Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 18 Next »

๐ŸŽ“ Purpose

Data can be lost through simple error, a system failure, or a malicious interference or attack. A good backup strategy will minimize such loss and allow you to recover faster to carry on your research.ย 

๐Ÿ‘ฅ Audience

FACULTY RESEARCHERS ADMIN STAFF IT STAFF STUDENTS


โœ… Best practices

๐Ÿ“ƒ Determine what data to backup according to whether the data are volatile or disposable.ย 

  • Some data does not need to be backed up because they are temporary in natureย 

  • Decide how often to take a backup based on how much data you are willing to lose.

  • Establish a schedule and workflow for major backups (after major edits or alterations).

โŒš Keep several points in time or versions of your backups, known as the 3-2-1 strategy.

3 copies

  • You should have at least 3 copies of your data.

2 storage mediums

  • You should have backups stored on at least 2 different storage mediums (e.g., 1 in the cloud and 1 stored locally).

    • 1 of these backups should be unalterable from the Internet; either on an external drive disconnected from your system or via a backup solution that does not allow rewrites.

1 off-site

  • You have one 1 backup that is off-site, meaning not in close proximity to your primary backup (either virtual or physical).

๐Ÿ” Protect your backups from unauthorized access by others.

  • Encrypt your backups, otherwise a download will provide all of your data and/or intellectual property.

  • Limit physical and electronic access to your backups to prevent unauthorized people from viewing, altering, deleting your backups.

๐Ÿ“‹ Create and maintain an inventory of your backups.

  • As you should have multiple backups, it is important to maintain an inventory of where your data is stored and what version of your data is stored there.

๐Ÿ—‘๏ธ Securely destroy old copies of backups.

  • When a backup copy is deprecated and no longer needed, be sure to securely delete the data to reduce the risk of a data breach.

  • Ensure you are retaining backup copies long enough to allow for rollbacks to last clean version of data (in case of delayed ransomware).ย 


  • No labels