Get Started Today!  (415) 295-4898

croom new

415 IT Blog

An Experienced Endorsement for Testing Backups

An Experienced Endorsement for Testing Backups

Just because you think that you’re following best practices, doesn’t necessarily mean that you actually are. Take it from this aspiring entrepreneur, who shared his own personal experience with us, so you could benefit:

I used to be a sales manager, taught in the classic, old school approach. Basically, I just got to know my clients really well so I could always talk to them about something. Wishing them a happy birthday, finding out how their youngest did during his baseball game, I had a pretty comprehensive well of topics I could pull from. This let me keep a pretty detailed record of people and their interactions with me that allowed me to really make connections with them.

My dad used to moonlight as a rental property manager on top of his full-time position, and that really inspired me. I slowly saved up my money until I could buy the duplex I lived in, and from there, I was hooked.

That first investment grew into a business that supports my family and my staff. All of the processes of managing properties (things like collecting rent, paying taxes, handling payroll, managing utilities, and maintaining the rental spaces) mean that I rely on logistics quite a bit to accomplish it all.

My dad taught me two things that I have really taken to heart: Measure twice, cut once, and to do as much as I could, and let the experts do what I couldn’t.

The second lesson was really helpful when I was first equipping my rental properties. I like to think my places are pretty nice, so they feature things like quality Wi-Fi connections, smart locks, and other things that need a little bit of management. The commercial properties I have are equipped with even more of these kinds of things. All of this tech needs a lot of horsepower, so to speak, so I have a pretty hefty setup at my main office. I also need my technology to help me keep track of who my tenants are, the documentation they’ve given me and the stuff I have to keep, as well as to manage my employees the way I need to.

Now, I can’t do very much at all with a computer unless it’s something I use it for every day, so I listened to my old man’s advice and called a reputable IT company. They came in, set everything up, and when they recommended a backup system, I approved it. The IT company set everything up, taught my office manager to use it and how files could be restored, and even stopped in a month later to check in.

This was all great, and we went along with our business for a few years after that.

Then, we got slammed from all sides. A few tenants were moving out, there were some maintenance concerns that we were dealing with, it was the middle of tax season, and the office manager who knew how everything worked had just left for a much-deserved cruise with his family.

Of course, it was then that the software we rely on for pretty much everything - internal communication, payroll, and scheduling - it just stopped working, and our data was all messed up.

Nobody could figure out what to do, and I finally had to make the very expensive call to my office manager, who was kind enough to spring for the cruise ship’s cellular service in case something happened. That got us to the backup to restore from it. We had also left a message with the IT company.

It was a good thing we did, too, because when the restore was finished, we were still dealing with bad data. We tried again - same thing.

When we managed to get in touch with the company, they told us that some software change had messed up how data was stored in the backup, so while everything else was fine, that one software just stopped being backed up.

This was important stuff - like, the kind that it would have taken a HUGE amount of work and time to even get back to our normal business functions. Plus, we would still have to go back and ask all of our tenants for their sensitive information again. How would that have looked?

The worst part? We knew about the issue when the software was updated - we just never connected it to our backup.

Somehow, after a lot of stress and a pretty big bill, our data was recovered and we could get back to work. Frankly, while it was a really expensive process, I still look at it as a bargain.

However, with a few better practices, we could have avoided the entire issue. That’s why we’re now sure to test our backup at least once a month. A few hours gives me the peace of mind that my business won’t be thrown in jeopardy again. Basically, we just see if we can operate using only what’s on the backup.

These evaluations have already caught a few additional issues, so we’re already seeing the benefits. Make sure you’re backing up your data, and make sure you’re testing them!

We appreciate having this story to share with you, as it raises an important point. Your network is going to change as time passes, so you need to make sure that it is still working as intended. A secure network hosting an insecure application is effectively no longer a secure network. You can view your backups in the same way.

We test all the backups we maintain in a similar way. After all, if a backup doesn’t deliver what you need, it isn’t going to help you much when you need it.

415 IT can help you avoid this kind of issue, and many others, from impacting your business. Learn more by reaching out at (415) 295-4898.

Taking a Long Look at Smartphones
Windows 7’s Time Has Come


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, August 05 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data Backup IT Support Data Network Security Privacy Hosted Solutions Cloud IT Services Data Recovery Software Efficiency Email Business Managed IT Services Malware Internet Outsourced IT Small Business Innovation Tech Term Cybersecurity Upgrade Hackers Business Management Cloud Computing Collaboration Microsoft Computer Phishing User Tips Hardware Windows 10 Google Business Continuity Managed Service Mobile Devices Workplace Tips VoIp Communication Managed Service Provider Smartphone Ransomware Backup Quick Tips Mobile Device Paperless Office Smartphones Android Communications Server Office 365 Business Technology Disaster Recovery Saving Money Encryption Browser Remote Monitoring Data Management Managed IT Network Covid-19 Holiday Healthcare Passwords Wi-Fi Compliance Windows 7 Artificial Intelligence BDR Vulnerability Remote Work Internet of Things Miscellaneous Managed IT services Microsoft Office Laptops Data Security Document Management Government Users Applications Social Media Facebook Save Money Help Desk Tip of the week Office Vendor Management Bandwidth Avoiding Downtime Project Management Antivirus Automation Two-factor Authentication Health Scam Redundancy Information Virtualization Blockchain Processor Employer-Employee Relationship Access Control Mobility Chrome Virtual Private Network Windows Website Analytics Company Culture IT Management Employee-Employer Relationship IoT OneDrive Regulations Training Customer Relationship Management Data Loss BYOD Hard Drive Maintenance RMM VPN Storage Infrastructure Router Software as a Service Proactive Meetings Machine Learning Internet Exlporer Financial Dark Web Augmented Reality Files Remote Monitoring and Management Operating System File Management Smart Technology Computing Recycling Server Management Data Storage Electronic Health Records Payment Cards Employees Word Consulting Downtime Information Technology Social Network Patch Management Data Breach Gadgets Mobile Security Assessment Flexibility Unified Communications Managed Services Provider Managed Services Professional Services Remote Workers Network Management Management Apps Mobile Office Consultation Alert File Sharing The Internet of Things Gmail Co-Managed IT Cooperation Risk Management Time Management Net Neutrality HIPAA Utility Computing Networking Password Bring Your Own Device Search Monitoring Unified Threat Management Tablet Remote Worker Servers PCI DSS Tech Support Features Hard Disk Drives Sensors Business Telephone G Suite Authorization Database Smart Tech Lenovo Virtual Machines Mobile Politics Notes Remote Working Google Calendar Fraud User Management Bluetooth Alerts IT Consulting Private Cloud Proactive Maintenance Solid State Drive Recovery Biometric Samsung How To Development Test Voice over Internet Protocol Projects Travel IT Technicians Cost Management Procurement Solid State Drives IT Assessment Virtual Reality Motherboard WPA3 Chromebook SharePoint Connectivity Superfish Value of Managed Services Credit Cards Firewall Mail Merge User Error Instant Messaging PowerPoint Display Budget Teamwork Comparison Licensing Migration eWaste Bookmarks ROI Cybercrime Cyber security Gamification Cookies Cables Return on Investment Websites CRM Technology Tips Cyberattacks Social Options Telephone Digitize Data Warehousing Fleet Tracking Vulnerabilities Downloads Zero-Day Threat Legislation Mobile Device Management Computers Distributed Denial of Service Address Managing Stress WiFi Customer Service Wires Wireless Shared resources Going Green Windows Server 2008 Specifications Chatbots Favorites Database Management Nanotechnology Settings Personal Information SaaS Digital Payment Hotspot Mirgation Techology Read Only Security Cameras 5G Mobile VoIP Shadow IT Operations Mobile Computing Asset Tracking Backup and Disaster Recovery Wearable Technology Star Wars Point of Sale Tech Terms Manufacturing Vendor Holidays Managed IT Service Spam MSP Enterprise Content Management Finance Virtual Assistant Bitcoin App Batteries Touchscreen Hacking Black Friday Identity Theft Enterprise Resource Planning Technology Laws Conferencing GDPR Outsource IT Transportation Active Directory Mouse Language Outlook Cache Disaster Resistance Printing Wireless Internet Big Data Outsourcing Money Emergency Geography Multi-Factor Security Human Error Heating/Cooling Peripheral E-Commerce Theft Smart Devices IT Break Fix Social Networking Printer Authentication Wasting Time Current Events Screen Reader Electronic Medical Records CIO applications Trending Optimization Cyber Monday Staff Identity Unified Threat Management Laptop Permissions Windows Server Statistics Computing Infrastructure Remote Computing Shortcut Proactive IT Employer/Employee Relationships Apple Video Conferencing Microsoft Excel Modem OneNote High-Speed Internet Permission CEO Students Daniel Stevens Regulation Marketing Twitter Content Filtering Printers Education

Latest Blog

Many users are noticing or just starting to hear about Google and Apple’s initiative to work with local governments to provide an easy way to help users prevent getting infected with COVID-19. The idea is that, if a local or state government wanted to build an app for users ...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...