{"id":1683,"date":"2020-10-04T10:14:09","date_gmt":"2020-10-04T07:14:09","guid":{"rendered":"https:\/\/mailsafi.com\/blog\/?p=1683"},"modified":"2020-10-21T14:54:03","modified_gmt":"2020-10-21T11:54:03","slug":"a-resilient-backup-strategy","status":"publish","type":"post","link":"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/","title":{"rendered":"Is Your Company Backup Strategy Resilient?"},"content":{"rendered":"\n<p>Any company is vulnerable to some form of disruption. This may be from hardware failure, theft, human error, natural disasters, or other factors outside your control. The risk of not having a backup strategy doesn\u2019t simply signal data loss. It\u2019s the implications of that data loss that are critical: <em>What would it cost if you lost some or all of your business data?<\/em><\/p>\n\n\n\n<p>For many medium-sized to large corporates, losing critical data for even a few days could result in serious losses, reputational and\/or financial. Therefore, it is important to prioritize getting a resilient backup strategy for your organization.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_49 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"ez-toc-toggle-icon-1\"><label for=\"item-69d51608508f6\" aria-label=\"Table of Content\"><span style=\"display: flex;align-items: center;width: 35px;height: 30px;justify-content: center;direction:ltr;\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/label><input  type=\"checkbox\" id=\"item-69d51608508f6\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#1_Threats_to_Your_Business_Data\" title=\"1. Threats to Your Business Data\">1. Threats to Your Business Data<\/a><ul class='ez-toc-list-level-4'><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4'><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#Common_threats_to_business_data_include\" title=\"Common threats to business data include:-\">Common threats to business data include:-<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#2_Backup_Strategies\" title=\"2. Backup Strategies\">2. Backup Strategies<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#21_Local_Drives_and_Network_Backups\" title=\"2.1 Local Drives and Network Backups\">2.1 Local Drives and Network Backups<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#22_Cloud_Backups\" title=\"2.2 Cloud Backups\">2.2 Cloud Backups<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#23_Online_File_Storage\" title=\"2.3 Online File Storage\">2.3 Online File Storage<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#3_Data_Recovery\" title=\"3. Data Recovery\">3. Data Recovery<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#4_Conclusion\" title=\"4. Conclusion\">4. Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\" style=\"font-size:34px\"><span class=\"ez-toc-section\" id=\"1_Threats_to_Your_Business_Data\"><\/span><strong><span class=\"has-inline-color has-vivid-red-color\">1. Threats to Your Business Data<\/span><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Many concepts factor into a good backup strategy. The challenge is not to build a universal solution but to develop a well-balanced data protection plan that suits your particular needs. Therefore, while including the<span class=\"has-inline-color has-vivid-cyan-blue-color\"> <strong>3-2-1 backup rule<\/strong><\/span>, the plan should cover many other aspects of data protection such as critical data areas, backup types, storage media, scheduling, disaster recovery operation, automation, encryption, regular live testing under different scenarios, etc.<\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p><strong><em>Risks to Business Data Are Everywhere<\/em><\/strong><\/p><\/blockquote><\/figure>\n\n\n\n<p>Reports of malicious software and hackers are everywhere these days. While these threats pose significant risks for businesses, they are also certainly not the only ones out there. With that in mind, we will cover some of the threats that put your business data and at risk daily.<\/p>\n\n\n\n<h4 class=\"has-medium-font-size wp-block-heading\"><span class=\"ez-toc-section\" id=\"Common_threats_to_business_data_include\"><\/span>Common threats to business data include:-<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<ul><li><strong>Hackers and ransomware: <\/strong>Cyberattacks against businesses are on the rise and doing more damage than ever. In the last decade, numbers relating to ransomware are on the rise and quite alarming. Beyond the risk of losing money, businesses have a lot more to lose than just data in a cyberattack.<\/li><\/ul>\n\n\n\n<ul><li><strong>Viruses, worms, malware: <\/strong>While hackers and ransomware outbreaks are certainly causing damage and making headlines, old-school malware, spyware, and old-fashioned viruses continue to be among the leading causes of system breaches\/data loss. Even with updated security software, most businesses remain exposed to the threat of data loss due to hackers, malware, and ransomware.<\/li><\/ul>\n\n\n\n<ul><li><strong>Physical disasters: <\/strong>A fire, flood, or building collapse can wipe out <strong><em>all<\/em><\/strong> the data in your primary business premises.<\/li><\/ul>\n\n\n\n<ul><li><strong>Theft: <\/strong>Theft of company computers or servers, hard drives, or storage device may result in significant data loss.<\/li><\/ul>\n\n\n\n<ul><li><strong>Hardware failure\/crashes: <\/strong>&nbsp;There is a very real possibility of hard drive failure and other types of hardware mishaps<strong>. Electrical faults\/voltage surges<\/strong> may also contribute to hardware failure.<\/li><\/ul>\n\n\n\n<ul><li><strong>Human error: <\/strong>Business data may be lost owing to simple accidental deletion \u2013 sometimes it could be from a single click.<\/li><\/ul>\n\n\n\n<ul><li><strong>Vandalism: <\/strong>deliberate destruction and loss resulting from political unrest, demonstrations.<\/li><\/ul>\n\n\n\n<ul><li><strong>Acts of Terrorism<\/strong><\/li><\/ul>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>With this laundry list of threats, <strong><em>it is not a matter of <u>if<\/u> your business will become a victim; it\u2019s just a question of <u>when<\/u>.<\/em><\/strong><\/p><\/blockquote><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:34px\"><span class=\"ez-toc-section\" id=\"2_Backup_Strategies\"><\/span><strong><span class=\"has-inline-color has-vivid-red-color\">2. Backup Strategies<\/span><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>As illustrated above, there are numerous threats to business data. Keeping backup copies of your important files and data is essential to minimize disruption to business in the event of a disaster.<\/p>\n\n\n\n<p>Virtually all computer and technology experts will tell you that any backup strategy is better than none at all. However, not all backup devices and technologies are the same, nor do they all offer the same protection levels. For optimal protection, it is best to safeguard your data using the time-honored<a rel=\"noreferrer noopener\" href=\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/\" target=\"_blank\"><span class=\"has-inline-color has-vivid-cyan-blue-color\"> <strong>3-2-1 rule<\/strong><\/span>. <\/a>Put simply, the 3-2-1 rule states that you should:<\/p>\n\n\n\n<ul><li>Keep at least three (3) copies of your data in different locations (so no single event will destroy all copies);<\/li><li>Store the data in at least two (2) different formats. For instance, external drive, tape, etc.);<\/li><li>Keep one (1) copy offsite in the cloud to protect against fire, flood, theft, and other physical disasters.<\/li><\/ul>\n\n\n\n<p>To guide you on how you can implement the 3-2-1 rule, let\u2019s look at some common ways businesses do backups.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-size:28px\"><span class=\"ez-toc-section\" id=\"21_Local_Drives_and_Network_Backups\"><\/span><strong><span class=\"has-inline-color has-vivid-red-color\">2.1 Local Drives and Network Backups<\/span><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>A common way to create backups of business data is by storing copies of files on external media. For instance, hard drives, USB flash drives, tape drives, or other storage devices connected to your systems or network. As with any good data recovery plan, keeping local copies of backups is essential. Backing up to devices attached to computer systems or copying files to devices connected via a local or wide area network is an effective way of ensuring backups are available locally when you need them. <\/p>\n\n\n\n<p>However, due to risks associated with physical disasters, ransomware, theft, and other threats, keeping local backups should <strong><em>never<\/em><\/strong> be the only facet of your backup strategy. You should always store at least one copy offsite as is required with the <strong><a href=\"https:\/\/mailsafi.com\/blog\/the-golden-3-2-1-backup-rule-an-efficient-data-protection-strategy\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">3-2-1 rule<\/span><\/a><\/strong>. This may be on an offsite backup server or in the cloud.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-size:28px\"><span class=\"ez-toc-section\" id=\"22_Cloud_Backups\"><\/span><strong><span class=\"has-inline-color has-vivid-red-color\">2.2 Cloud Backups<\/span><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>These days, wherever you turn, there is talk or news about businesses migrating to the cloud. Essentially, they are running software and systems remotely via the internet. A backup strategy is no exception. Cloud backups are secure, offsite copies of stored data on remote servers and accessed via an internet connection. Cloud backups are an excellent choice for providing additional redundancy and security for businesses that want to ensure their critical data is available when disasters strike.<\/p>\n\n\n\n<h3 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:28px\"><span class=\"ez-toc-section\" id=\"23_Online_File_Storage\"><\/span><strong>2.3 Online File Storage<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Please note that <strong><a href=\"https:\/\/mailsafi.com\/blog\/cloud-storage-is-not-cloud-backup\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">cloud backups and online file storage are not the same<\/span><\/a><\/strong>. Several businesses use Dropbox, Google Drive, Microsoft OneDrive, and other online storage websites to store backup copies of their important files. While these services are okay for storing and sharing a few files, the limitations of online storage sites prevent them from being true cloud backups. A true cloud backup service enables you to create automated backups of complete systems and store as many versions of backups as you need).<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:34px\"><span class=\"ez-toc-section\" id=\"3_Data_Recovery\"><\/span><strong>3. Data Recovery<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Now that you have a backup solution in place, is it good enough to quickly return your business to normal after a disaster? If that solution is only disk or tape, think again. <strong>Outdated solutions are simply that: Outdated<\/strong>. It&#8217;s important to have a solution that will keep your business prepared for quick recovery or low RTO (Recovery Time Objective) in the face of disruption.<\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p><strong>A proper backup solution is only as good as its recovery.<\/strong><\/p><\/blockquote><\/figure>\n\n\n\n<p>The resiliency of your backup also depends on its security features. Choose a solution that encrypts data in transit and in storage and one that hosts it in a truly secure data center.<\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:34px\"><span class=\"ez-toc-section\" id=\"4_Conclusion\"><\/span><strong>4. Conclusion<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>People tend to think in terms of the probability of disasters affecting their primary business premises. Of course, earthquakes, floods, or tornadoes may be the most unlikely events for your city. You may also think the probability of a terroristic attack is remote, but most of the common threats leading to data loss are always present. Even if your primary business premise is well protected against physical threats, there are still other threats, which are largely not in your control: hardware failure, viruses, malicious attacks, and human error.<\/p>\n\n\n\n<p>There are many ways for businesses to create backups of important data, and you should use multiple methods to ensure your data is always available when needed.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\">MailSafi offers an easy-to-manage, cost-effective cloud backup solution that enables you to back up entire systems\/virtual machines or limit backups to mission-critical data or files. <strong><a rel=\"noreferrer noopener\" href=\"https:\/\/www.mailsafi.com\/contact-us\" target=\"_blank\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">Get in touch<\/span><\/a><\/strong> to learn more about our solution.<\/p>\n<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_1683\" class=\"pvc_stats all  \" data-element-id=\"1683\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Any company is vulnerable to some form of disruption. This may be from hardware failure, theft, human error, natural disasters, or other factors outside your control. The risk of not having a backup strategy doesn\u2019t simply signal data loss. It\u2019s the implications of that data loss that are critical: What would it cost if you [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_1683\" class=\"pvc_stats all  \" data-element-id=\"1683\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":1684,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[101],"tags":[82,47],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Backup Strategy: Developing a Resilient Plan for your Business | MailSafi<\/title>\n<meta name=\"description\" content=\"Using a mix of backup methods is important in building a resilient backup strategy for your business. We discuss the options available.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Backup Strategy: Developing a Resilient Plan for your Business | MailSafi\" \/>\n<meta property=\"og:description\" content=\"Using a mix of backup methods is important in building a resilient backup strategy for your business. We discuss the options available.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"The MailSafi Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/msgafricaltd\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-04T07:14:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-21T11:54:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/image-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"322\" \/>\n\t<meta property=\"og:image:height\" content=\"211\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"the_leaders\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:site\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"the_leaders\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/\"},\"author\":{\"name\":\"the_leaders\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14\"},\"headline\":\"Is Your Company Backup Strategy Resilient?\",\"datePublished\":\"2020-10-04T07:14:09+00:00\",\"dateModified\":\"2020-10-21T11:54:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/\"},\"wordCount\":1218,\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/image-1.png\",\"keywords\":[\"cloud data backup\",\"Data Backup\"],\"articleSection\":[\"Email Archiving and Backup\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/\",\"url\":\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/\",\"name\":\"Backup Strategy: Developing a Resilient Plan for your Business | MailSafi\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/image-1.png\",\"datePublished\":\"2020-10-04T07:14:09+00:00\",\"dateModified\":\"2020-10-21T11:54:03+00:00\",\"description\":\"Using a mix of backup methods is important in building a resilient backup strategy for your business. We discuss the options available.\",\"breadcrumb\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#primaryimage\",\"url\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/image-1.png\",\"contentUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/image-1.png\",\"width\":322,\"height\":211,\"caption\":\"Building a resilient backup strategy\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mailsafi.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is Your Company Backup Strategy Resilient?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"name\":\"The MailSafi Blog\",\"description\":\"We Stop Spam\",\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mailsafi.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\",\"name\":\"Message Labs Africa\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Message Labs Africa\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/msgafricaltd\/\",\"https:\/\/x.com\/msgafricaltd\",\"https:\/\/www.linkedin.com\/feed\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14\",\"name\":\"the_leaders\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g\",\"caption\":\"the_leaders\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Backup Strategy: Developing a Resilient Plan for your Business | MailSafi","description":"Using a mix of backup methods is important in building a resilient backup strategy for your business. We discuss the options available.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/","og_locale":"en_US","og_type":"article","og_title":"Backup Strategy: Developing a Resilient Plan for your Business | MailSafi","og_description":"Using a mix of backup methods is important in building a resilient backup strategy for your business. We discuss the options available.","og_url":"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/","og_site_name":"The MailSafi Blog","article_publisher":"https:\/\/www.facebook.com\/msgafricaltd\/","article_published_time":"2020-10-04T07:14:09+00:00","article_modified_time":"2020-10-21T11:54:03+00:00","og_image":[{"width":322,"height":211,"url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/image-1.png","type":"image\/png"}],"author":"the_leaders","twitter_card":"summary_large_image","twitter_creator":"@msgafricaltd","twitter_site":"@msgafricaltd","twitter_misc":{"Written by":"the_leaders","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#article","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/"},"author":{"name":"the_leaders","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14"},"headline":"Is Your Company Backup Strategy Resilient?","datePublished":"2020-10-04T07:14:09+00:00","dateModified":"2020-10-21T11:54:03+00:00","mainEntityOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/"},"wordCount":1218,"publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/image-1.png","keywords":["cloud data backup","Data Backup"],"articleSection":["Email Archiving and Backup"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/","url":"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/","name":"Backup Strategy: Developing a Resilient Plan for your Business | MailSafi","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#primaryimage"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/image-1.png","datePublished":"2020-10-04T07:14:09+00:00","dateModified":"2020-10-21T11:54:03+00:00","description":"Using a mix of backup methods is important in building a resilient backup strategy for your business. We discuss the options available.","breadcrumb":{"@id":"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#primaryimage","url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/image-1.png","contentUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2020\/10\/image-1.png","width":322,"height":211,"caption":"Building a resilient backup strategy"},{"@type":"BreadcrumbList","@id":"https:\/\/mailsafi.com\/blog\/a-resilient-backup-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailsafi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Is Your Company Backup Strategy Resilient?"}]},{"@type":"WebSite","@id":"https:\/\/mailsafi.com\/blog\/#website","url":"https:\/\/mailsafi.com\/blog\/","name":"The MailSafi Blog","description":"We Stop Spam","publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailsafi.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailsafi.com\/blog\/#organization","name":"Message Labs Africa","url":"https:\/\/mailsafi.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Message Labs Africa"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/msgafricaltd\/","https:\/\/x.com\/msgafricaltd","https:\/\/www.linkedin.com\/feed\/"]},{"@type":"Person","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14","name":"the_leaders","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g","caption":"the_leaders"}}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/1683"}],"collection":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/comments?post=1683"}],"version-history":[{"count":29,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/1683\/revisions"}],"predecessor-version":[{"id":2134,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/1683\/revisions\/2134"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media\/1684"}],"wp:attachment":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media?parent=1683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/categories?post=1683"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/tags?post=1683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}