Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How NOT to Maintain a Backup

How NOT to Maintain a Backup

A data loss incident is considered a major disaster scenario, especially for small and medium-sized businesses. All it takes is one moment to lose your business’s entire data infrastructure. We’ll walk you through a story that should serve as a cautionary tale, one that hopefully teaches you to adhere to data backup and disaster recovery best practices.

Marco Marsala, a hosting provider, posted on a server forum looking for advice on how to deal with a major issue he encountered while trying to delete a few files. He had utilized what’s called the “rm-rf” command with undefined variables, which wound up destroying all data on the system. Like any good hosting provider, he had backups of the files, but, like a dumb-dumb, he had the backups stored on the system that he accidentally wiped. What a mess.

This is actually a similar blunder to one that Pixar experienced, almost deleting Toy Story 2 prior to its release.

As a result of Marsala’s negligence, all of the data that his company had stored was destroyed. This included the data of 1,535 customers, whom he had built and hosted websites for. Without any backups stored off-site, he had no way to recover the data.

As you might expect, the responses that Marsala received from other users of the online forum were quite negative. Many completely dismissed the possibility that his company could recover from such a devastating failure, and others questioned his abilities as a hosting provider. One poster even went as far as recommending that Marsala seek legal counsel, rather than attempt to restore the data, predicting that Marsala was “going out of business.”

The conclusion: Marsala’s best chance of recovering from this major blow was to recruit help from a third-party data recovery firm. Fortunately for him, the company was able to recover his files, but that doesn’t change the fact that his simple mistake was a huge hit to his company’s finances. The company suffered from fees associated with the disaster recovery process, as well as reduced income from the loss of business suffered as a result of his negligence.

The lesson: neglecting to follow best practices got Marsala in some hot water, and his failure basically invited disaster to his doorstep. Following the accepted best practices of data recovery could have easily prevented the situation from escalating as quickly as it did. In fact, Marsala’s reason for distress (user error) is one of the most common reasons to use a backup and disaster recovery solution, a solution that stores your backups off-site on a separate system.

Storing your data off-site allows your organization to avoid the many causes of data loss, including user error, fires, electrical surges, hardware failure, theft, and so much more. This minimizes the risk of these events threatening your business’s operations.

How do you manage your business’s data backups? Are they stored off-site, and do you have a system in place to rapidly deploy them in the event of a major disaster? If you’re uncertain, reach out to Total Tech Care at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Upgrade Phishing Managed IT Services Windows Ransomware Outsourced IT Data Backup Windows 10 Server Save Money Cloud Computing Data Recovery Office Windows 10 Passwords Chrome Gadgets Virtualization Social Media Saving Money Holiday Tech Term Managed IT Services Microsoft Office Automation Managed Service Operating System Artificial Intelligence Facebook Computers Cybercrime IT Support Internet of Things Hacking Wi-Fi BYOD Health Mobile Device Management Networking Spam Managed Service Provider Office 365 Covid-19 Telephone Systems Alert Information Technology Information Remote BDR Social Engineering Mobility Recovery Employer-Employee Relationship Bandwidth Router Remote Monitoring Law Enforcement Big Data App History Password Mobile Computing Money Encryption Human Resources Application Applications Data Breach Mobile Office Government Private Cloud How To Managed IT Office Tips Training Blockchain Data Storage Paperless Office Apps VPN Patch Management Remote Computing HaaS Avoiding Downtime Data Security Wireless Flexibility Bring Your Own Device Data Management Marketing Work/Life Balance WiFi Gmail IT solutions Vulnerability Entertainment Settings Windows 7 Website Budget Word Two-factor Authentication Infrastructure Google Drive Servers Voice over Internet Protocol Mouse User Error Vendor Meetings Managed Services Data Protection Display Risk Management Save Time Hacker Employee/Employer Relationship RMM The Internet of Things Lithium-ion battery Cleaning Telephone System Conferencing Staff Software as a Service Machine Learning End of Support Scam Remote Work Firewall Connectivity Education USB Physical Security Safety Virtual Reality Sports Apple HIPAA Vendor Management Redundancy Social Keyboard Charger Fraud Managed Services Provider Best Practice YouTube Remote Worker Compliance OneNote Database Computer Care Black Market Cryptocurrency Current Events Wearable Technology Telephony Remote Workers Hard Drives Samsung Retail Instant Messaging Processor Document Management Comparison Wireless Technology Robot Excel Solid State Drive How to Value Downtime Biometrics Hard Drive CES Electronic Medical Records Virus Virtual Desktop Spam Blocking Data storage Unified Threat Management Business Technology Automobile Content Management Hiring/Firing Computer Accessories DDoS Computing Access Control SharePoint Virtual Assistant Computing Infrastructure Going Green Authentication Digital Signage Printer Customer Service Business Intelligence Environment Battery Bluetooth Shadow IT Update Legal Worker Fax Server Audit IT Management Internet Exlporer Procurement Google Docs Net Neutrality Identity Theft SaaS Workplace Strategy Botnet IT Plan IT Consultant Help Desk PDF Printing Network Congestion Unsupported Software Humor Proactive IT eWaste Augmented Reality Tablets Cryptomining Video Games Point of Sale Search Engine Personal Twitter Supply Chain Management Software Tips NIST Entrepreneur Worker Commute Supercomputer Business Mangement Consultant Monitoring Sync Batteries Experience Emails Smart Tech Trending Addiction Scalability Amazon Analytics Windows 8.1 Shortcut Digitize Cost Management Windows Server 2008 R2 Business Owner Recycling Two Factor Authentication Best Available NarrowBand Customer relationships Wiring Social Networking Netflix Practices Root Cause Analysis Cache Manufacturing Search Amazon Web Services WIndows 7 Email Best Practices IT Assessment HBO Safe Mode Knowledge Criminal iPhone Music Running Cable Computer Tips Skype GDPR Managed IT Service Hosted Computing Security Cameras Data loss Wireless Internet Memory Biometric Security Online Shopping Virtual CIO OneDrive Peripheral Outlook File Sharing Leadership Files Troubleshooting Specifications Chromecast Digital Security Cameras Start Menu Camera Using Data Inventory Screen Mirroring Wire 5G Loyalty Evernote User PowerPoint Windows Media Player Copiers Quick Tip Frequently Asked Questions Colocation Books Travel Uninterrupted Power Supply Millennials Ergonomics Mobile Printers Windows 10s Science Smartwatch Cast Smart Office OLED Wireless Charging Managing Stress Monitor Development PCI DSS Tip of the week Virtual Machine webinar Emergency Employer Employee Relationship Workforce Cameras Distributed Denial of Service 2FA Professional Services Virtual Private Network Customer Relationship Management Fiber Optics Public Cloud Employee Messaging Analyitcs Cabling Assessment Cables Reputation Streaming Media Tech Support Policy Windows Server 2008 Programming Hypervisor Content Techology Telecommuting Laptop Dark mode Tools Project Management Trend Micro Nanotechnology SMS Default App Television Cortana Customers Antivirus Procedure Saving Time Audiobook Digital Signature Google Search Touchpad Printer Server dark theme Warranty Shopping Windows 8 AI HVAC IT Infrastructure Public Computer Google Apps IT service FinTech Regulations Politics Analysis Bing Advertising Transportation Rootkit Administrator Social Network Computer Fan Devices Tablet Domains Enterprise Content Management Investment Notifications Employees MSP Employee/Employer Relationships Workers Accountants Benefits ISP Credit Cards IaaS Windows 365 Microchip Maintenance FENG Thought Leadership Video Conferencing Password Management Bloatware ROI IBM Password Manager Relocation Sales Flash Bitcoin Shortcuts Smart Technology Multi-Factor Security

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code