{"id":1671,"date":"2020-10-03T19:59:59","date_gmt":"2020-10-03T16:59:59","guid":{"rendered":"https:\/\/mailsafi.com\/blog\/?p=1671"},"modified":"2020-10-09T18:57:22","modified_gmt":"2020-10-09T15:57:22","slug":"the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy","status":"publish","type":"post","link":"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/","title":{"rendered":"The Golden 3-2-1 Backup Rule &#8211; A Resilient Backup Strategy"},"content":{"rendered":"\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_49 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"ez-toc-toggle-icon-1\"><label for=\"item-69d7a42ce2a1a\" aria-label=\"Table of Content\"><span style=\"display: flex;align-items: center;width: 35px;height: 30px;justify-content: center;direction:ltr;\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/label><input  type=\"checkbox\" id=\"item-69d7a42ce2a1a\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/#1_Introduction\" title=\"1. Introduction\">1. Introduction<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/#2_So_What_is_the_3-2-1_Backup_Rule\" title=\"2. So What is the 3-2-1 Backup Rule?\">2. So What is the 3-2-1 Backup Rule?<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/#Keep_at_least_three_copies_of_your_data\" title=\"Keep at least&nbsp;three&nbsp;copies of your data\">Keep at least&nbsp;three&nbsp;copies of your data<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/#Store_two_backup_copies_on_different_devices_or_storage_media\" title=\"Store&nbsp;two&nbsp;backup copies on different devices or storage media\">Store&nbsp;two&nbsp;backup copies on different devices or storage media<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/#Keep_at_least_one_backup_copy_offsite\" title=\"Keep at least&nbsp;one&nbsp;backup copy offsite\">Keep at least&nbsp;one&nbsp;backup copy offsite<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/#Conclusion\" title=\"Conclusion\">Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\" style=\"font-size:34px\"><span class=\"ez-toc-section\" id=\"1_Introduction\"><\/span><strong><span class=\"has-inline-color has-vivid-red-color\">1. Introduction<\/span><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Backup ensures that your critical business data will survive any eventuality that could lead to its loss.<\/p>\n\n\n\n<p>Many companies have suffered from having their hardware &#8211; servers\/PCs\/laptops\/tablets\/phones) &#8211; lost or stolen, destroyed by fires or floods, infected with malware or corrupted by targeted hacker attacks (viruses, worms, ransomware). <\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>Statistics dictate that you most likely will one day lose a crucial part of your business data; the question is whether or not you are prepared for this eventuality.<\/p><\/blockquote><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_So_What_is_the_3-2-1_Backup_Rule\"><\/span><span class=\"has-inline-color has-vivid-red-color\">2. So What is the 3-2-1 Backup Rule?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>You may already know that backup is important. However, it is just as important to remember that having one backup copy is often not enough.<\/p>\n\n\n\n<p>Let\u2019s assume that you backup your server to an external drive or tape, which you keep in your office. If your server crashes, you have the backup copy. However, if a fire breaks out in your office, it will destroy both your server and the external drive\/tape.<\/p>\n\n\n\n<p><span class=\"has-inline-color has-black-color\">For a one-server user, a <\/span><strong><a rel=\"noreferrer noopener\" href=\"https:\/\/mailsafi.com\/blog\/is-your-company-backup-strategy-resilient\/\" target=\"_blank\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">backup strategy<\/span><\/a><\/strong><span class=\"has-inline-color has-black-color\"> may be as simple as copying all important files to another device(s)<\/span> <span class=\"has-inline-color has-black-color\">\u2013 and keeping them in a safe place, away from the primary source. However, for multiple servers or computer systems, things are usually more complex. <\/span><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p> A comprehensive data protection strategy should include the 3-2-1 backup rule. <\/p><\/blockquote><\/figure>\n\n\n\n<p>The 3-2-1 backup rule was established to address hard-drive failures thanks to <strong><a rel=\"noreferrer noopener\" href=\"https:\/\/en.wikipedia.org\/wiki\/Peter_Krogh_(photographer)\" target=\"_blank\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">Peter Krogh.<\/span><\/a><\/strong> Peter Krogh is a well-known photographer who was obsessed with protecting data.<\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p><strong><em>The&nbsp;3-2-1 backup strategy&nbsp;is a revered and time-honored backup strategy.<\/em><\/strong><\/p><\/blockquote><\/figure>\n\n\n\n<p>The 3-2-1 backup rule is an easy-to-remember acronym for a common approach to keeping your data safe in almost any data failure scenario. The rule is:<\/p>\n\n\n\n<ul><li>Keep at least three (3) copies of your data <strong><\/strong><\/li><li>Store your copies in at least two (2) different storage media&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <strong><\/strong><\/li><li>Store at least one (1) of them in an offsite location. <strong><\/strong><\/li><\/ul>\n\n\n\n<p>To clarify, let\u2019s take a look at each point of this rule.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-size:28px\"><span class=\"ez-toc-section\" id=\"Keep_at_least_three_copies_of_your_data\"><\/span><strong><span class=\"has-inline-color has-vivid-red-color\">Keep at least&nbsp;<u>three<\/u>&nbsp;copies of your data<\/span><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Even a trivial event such as a fire alarm triggering the sprinkler system could literally wipe out all your data. Countless other incidents could bring about the same outcome &#8211; for instance: theft, a fire, a disgruntled employee with a vendetta, or vandalism by a rioting mob. So, having one backup copy isn\u2019t enough, especially if it is stored in the same location as the primary data and on the same type of media.<\/p>\n\n\n\n<p>Theoretically, the more backup copies you have, the less chance you have to lose all of them at once. This is the premise of the 3-2-1 backup rule &#8211;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; that you need at least three copies of your data, meaning the <strong>primary data and two backups of this data.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-size:28px\"><span class=\"ez-toc-section\" id=\"Store_two_backup_copies_on_different_devices_or_storage_media\"><\/span><strong><span class=\"has-inline-color has-vivid-red-color\">Store&nbsp;<u>two<\/u>&nbsp;backup copies on different devices or storage media<\/span><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>We must remember that any storage device will fail sooner or later. Hard drives fail over time, whether because of a defect or simply wearing out. Two identical devices have a higher risk of failing around the same time than two devices of different types.<\/p>\n\n\n\n<p>Additionally, storing several backups of your valuable data in the same server\/location is hardly logical. Whether it is Murphy\u2019s Law or wear and tear or the drives were bought at the same time and have the same mean time between failures (MTBF) rates, it is quite common after a drive failure to experience failure form another drive in the same storage around the same time.<\/p>\n\n\n\n<p>Thus, the 3-2-1 backup rule suggests that if you keep your primary data on an internal hard drive, store your backup copies a different way \u2013 for example, on an external hard drive, USB flash drive, or tape. Failing that, at least keep copies on two internal hard disk drives in different storage locations. Remember \u2013 your hard drive is cheap, but your data is invaluable.<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:28px\"><span class=\"ez-toc-section\" id=\"Keep_at_least_one_backup_copy_offsite\"><\/span><strong>Keep at least&nbsp;<u>one<\/u>&nbsp;backup copy offsite<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>It is obvious that a local disaster can damage all copies of data stored in one place. Therefore, it makes sense to physically separate backup copies. The 3-2-1 backup rule says: keep at least one copy of your data in a <strong>remote location<\/strong>. This could be in offsite storage or the cloud. If you want to protect your data from disasters that might strike large areas, merely storing the offsite copy across town is not enough. \u201cRemote\u201d should mean as far away as possible &#8211; for instance, in another city, county, state, country, or even continent.<\/p>\n\n\n\n<p>Building secondary data centers or private clouds for offsite data backups are options. However, these would be expensive undertakings for many organizations. Whether you are a small business or a large enterprise, storing backups in the cloud is the most efficient and cost-effective option.<\/p>\n\n\n\n<p>Offsite tapes still exist and can serve some data protection functions. However, in this era of software-defined data centers, partnering with third-party cloud backup providers is a better approach. It provides a simplified way to secure backups offsite and ensure continued availability. Backing up your data is good, but being able to use it when disaster strikes is a crucial step in building a resilient data protection strategy.<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:34px\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><strong>Conclusion<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Multiple copies stipulated by the 3-2-1 backup rule protect you from losing your primary data together with its only backup copy, whereas storing copies of data in multiple locations ensures that there is no single point of failure and that your data is safe, should something happen to any of these locations.<\/p>\n\n\n\n<p>The 3-2-1 backup rule is a good start in building any data protection system \u2013 a way to protect your data from loss\/corruption and to control risks in all of the aforementioned situations. Being well prepared in advance is the best data protection policy.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">For peace of mind, choose a backup solution<span class=\"has-inline-color has-vivid-cyan-blue-color\"> <\/span>that automatically backs up your system and files in the implementation of the 3-2-1.<\/p>\n<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_1671\" class=\"pvc_stats all  \" data-element-id=\"1671\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div>","protected":false},"excerpt":{"rendered":"<p>1. Introduction Backup ensures that your critical business data will survive any eventuality that could lead to its loss. Many companies have suffered from having their hardware &#8211; servers\/PCs\/laptops\/tablets\/phones) &#8211; lost or stolen, destroyed by fires or floods, infected with malware or corrupted by targeted hacker attacks (viruses, worms, ransomware). Statistics dictate that you most [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_1671\" class=\"pvc_stats all  \" data-element-id=\"1671\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":1674,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[101,175],"tags":[123],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Golden 3-2-1 Backup Rule - A Resilient Backup Strategy &#187; The MailSafi Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Golden 3-2-1 Backup Rule - A Resilient Backup Strategy &#187; The MailSafi Blog\" \/>\n<meta property=\"og:description\" content=\"1. Introduction Backup ensures that your critical business data will survive any eventuality that could lead to its loss. Many companies have suffered from having their hardware &#8211; servers\/PCs\/laptops\/tablets\/phones) &#8211; lost or stolen, destroyed by fires or floods, infected with malware or corrupted by targeted hacker attacks (viruses, worms, ransomware). Statistics dictate that you most [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"The MailSafi Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/msgafricaltd\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-03T16:59:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-09T15:57:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/3-2-1-backup-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1219\" \/>\n\t<meta property=\"og:image:height\" content=\"648\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"the_leaders\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:site\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"the_leaders\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/\"},\"author\":{\"name\":\"the_leaders\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14\"},\"headline\":\"The Golden 3-2-1 Backup Rule &#8211; A Resilient Backup Strategy\",\"datePublished\":\"2020-10-03T16:59:59+00:00\",\"dateModified\":\"2020-10-09T15:57:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/\"},\"wordCount\":1026,\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/3-2-1-backup-2.jpg\",\"keywords\":[\"backup\"],\"articleSection\":[\"Email Archiving and Backup\",\"Resources\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/\",\"url\":\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/\",\"name\":\"The Golden 3-2-1 Backup Rule - A Resilient Backup Strategy &#187; The MailSafi Blog\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/3-2-1-backup-2.jpg\",\"datePublished\":\"2020-10-03T16:59:59+00:00\",\"dateModified\":\"2020-10-09T15:57:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/#primaryimage\",\"url\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/3-2-1-backup-2.jpg\",\"contentUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/3-2-1-backup-2.jpg\",\"width\":1219,\"height\":648,\"caption\":\"The 3-2-1 Backup Rule\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mailsafi.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Golden 3-2-1 Backup Rule &#8211; A Resilient Backup Strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"name\":\"The MailSafi Blog\",\"description\":\"We Stop Spam\",\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mailsafi.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\",\"name\":\"Message Labs Africa\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Message Labs Africa\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/msgafricaltd\/\",\"https:\/\/x.com\/msgafricaltd\",\"https:\/\/www.linkedin.com\/feed\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14\",\"name\":\"the_leaders\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g\",\"caption\":\"the_leaders\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Golden 3-2-1 Backup Rule - A Resilient Backup Strategy &#187; The MailSafi Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/","og_locale":"en_US","og_type":"article","og_title":"The Golden 3-2-1 Backup Rule - A Resilient Backup Strategy &#187; The MailSafi Blog","og_description":"1. Introduction Backup ensures that your critical business data will survive any eventuality that could lead to its loss. Many companies have suffered from having their hardware &#8211; servers\/PCs\/laptops\/tablets\/phones) &#8211; lost or stolen, destroyed by fires or floods, infected with malware or corrupted by targeted hacker attacks (viruses, worms, ransomware). Statistics dictate that you most [&hellip;]","og_url":"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/","og_site_name":"The MailSafi Blog","article_publisher":"https:\/\/www.facebook.com\/msgafricaltd\/","article_published_time":"2020-10-03T16:59:59+00:00","article_modified_time":"2020-10-09T15:57:22+00:00","og_image":[{"width":1219,"height":648,"url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/3-2-1-backup-2.jpg","type":"image\/jpeg"}],"author":"the_leaders","twitter_card":"summary_large_image","twitter_creator":"@msgafricaltd","twitter_site":"@msgafricaltd","twitter_misc":{"Written by":"the_leaders","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/#article","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/"},"author":{"name":"the_leaders","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14"},"headline":"The Golden 3-2-1 Backup Rule &#8211; A Resilient Backup Strategy","datePublished":"2020-10-03T16:59:59+00:00","dateModified":"2020-10-09T15:57:22+00:00","mainEntityOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/"},"wordCount":1026,"publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/3-2-1-backup-2.jpg","keywords":["backup"],"articleSection":["Email Archiving and Backup","Resources"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/","url":"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/","name":"The Golden 3-2-1 Backup Rule - A Resilient Backup Strategy &#187; The MailSafi Blog","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/#primaryimage"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/3-2-1-backup-2.jpg","datePublished":"2020-10-03T16:59:59+00:00","dateModified":"2020-10-09T15:57:22+00:00","breadcrumb":{"@id":"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/#primaryimage","url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/3-2-1-backup-2.jpg","contentUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/3-2-1-backup-2.jpg","width":1219,"height":648,"caption":"The 3-2-1 Backup Rule"},{"@type":"BreadcrumbList","@id":"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailsafi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Golden 3-2-1 Backup Rule &#8211; A Resilient Backup Strategy"}]},{"@type":"WebSite","@id":"https:\/\/mailsafi.com\/blog\/#website","url":"https:\/\/mailsafi.com\/blog\/","name":"The MailSafi Blog","description":"We Stop Spam","publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailsafi.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailsafi.com\/blog\/#organization","name":"Message Labs Africa","url":"https:\/\/mailsafi.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Message Labs Africa"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/msgafricaltd\/","https:\/\/x.com\/msgafricaltd","https:\/\/www.linkedin.com\/feed\/"]},{"@type":"Person","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14","name":"the_leaders","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g","caption":"the_leaders"}}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/1671"}],"collection":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/comments?post=1671"}],"version-history":[{"count":18,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/1671\/revisions"}],"predecessor-version":[{"id":3681,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/1671\/revisions\/3681"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media\/1674"}],"wp:attachment":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media?parent=1671"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/categories?post=1671"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/tags?post=1671"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}