Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How NOT to Maintain a Backup

How NOT to Maintain a Backup

A data loss incident is considered a major disaster scenario, especially for small and medium-sized businesses. All it takes is one moment to lose your business’s entire data infrastructure. We’ll walk you through a story that should serve as a cautionary tale, one that hopefully teaches you to adhere to data backup and disaster recovery best practices.

Marco Marsala, a hosting provider, posted on a server forum looking for advice on how to deal with a major issue he encountered while trying to delete a few files. He had utilized what’s called the “rm-rf” command with undefined variables, which wound up destroying all data on the system. Like any good hosting provider, he had backups of the files, but, like a dumb-dumb, he had the backups stored on the system that he accidentally wiped. What a mess.

This is actually a similar blunder to one that Pixar experienced, almost deleting Toy Story 2 prior to its release.

As a result of Marsala’s negligence, all of the data that his company had stored was destroyed. This included the data of 1,535 customers, whom he had built and hosted websites for. Without any backups stored off-site, he had no way to recover the data.

As you might expect, the responses that Marsala received from other users of the online forum were quite negative. Many completely dismissed the possibility that his company could recover from such a devastating failure, and others questioned his abilities as a hosting provider. One poster even went as far as recommending that Marsala seek legal counsel, rather than attempt to restore the data, predicting that Marsala was “going out of business.”

The conclusion: Marsala’s best chance of recovering from this major blow was to recruit help from a third-party data recovery firm. Fortunately for him, the company was able to recover his files, but that doesn’t change the fact that his simple mistake was a huge hit to his company’s finances. The company suffered from fees associated with the disaster recovery process, as well as reduced income from the loss of business suffered as a result of his negligence.

The lesson: neglecting to follow best practices got Marsala in some hot water, and his failure basically invited disaster to his doorstep. Following the accepted best practices of data recovery could have easily prevented the situation from escalating as quickly as it did. In fact, Marsala’s reason for distress (user error) is one of the most common reasons to use a backup and disaster recovery solution, a solution that stores your backups off-site on a separate system.

Storing your data off-site allows your organization to avoid the many causes of data loss, including user error, fires, electrical surges, hardware failure, theft, and so much more. This minimizes the risk of these events threatening your business’s operations.

How do you manage your business’s data backups? Are they stored off-site, and do you have a system in place to rapidly deploy them in the event of a major disaster? If you’re uncertain, reach out to Total Tech Care at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity IT Support Smartphones Communication Miscellaneous Smartphone Mobile Device Network Browser Small Business Collaboration Productivity Quick Tips Cybersecurity Users Business Management Managed IT Services Upgrade Windows Phishing Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Office Server Save Money Cloud Computing Windows 10 Passwords Saving Money Holiday Tech Term Chrome Gadgets Virtualization Social Media Managed Service Managed IT Services Microsoft Office Automation Cybercrime Operating System Artificial Intelligence Computers Facebook BYOD Mobile Device Management Health Networking IT Support Internet of Things Hacking Wi-Fi Covid-19 Information Managed Service Provider Spam Alert Office 365 Telephone Systems Remote Information Technology Employer-Employee Relationship Recovery Bandwidth Router BDR Social Engineering Mobility Encryption Application Applications Human Resources Data Breach Law Enforcement Big Data Remote Monitoring App Password History Money Mobile Computing Blockchain Paperless Office Remote Computing Government Mobile Office Private Cloud How To Managed IT Office Tips Training Apps Data Storage Patch Management VPN Windows 7 Settings Word Google Drive Two-factor Authentication Servers Avoiding Downtime Mouse HaaS Infrastructure Data Security Voice over Internet Protocol Bring Your Own Device Flexibility Data Management Work/Life Balance Marketing Wireless WiFi IT solutions Entertainment Gmail Website Vulnerability Budget USB Education Physical Security Scam Safety Vendor Firewall Managed Services Sports HIPAA Telephone System Redundancy Staff Software as a Service Display Machine Learning Vendor Management Keyboard Virtual Reality Apple Remote Work Connectivity Social Employee/Employer Relationship RMM User Error Meetings Save Time Risk Management Hacker Data Protection Cleaning The Internet of Things Lithium-ion battery Conferencing End of Support Customer Service Access Control Internet Exlporer Worker Managed Services Provider Environment Audit IT Management Virtual Assistant Database IT Consultant Fax Server Authentication Botnet PDF IT Plan Remote Workers Humor SaaS Proactive IT Processor Unsupported Software Update Best Practice YouTube Charger Hard Drive Network Congestion Black Market eWaste Google Docs Identity Theft Compliance Computer Care OneNote Current Events Computing Document Management Telephony Wireless Technology Samsung Solid State Drive How to Augmented Reality Downtime Wearable Technology Fraud Retail Hard Drives Virus Value Instant Messaging Robot Excel Remote Worker Data storage Digital Signage Electronic Medical Records Automobile Spam Blocking Unified Threat Management Computer Accessories Cryptocurrency Biometrics Virtual Desktop Hiring/Firing Computing Infrastructure Going Green Procurement Workplace Strategy DDoS Comparison Net Neutrality Printer CES SharePoint Help Desk Bluetooth Battery Printing Shadow IT Legal Business Intelligence Business Technology Content Management Millennials Cryptomining Printers Point of Sale Personal Smart Office Supply Chain Management Wireless Charging Politics Advertising Monitoring Public Computer Batteries Antivirus Workforce Regulations Windows 8 Virtual Private Network Windows 8.1 Digitize Notifications Transportation Rootkit Cables Windows Server 2008 R2 IT service Computer Fan Customer relationships Telecommuting Manufacturing Tablet Project Management Email Best Practices Relocation Workers Nanotechnology IT Assessment Benefits Cortana Domains FENG Video Games Computer Tips IBM Digital Signature Managed IT Service Security Cameras IaaS Biometric Security Maintenance Worker Commute Flash Warranty Virtual CIO OneDrive Smart Technology HVAC Peripheral Google Apps Experience Consultant Bloatware Scalability Software Tips Analytics Digital Security Cameras Supercomputer Analysis Using Data 5G Business Owner Sync Tablets Administrator Emails Devices Copiers Enterprise Content Management Quick Tip NarrowBand Best Available Entrepreneur WIndows 7 Search MSP Ergonomics Accountants Smartwatch Credit Cards OLED Shortcut Microchip iPhone Netflix Thought Leadership Development Two Factor Authentication Password Management PCI DSS Password Manager Virtual Machine Cost Management Root Cause Analysis Social Networking HBO 2FA Knowledge Fiber Optics Music Multi-Factor Security Employee Cabling Skype Search Engine Files Twitter Messaging Data loss NIST Policy Chromecast Business Mangement Hypervisor User Outlook PowerPoint Dark mode Leadership Windows Media Player Smart Tech Trend Micro Troubleshooting Running Cable Trending Uninterrupted Power Supply Amazon Default App Start Menu Memory Colocation Addiction SMS Screen Mirroring Procedure Loyalty Recycling Saving Time Managing Stress Frequently Asked Questions Wiring dark theme Monitor Practices Shopping Books Google Search Amazon Web Services IT Infrastructure Mobile Windows 10s Cache AI Cast Cameras Safe Mode FinTech Criminal Bing Tip of the week Science GDPR Reputation webinar Hosted Computing Social Network Streaming Media Emergency Wireless Internet Tech Support Employer Employee Relationship Online Shopping Investment Content Professional Services Public Cloud Techology File Sharing Employees Laptop Assessment Employee/Employer Relationships Specifications ISP Customer Relationship Management Windows Server 2008 Camera Windows 365 Customers Inventory Distributed Denial of Service Wire Video Conferencing Evernote ROI Audiobook Tools Analyitcs Printer Server Sales Touchpad Television Bitcoin Travel Shortcuts Programming

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code