Data Breach

Backing Up – Information Security Essentials

Backing Up

The concept behind backups is simple: Make a copy of your files and configurations and place them on storage separate from your main hard drive. That storage can be another drive, an external drive, a NAS, a rewritable disc, or an online storage and syncing service. Should you lose the files, either through disaster or by permanently deleting them, you can just restore them from saved copies.

In order for this to work, the copies must be updated regularly. Most backup software allows you to schedule scans of your hard drive for new and changed files daily and some even continually (or at least every 15 minutes) monitor your drive for changed or new files.

In the SECMON1 blog post ‘Security Overview – Information Security Essentials’, we spoke about daily backups and why it is an essential security measure. 

In this document, we are going to describe how to implement some basic backup strategies as well as take you step by step through some ways you can achieve this using your existing technology and resources.  Finally, we will give you some interesting and important links where you can educate yourself further on the topic and discuss some other options available to you.

CLICK HERE TO DOWNLOAD THIS SECMON1 INFORMATION SECURITY ESSENTIALS GUIDE

Christopher McNaughton

Recent Posts

Understanding the Australian economy through the lens of underwear and lipstick sales

In an intriguing development, recent trends in Australia's retail sector—namely, a decline in men's underwear…

12 months ago

New fraud costing Australian business millions annually

  If you work in the Finance Department of your company your email account might…

4 years ago

INFORMATION THEFT – THE EMPLOYEE RISK

  Information Theft - What is the Risk? Our research has shown that around 68%…

4 years ago

Don’t Become a Victim of Cyber Crime

  The Impacts of a Cyber Attack In your personal life and as an employee,…

4 years ago

YOUR COMPANY HAS BEEN BREACHED!

The Data Governance Watershed "You've been breached!" These are words none of us want to…

4 years ago

CASE STUDY – OFFICE 365 BREACH

CASE STUDY  (5 Min read)  The following case study details a case where SECMON1 was…

5 years ago