Backup Data

Think of the consequences your organisation faces if you lost all of the data you hold. How long could you continue operating? Data loss may not always be the result of a cyber attack, but could be caused by theft, flood, fire, or general damage to the device. It is important to safeguard your most important data, and have it backed up regularly onto a safe location.

Read our top tips on backing up your data HERE

Backup Data Methods


External Hard Drives

This is the quickest and most efficient method to back up your data. There are various types of hard drives available, both in storage size and function, where it can either be plugged into your computer’s USB port or connected via your wireless network. External hard drives can be easily stored off-site, keeping them safe and separate from the main network system. For added security and protection, purchase a hard drive with built-in encryption, that can only be accessed with a password.

Cloud Backup

The benefits of using cloud storage is that your data is physically separate from your location. Various cloud services allow you to store large amounts of data for free or at a more affordable cost and allows for automated backups to ensure that you have the latest version of your data saved. Although using the cloud to backup is one of the recommendations, this should not be used as your only method. In the event of a ransomware attack, the risk might be that your original files are ‘ransomwared’ and the cloud storage service you are using (such as OneDrive, Dropbox, SharePoint, etc.) may automatically synchronise those infected files, resulting in you losing your backup data as well. Therefore, ensure that you have multiple versions of backed up data.

If you are a Mac user, the Time Machine Backup is a helpful tool that allows you to set up automatic backups of Mac operating systems. Find out more information on Time Machine backup HERE. 

For Windows users, Windows 10 allows you to backup and restore your data using File History. For more information click HERE

It is important to have procedures in place to prevent your backup from being corrupted or accessed during a cyber attack.

Please visit the National Cyber Security Centre (NCSC) for more information on how to protect backups stored in the public cloud.


Encrypted USB Devices

Using USB devices to store and back up data can be a convenient method, especially when transferring data between devices. Similar to hard drives, there are encrypted USB devices available that you can purchase for added security, especially when you need to store sensitive data and need to keep it separate to your network system. However, unlike other backup methods, it has a limited capacity to the amount of data it can store. Therefore, it might only be useful to hold a few important documents on it. Additionally, USB devices should be stored safely, as they can be easily misplaced or stolen.

Type of Backups 

Full Backup

Full Backup

A full backup is exactly as it sounds - it is a complete backup operation that makes copies of all of your data to another device or location. This should be done on a regular basis to ensure you have a comprehensive backup of your data stored separately from your device or network system.

Incremental Backup

Incremental Backup

An incremental backup is a process where only data that has been changed since the last back up is copied. This method uses modified time stamps on files and compares it to the time stamp of the last back up. However, if the data has not been changed, then an incremental backup will not back up these files.

Differential Backup

Differential Backup

Differential backup is similar to an incremental backup, but a slight difference is that it will only back up files that have been changed from the last full back up.

Backup Data Blogs

This image for Image Layouts addon
Managing a breach | Let’s talk about recovery | Data2Vault.
This image for Image Layouts addon
Data Backup | The Last Line Of Data Protection Defence
This image for Image Layouts addon
Mac Backup | The Ultimate Guide to Mac Backup
cloud compliance
Cloud Compliance | SaaS applications aren’t enough

BYOD Advice Videos

What is BYOD and what are the risks?

Mitigating the risks of BYOD

Extra Resources

Backup Provisions

Backup is a key part of an IT Disaster Recovery Plan, our friends at DATA2VAULT have put together a guide to getting the right backup provision for your organisation. Click the image below to download the PDF:

Backup Data

Cloud Computing

How do you know what “Cloud” to choose? Anderson IT Management has provided a handy guide to help you through the steps of choosing the right 'Cloud' for you. Click the image for more information:

Backup Data