Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Learn Why Backups are Most Crucial to Users

Learn Why Backups are Most Crucial to Users

Data loss is no joke - and we’ve heard plenty of stories from people who have experienced it firsthand, when personal or business data was lost. We appreciate everyone who shared their experiences with us, and allowed us to post them here. First, we’ll tell the story of someone who learned something in college that wasn’t in the syllabus.

Don’t forget to share your own stories with us in the comments!

College was a pretty great time for me, so I have a lot of good memories of it. Of course, they weren’t all great... One memory in particular still bothers me a little: when I almost failed in sophomore year because my computer went bad.

I went to college to study journalism, so there was a lot of writing involved. So much so, that my Dad surprised me before I started my second year with a computer for my dorm room so I could write and edit my copy in peace. The student computers on campus were a little ways from the dorm, so it was nice not to have to hike across campus by myself.

Sophomore year started wonderfully - I wrote a few articles for the student paper each week, and I got some of my general studies courses out of the way so I could focus on professional development during my later years. I even went abroad for a few weeks on a mission trip that fall, and had assembled quite a photo album with the digital camera I had bought for the occasion.

However, toward the end of that first semester, everything went wrong, all at once.

I had heard I should keep up a backup, but I really didn't think I'd have a problem. My Dad had just bought me this new computer just before the semester started, so everything was updated and new. I had a copy of *most* of my files when I moved them over to the new computer, so I figured I was in good shape for a while.

Then, just before Thanksgiving, I was in a bit of a rush. My roommate had already taken care of everything she had to and was pretty much just waiting to go home for the holiday - she just had a few more classes to attend. 

I, on the other hand, was swamped - I wanted to get a few assignments started before break so I wouldn’t have to play catch-up after, and I had bitten off more than I could chew. 

I had to make sure I would have enough time to write everything that the paper would need after break, so I was trying to get a head start on some projects I knew were coming up. One was a research paper for the global history course I was taking. 

Knowing full well that very few college students would work on a research paper before a break, the professor had literally had us drawn our topics from a hat. I had pulled… the Hussite Wars, I think... and I had already put together an outline for this paper to be built around. This thing was supposed to be pretty hefty, with a full bibliography, according to our professor.

So there I was, typing away as my roommate watched Miss Congeniality for the third time that week. Just as Sandra Bullock was teaching self-defense using the SING technique, my computer started making weird sounds, and suddenly the screen went blank.

After a moment of shock, I started to panic. I had just put in hours and hours of work on this paper, and it was suddenly gone. Then I looked closer - everything was gone. All of my files, all of my work - everything… including the pictures I had taken during my trip.

My heart was broken, and my gut felt like it was filled with concrete.

It was late at night, so campus IT services had already gone home. I couldn’t sleep a wink, and the first thing I did in the morning was to haul my computer over to the IT service desk. They looked it over, and found that there was, unfortunately, nothing they could do to restore my files, although they got the computer working again.

I went home for break pretty stressed out - not only had I essentially wasted a ton of time on work that I was going to have to redo, I didn’t have all of the pictures that I had from my trip - those were what really hurt to lose. That’s why I was so happy when my Dad reminded me that I had already made him a CD of all the pictures I had taken, and he made me a copy to bring back.

The next few weeks were miserable, as I basically had to stay up all hours to get everything done. Somehow, I managed. I have since learned my lesson, and when working on an assignment, I ALWAYS keep a backup - although I don’t use a CD anymore.

What We Can Do Better

To protect your business’ data, you should always have more than one copy of it saved, and these copies should be kept in separate locations. While you should be taking multiple backups a day, it is best if they run continuously, ensuring that the most work you would lose would amount to just a few minutes.

We want to thank our contributor today, and remind you that 415 IT can assist your company with its data backup and continuity needs. Reach out at (415) 295-4898 to learn more about our solutions!

Windows 7’s Time Has Come
4 Timeless Cybersecurity Rules to Live By
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, August 05 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://web.415it.com/

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data Backup Data IT Support Network Security Hosted Solutions Privacy Cloud IT Services Data Recovery Software Efficiency Email Business Internet Managed IT Services Malware Outsourced IT Innovation Small Business Tech Term Upgrade Collaboration Cloud Computing Business Management Cybersecurity Hackers Hardware Windows 10 Microsoft Phishing User Tips Computer Business Continuity Mobile Devices Managed Service Google Communication Workplace Tips VoIp Mobile Device Managed Service Provider Quick Tips Ransomware Smartphone Backup Paperless Office Smartphones Android Business Technology Disaster Recovery Server Encryption Communications Office 365 Saving Money Remote Monitoring Data Management Covid-19 Managed IT Browser Network Vulnerability Windows 7 Compliance Internet of Things BDR Passwords Remote Work Holiday Wi-Fi Healthcare Artificial Intelligence Social Media Facebook Applications Help Desk Managed IT services Microsoft Office Data Security Miscellaneous Laptops Save Money Document Management Users Government Information Automation Two-factor Authentication Scam Redundancy Blockchain Virtualization Tip of the week Employer-Employee Relationship Office Processor Vendor Management Avoiding Downtime Health Antivirus Bandwidth Project Management RMM Data Loss Website BYOD Proactive Training Company Culture Maintenance OneDrive VPN Meetings IoT Infrastructure Regulations Software as a Service Mobility Hard Drive Access Control Virtual Private Network Chrome Storage Employee-Employer Relationship Windows Router IT Management Analytics Customer Relationship Management Machine Learning Recycling Information Technology Unified Communications Time Management Alert Professional Services Managed Services Gmail Monitoring The Internet of Things Risk Management Unified Threat Management Remote Worker Data Storage Cooperation Remote Monitoring and Management Networking Financial Social Network Management Operating System Net Neutrality Search File Sharing Employees Electronic Health Records Files Server Management Password Tablet Dark Web Augmented Reality Consulting Downtime Mobile Office Internet Exlporer Smart Technology Gadgets HIPAA Utility Computing Assessment Bring Your Own Device Computing Word Co-Managed IT Managed Services Provider File Management Remote Workers Patch Management Data Breach Network Management Apps Consultation Payment Cards Flexibility Mobile Security Cyber security Distributed Denial of Service Teamwork Video Conferencing Legislation Development Touchscreen Conferencing Hacking Cybercrime IT Technicians Cost Management Human Error Techology Return on Investment Business Telephone Motherboard Chromebook Printing Options Telephone PCI DSS Specifications Connectivity Authentication Virtual Machines Operations E-Commerce Heating/Cooling Theft Remote Working Digital Payment Hotspot Database Management Managed IT Service Migration eWaste Electronic Medical Records Technology Laws Shared resources Going Green Biometric Cookies Cables Trending OneNote Outlook Permission Disaster Resistance Settings Personal Information IT Assessment Vulnerabilities Emergency Statistics Multi-Factor Security 5G Mobile VoIP Black Friday Authorization Virtual Assistant Bitcoin Credit Cards Money Managing Stress Features Servers Printer Manufacturing Vendor Budget Mouse Language GDPR Break Fix Chatbots Unified Threat Management Batteries Gamification Nanotechnology Wires Politics Cyber Monday Staff Mirgation How To Shortcut Recovery Test Proactive IT Transportation Active Directory Digitize Permissions Mobile Computing Bluetooth Private Cloud Wireless Internet Big Data CRM Wearable Technology Star Wars WPA3 Wasting Time Current Events Computers Microsoft Excel Spam Enterprise Content Management Procurement Smart Devices Computing Infrastructure Instant Messaging Lenovo Windows Server 2008 Identity Theft Enterprise Resource Planning CIO applications App Cache IT Consulting Windows Server Shadow IT Google Calendar Fraud Geography Bookmarks Samsung ROI Employer/Employee Relationships Apple Fleet Tracking Zero-Day Threat Database Holidays Social Networking Cyberattacks Websites Social SharePoint Hard Disk Drives Sensors Alerts Screen Reader Customer Service Superfish Notes Virtual Reality Identity Mail Merge Mobile Device Management User Error Outsource IT Travel Firewall Remote Computing Wireless User Management Outsourcing Modem High-Speed Internet Favorites Proactive Maintenance Solid State Drive Tech Support Asset Tracking Backup and Disaster Recovery Voice over Internet Protocol Projects IT G Suite Read Only SaaS Security Cameras Downloads Solid State Drives Peripheral Comparison Licensing Smart Tech MSP Finance PowerPoint Display Optimization Data Warehousing Mobile Point of Sale Address Tech Terms WiFi Value of Managed Services Laptop Technology Tips Printers Twitter Marketing Regulation Education Content Filtering CEO Students Daniel Stevens

Latest Blog

Many users are noticing or just starting to hear about Google and Apple’s initiative to work with local governments to provide an easy way to help users prevent getting infected with COVID-19. The idea is that, if a local or state government wanted to build an app for users ...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...