVACY
    • PROCESS IMPROVEMENT
    • CHANGE MANAGEMENT
    • TRAINING
  • ABOUT
    • ADVANTAGES
    • METHODOLOGIES
    • A + RESULTS
    • CLIENTS
    • SPEAKING/WRITING
    • MISSION-VISION-VALUES
    • TEAM
    • PRESS RELEASES
  • CONTACT
  • BLOG
  • PODCAST

The Importance of the 3-2-1 Back-Up Method.

2 years ago
abstractfwd1987
No Comments

Backing up data is one of the best things you can do to improve your response to ransomware, a data breach, an infrastructure failure, or other type of cyber-attack. Without a good comprehensive backup method that works and is tested, you likely will not be able to recover from where you left off thereby harming your business and customers.

The 3-2-1 backup method requires saving multiple copies of data on different device types and in different locations. More specifically, the 3-2-1 method follows these three requirements:

Fig. 1. 3-2-1 Backup Image, Stock, 2023.

  1. 3 Copies of Data: Have three copies of data—the original, and at least two copies.
  2. 2 Different Media Types: Use two different media types for storage. This can help reduce any impact that may impact one specific storage media type more than the other.
  3. 1 Copy Offsite: Keep one copy offsite to prevent the possibility of data loss due to a site-specific failure.

Here are some pointers to make your backup more effective:

  1. Select the right data to back up: Critical data includes word processing documents, electronic spreadsheets, databases, financial files, human resources files, and accounts receivable/payable files. Not everything is worth backing up as it’s a waste of space. For example, data that is 8 years old with no business use is not worth backing up.
  2. Backup on a schedule: Backup data automatically on a repeatable schedule, if possible, bi-weekly, weekly, or even daily if needed. Pick a day or time range when the backup will run, say Thursdays at 10:00 p.m. CST (when most users are not working.
  3. Have backup test plans and follow them: Your backup plan must be written down in a clear and detailed way describing the backup process, roles, interconnections, and milestones which can gauge if it’s working, as well as the service time to recovery expected. Then of course test the backup at least every six months or after a key infrastructure change happens.
  4. Automate backups: Use software automation to execute the backups to save user time, and to reduce the risk of human error.

About the Author:

Jeremy Swenson is a disruptive-thinking security entrepreneur, futurist/researcher, and senior management tech risk consultant. Over 17 years he has held progressive roles at many banks, insurance companies, retailers, healthcare orgs, and even governments including being a member of the Federal Reserve Secure Payment Task Force. Organizations relish in his ability to bridge gaps and flesh out hidden risk management solutions while at the same time improving processes. He is a frequent speaker, published writer, podcaster, and even does some pro bono consulting in these areas. As a futurist, his writings on digital currency, the Target data breach, and Google combining Google + video chat with Google Hangouts video chat have been validated by many. He holds an MBA from St. Mary’s University of MN, an MSST (Master of Science in Security Technologies) degree from the University of Minnesota, and a BA in political science from the University of Wisconsin Eau Claire.

Previous Post
No Interview Needed to Join Microsoft After Getting Fired From OpenAI – Sam Altman.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

The reCAPTCHA verification period has expired. Please reload the page.

Recent Posts

  • The Importance of the 3-2-1 Back-Up Method.
  • No Interview Needed to Join Microsoft After Getting Fired From OpenAI – Sam Altman.
  • Seven Cyber-Tech Observations of 2022 and What it Means for 2023.
  • The Main Purpose of Cryptocurrency Mixer and/or Splitter Services is Fraud and Money Laundering.
  • Top 16 Ways SMBs Can Mitigate Cyber Risks and Threats.
X
LinkedIn

Recent Posts

  • The Importance of the 3-2-1 Back-Up Method.
  • No Interview Needed to Join Microsoft After Getting Fired From OpenAI – Sam Altman.
  • Seven Cyber-Tech Observations of 2022 and What it Means for 2023.
  • The Main Purpose of Cryptocurrency Mixer and/or Splitter Services is Fraud and Money Laundering.
  • Top 16 Ways SMBs Can Mitigate Cyber Risks and Threats.

Recent Comments

  • Abstract Forward Partners with Ignyte on Abstract Forward Partners With Newer Cyber GRC Tool: Ignyte Assurance Platform
  • Abstract Forward Partners with Ignyte | Ignyte Assurance Platform on Abstract Forward Partners With Newer Cyber GRC Tool: Ignyte Assurance Platform
  • Michael Kirk Please Interview US for your new Prince movie “Prince: R U Listening”! | Economic, Technology, & Marketing Thought Leadership on Social Tech CEO Jimmy Chamberlin Rejoins Smashing Pumpkins
  • Michael Kirk Please Interview US for your new Prince movie “Prince: R U Listening”! | Economic, Technology, & Marketing Thought Leadership on Prince and Purple Rain 30 years later: Business and Music Innovation
  • brianfpennington on Demystifying 9 Common Types of Cyber Risk

Archives

  • November 2023
  • January 2023
  • June 2022
  • April 2022
  • January 2022
  • June 2021
  • December 2020
  • August 2020
  • March 2020
  • January 2020
  • August 2019
  • March 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • December 2017
  • November 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • July 2016
  • May 2016
  • March 2016
  • February 2016
  • August 2015
  • June 2015
  • February 2015
  • January 2015
  • December 2014
  • August 2014
  • May 2014
  • April 2014

Categories

  • 2016 election hack
  • 2016 tech review
  • 360 net lab
  • 80s music
  • Alternative music
  • Amazon
  • Android
  • apple
  • arlines hack
  • artificial intelligence
  • Billy Corgan
  • Bitcoin security
  • british airways breach
  • Business
  • business analysis
  • business continuity
  • Chinese hackers
  • cloud computing
  • CoinHive
  • Coronavirus malware
  • COVID-19 scams
  • crypto mixing
  • Crypto Money Laundering
  • crypto-jacking
  • currency
  • cyber insurance
  • Cyber Security
  • cyber security framework
  • Cyber-Espionage
  • Cybersecuity summit
  • data back up
  • data breach
  • Data Exfiltration Detection
  • data security
  • Denial of Service (DoS) Attacks
  • Direct x12
  • disinformation
  • drones
  • election security
  • equifax breach
  • esports security
  • EU Privacy
  • FDIC
  • federal reserve
  • GDPR
  • gdpr test british airways breach
  • google glass
  • Google Mandiant
  • grc
  • GroupOn
  • iam
  • Ignyte Assurance Platform
  • iphone
  • Jimmy Chamberlin
  • leadership vs. management
  • LinkedIn
  • Live Streaming
  • LiveOne
  • Lumia Phone
  • management consulting
  • Microsoft
  • microsoft azure
  • Microsoft Continuum
  • MikroTik Routers
  • MN Start-Up
  • mobile os
  • mobile web
  • NASA
  • navy cyber hack
  • net neutrality
  • network intrusion
  • OpenStack
  • PBS Frontline
  • personal aircraft
  • phone market share
  • Prince: R U Listening
  • project management
  • Project Sparta
  • Purple Rain
  • Rackspace
  • ransomware
  • ransomware removal
  • retail
  • risk management
  • Salesforce
  • self driving cars
  • small business
  • small business cyber security
  • Smashing Pumpkins
  • SME Infosec
  • Social Media
  • socrates
  • sony pictures
  • stalkerware
  • Stuxnet
  • target
  • Tech Year In Review
  • third party risk management
  • Unit 61398
  • vendor risk mgmt
  • video surveillance
  • Web App Attack
  • WEP vs WPA2
  • Windows 10

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

All rights reserved © 2018 to present. Abstract Forward Consulting, LLC. Privacy Policy | Terms of Service | Web Accessibility | Sitemap.