Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Counting the Reasons for the 3-2-1 Data Backup Rule

Counting the Reasons for the 3-2-1 Data Backup Rule

I hope I don’t have to tell you how important your business’ data is to its continued survival, just as I hope I don’t need to explain why this makes this data a priority to protect, regardless of your business’ size. What I do want to explain is the concept of the 3-2-1 Rule and how it pertains to your data backup, and why we would recommend that one for your business’ purposes.

What Makes a Data Backup Such an Important Asset?

In a word: insurance.

Data is, as we’ve well established, a crucial component to your business’ continued operations and survival. Tons of it is generated, collected, stored, and updated each day to support our daily lives. If a business were to lose the data that it had accumulated, it would suddenly find itself in a very bad spot.

This is what makes the idea of a data backup such a good one—in many cases, it is this backup that keeps a business from going under. Of course, this requires that the data backup be properly maintained as well.

To put themselves in the position that offers the most success, we generally recommend that businesses prepare their data backups in accordance with the 3-2-1 Rule.

What is the 3-2-1 Rule of Data Backup?

Simple: keep at least three copies of your data, in two mediums or formats, at least one copy of which kept off site and separate from the others.

Why multiple copies? Multiple copies ensure that—should one of your backups become corrupted or infected or otherwise infiltrated, you have a spare or two to fall back on. While we say three, three should really be considered the bare minimum.

Why multiple formats or mediums? Well, consider what would happen if you made yourself two lunches in case it rained, but packed both into a paper bag. With both in a paper bag, the backup lunch would end up equally soggy as the original lunch. Keeping your backup in a different format or storage medium helps prevent it from being impacted by the same thing that damages the original.

Why the offsite version? Keeping a backup offsite helps to ensure that—even if a disaster were to completely annihilate your business’ physical location—the data you rely on would still be accessible to you by virtue of the data backup. This gives us something else that is important to consider: the concept of an “air gap” in terms of data security.

What is an “Air Gap?”

Let’s go back to our “backup lunch” example, for a moment. While having an extra lunch was a good idea—our example made it clear why—keeping it so close to the original removed its benefits. However, if we were to take the same concept of having a backup lunch and add in an air gap (keeping an extra lunch in the break room at work, or stashing a few bucks to order something out, perhaps), we removed the threat of a single disaster preventing us from eating.

In terms of the data on your network, an air gap is just that—physical distance and separation helping to isolate resources and protect them from many threats.

415 IT is here to help businesses like yours manage all the complexities of their technology so that you have more room to succeed. Give us a call at (415) 295-4898 today to find out more.

Your Guide to the Modern Varieties of Cybercrimina...
Tip of the Week: How to Take a Screenshot in Windo...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, May 07 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing IT Support Data Network Security Data Backup Privacy Internet Cloud Hosted Solutions IT Services Data Recovery Business Software Efficiency Email Managed IT Services User Tips Mobile Device Google Small Business Innovation Hackers Phishing Malware Hardware Collaboration Cybersecurity Outsourced IT Android Cloud Computing Smartphone Communication Computer Business Management Workplace Tips Upgrade Backup Managed Service VoIp Quick Tips Tech Term Microsoft Mobile Devices Windows 10 Business Continuity Disaster Recovery Smartphones Covid-19 Communications Ransomware Saving Money Managed Service Provider Passwords Paperless Office Remote Work Users Browser Network Encryption Server BDR Wi-Fi Internet of Things Artificial Intelligence Office 365 Remote Monitoring Business Technology Data Management Social Media Windows Help Desk Managed IT Compliance Windows 7 Microsoft Office Holiday Document Management Government Vulnerability Save Money Healthcare Employer-Employee Relationship Health Facebook Chrome Managed Services Remote Data Security Virtualization Managed IT services Automation Scam Miscellaneous Applications Blockchain Laptops Wireless Analytics Information Project Management Bandwidth Tip of the week Meetings Machine Learning Two-factor Authentication BYOD Processor Vendor Management Redundancy Gadgets Avoiding Downtime Office Infrastructure Mobile Office Antivirus Employee-Employer Relationship Information Technology Files Access Control Virtual Private Network Regulations IoT Time Management Apps OneDrive Training Hard Drive RMM Storage Router WiFi Proactive Mobility HIPAA Data Loss Remote Worker Maintenance VPN IT Management Website Customer Relationship Management Networking Company Culture Software as a Service Net Neutrality Consultation Display Tablet Holidays Customer Service Dark Web Augmented Reality Co-Managed IT Managed Services Provider Internet Exlporer Management Smart Technology Remote Workers Professional Services Computing File Sharing Spam Word Patch Management Data Breach Unified Threat Management Conferencing Vendor Mobile Security Bring Your Own Device Flexibility Big Data Free Resource Utility Computing Password Smart Devices Monitoring Unified Communications Remote Computing Server Management Data Storage Alert Financial Remote Monitoring and Management Images 101 Mobile Gmail Social Network Operating System The Internet of Things Recycling Cooperation File Management Assessment Risk Management Electronic Health Records Employees Money Voice over Internet Protocol Network Management Instant Messaging Payment Cards Search Consulting Downtime Shadow IT Shortcut Vendors Proactive IT Migration Bookmarks eWaste SaaS ROI Cyber Monday Staff Value of Managed Services Content Filtering Cookies Cables Permissions PowerPoint Cyberattacks Social Computing Infrastructure Teamwork Fleet Tracking Zero-Day Threat Vulnerabilities Microsoft Excel Cybercrime Cyber security Innovations Return on Investment Outsource IT Touchscreen Managing Stress Hacking Options Telephone Hacker Lenovo Mobile Device Management Outsourcing IT Consulting Chatbots Favorites Samsung Nanotechnology Wires Google Calendar Fraud Mirgation Read Only Heating/Cooling Security Cameras Alerts Shared resources Going Green Peripheral SharePoint Asset Tracking Mobile Computing Backup and Disaster Recovery Database Management IT YouTube Settings Personal Information Laptop Mail Merge User Error MSP Finance Enterprise Content Management Trending Virtual Reality 5G Mobile VoIP Optimization CES Superfish Wearable Technology Point of Sale Star Wars Tech Terms Travel Bitcoin Video Conferencing Identity Theft Enterprise Resource Planning Statistics Firewall Manufacturing Banking App Virtual Assistant Cache Servers Printing Comparison Licensing Batteries PCI DSS Downloads Human Error Geography GDPR Business Telephone Videos Transportation Active Directory Remote Working Address Social Networking Authentication Data Warehousing Wireless Internet Virtual Machines E-Commerce Theft Technology Tips Wasting Time Current Events Biometric Identity Bluetooth Distributed Denial of Service Reviews Screen Reader Recovery Electronic Medical Records Legislation IT Assessment Media Techology Specifications CIO applications OneNote Modem Permission High-Speed Internet Digital Payment Hotspot Windows Server Budget Authorization G Suite Operations Employer/Employee Relationships Apple Credit Cards Tech Support Features Database Gamification Technology Laws Politics Managed IT Service Hard Disk Drives Sensors End of Support Smart Tech Digitize Outlook Ergonomics Disaster Resistance Websites Private Cloud Black Friday CRM Emergency Multi-Factor Security How To Test Development Notes IT Technicians Cost Management Procurement Mouse Language User Management Printer WPA3 Motherboard Chromebook Proactive Maintenance Solid State Drive Computers Customer Relationships Projects Unified Threat Management Break Fix Solid State Drives Windows Server 2008 Gifts Connectivity Daniel Stevens Twitter Printers Education Marketing CEO Students Regulation

Latest Blog

Windows has no shortage of capabilities to offer its users, with many of these tools coming with an associated Windows shortcut. Since keeping track of all of them can be a challenge, we wanted to assemble a list of most of them for you. This blog will serve as that list, so...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...