(Video) Backup and restore – what is Rapid Restart?

I’d like to talk to you about backing up and restoring your data. Now backing up and restoring data has been around for a large number of years. Some people do a backup, some people don’t do a backup. Some think it’s never going to happen to them, so they’re never going to worry about having a backup.

But when it comes to the information that you keep within your business, you have to have some sort of backup to make sure that if the cloud, the internet, the server, the PC goes down you have a copy of the critical information for your business.

And most people don’t think that that critical information is really important. But it is. It really is very important for the simple fact that you need to be able to be in a situation where the data you are backing up or creating in the business has somewhere secondary so we keep a copy of it.

This includes things like your CRM database in the cloud. It also means a backup of your website. How many people do you know who do a regular blog and if their website went down, what would happen? Have they got a backup of it?

In addition to that, there are two types of backup. We used to use backups like tapes, zip drives, USB drives. All of these things have a failure rate.

But on top of that, the information that you need to generate for your business needs to have a place to go. For instance, if I am in a shop and I’m running a system, and it breaks. It’s now going to take me 3 days to get it all back. And in that 3 days, I’ve just lost all of those clients, because I cannot invoice them. I can’t check information. I can’t check stock. All of that.

So we have to have some way of doing incremental backups through the day. They make sure that 15 minutes, there’s a copy of that information goes to somewhere else. And every 15 minutes, it quite happily writes that information to that somewhere else. This machine goes down. We can get the information back and be up and running very quickly.

The second component is that this is onsite somewhere. Doesn’t have to be visible, but it could be onsite. This is not. Even better, those 15 increments, and pass it up onto the internet. Wonderful! So this is doing a 15-minute incremental. This is doing a 24-hour backup.

In other words, everything goes pfft, place burns to the ground, then your night backup is going to be very important, because it has everything up to the last 24 hours in it. If you’re doing 15-minute increments, then you’re only going to lose 30 minutes worth of information, which is brilliant. It really is.

And if you have this type of system in place, this is a shadow-protect system, then all of that information is in a virtualized system, and we can then bring the virtualized system up. You can then run your business on the virtualized system.

When it comes to backups, the other thing you’ve got to be very aware of is to do a restore. You don’t want to be in a situation where the first time you do a restore is when something has broken, because I can guarantee just like in war the first plan goes to crap when you see the enemy, you have to be able to make sure you have confidence in the information that’s been restored.

That restore makes it a lot easier for your business, because you know if this goes pear-shaped, for instance, the place burns down, then all of your information is concurrent, and it is accessible. And that is very important for every business.

So if you want more information about a shadow protect system with an internet backup, then please contact us and we will get in contact with you and talk to you about it. Thank you.

Roger Smith, is an educator. Teaching students at ADFA (UNSW) and showing them how vulnerable they are to cybercrime.

He is also CEO at R & I ICT Consulting Services Pty Ltd, an Amazon #1 author on Cybercrime and founder of the SME Security Framework. He is a Consultant who specialises in inexpensive and highly effective security strategies for small and medium businesses and not for profit organisations.

He has developed and authored the SME Security Framework and the Security Policy Training Course which are considered to be the definitive guides to helping SME's protect their organisation using the principles of Technology, Management, Adaptability and Compliance.