Purpose
Data can be lost through simple error, a system failure, or a malicious interference or attack. A good backup strategy will minimize such loss and allow you to recover faster to carry on your research.
✅ Best practices
🗑️
Audience
Status |
---|
colour | Blue |
---|
title | researchers |
---|
|
Status |
---|
colour | Red |
---|
title | Admin staff |
---|
|
Status |
---|
colour | Purple |
---|
title | IT staff |
---|
|
On this page
Expand |
---|
title | Expand to view table of contents. |
---|
|
Table of Contents |
---|
minLevel | 1 |
---|
maxLevel | 4 |
---|
outline | false |
---|
style | default |
---|
exclude | Purpose|Audience|On this page|Search|Additional help|Related articles |
---|
type | list |
---|
printable | false |
---|
|
|
What can I do?
Determine what data to backup according to whether the data are volatile or disposable.
Some data does not need to be backed up because they are temporary in nature
Decide how often to take a backup based on how much data you are willing to lose.
Establish a schedule and workflow for major backups (after major edits or alterations).
⌚ Keep several points in time or versions of your backups
.A strategy of , known as the 3-2-1
is considered best practice. Expand |
titlestrategy.
3 copies
Expand |
---|
title | 2 storage mediums
Expand |
---|
title | 1 off-site
).🔐 Protect your backups from unauthorized access by others.
Encrypt your backups, otherwise a download will provide all of your data and/or intellectual property.
Limit physical and electronic access to your backups to prevent unauthorized people from viewing, altering, deleting your backups.
Create and maintain an inventory of your backups.
Securely destroy old copies of backups.
When a backup copy is deprecated and no longer needed, be sure to securely delete the data to reduce the risk of a data breach.
Ensure you are retaining backup copies long enough to allow for rollbacks to last clean version of data (in case of delayed ransomware).