Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
Purpose
Backups are the last line of defence again irreparable data loss (caused by theft, compromise, hardware or software updates, human error, natural disasters, etc.) and unauthorized data alterations.
👥Audience
Status | ||
---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
On this page
Expand | |||||
---|---|---|---|---|---|
| |||||
|
|
|
Initial considerations
Determine your data's classification.
Classifying your data is the first step to knowing what safeguards are required to securely backup your data.
Do suitable storage solutions exist at the University that provide backups?
Administrative data
Research data
Departmental or divisional solutions
Contact your Local IT group about possible existing backup solutions.
uoft-infosec-cf.atlassian.netAdditionalhelp#%F0%9F%96%A5%EF%B8%8FInformation-
Develop a resilient backup strategy.
While any backup is better than none, not all backups are made the same; it is important to plan out a resilient backup strategy to reduce the risk of data loss.
https://uoft-infosec-cf.atlassian.net/wiki/spaces/ISH/pages/3997924/Resilient +backups+strategy#%E2%9C%85-Best-practices
What can I do?
Info |
---|
This section assumes that an institutional or cloud-based backup solution is not feasible or workable. |
Back up to an encrypted hard drive or encrypted mobile storage device.
https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/3571764/Encrypt+data+and+devices#%F0%9F%92%BD-Usedevices#Use-a-self-encrypting-device-(SED)-to-supplement-full-disk-or-file-level-encryption.
While self-encrypting or encrypted devices can provide an easy and cost-effective means of backing up data, their mobility can introduce increased theft risks.
Ensure physical backups are locked away securely. Physically secure data and devices
Page Properties | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||
|
🔍 Search
Live Search | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
✉️Additional help
General
https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/AdditionalContact+help#%F0%9F%9B%A1%EF%B8%8F-Informationus#Information-Security-(IS)
https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/AdditionalContact+help#%F0%9F%96%A5%EF%B8%8F-Informationus#Information-Technology-(IT)
Researchers
https://security.utoronto.ca/services/research-information-security-program/
\uD83D\uDCCB Related articles
Filter by label (Content by label) | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|