CREATING A BETTER BACKUP PLAN

Similar documents
Symantec Backup Exec 11d for Windows Small Business Server

BACKUP STRATEGY AND DISASTER RECOVERY POLICY STATEMENT

16 Common Backup Problems & Mistakes

Maximizing Business Continuity and Minimizing Recovery Time Objectives in Windows Server Environments

Disaster Recovery. Maximizing Business Continuity and Minimizing Recovery Time Objectives in Windows Server Environments.

Perforce Backup Strategy & Disaster Recovery at National Instruments

Availability and Disaster Recovery: Basic Principles

NSI Solutions with Microsoft VSS

Backup & Disaster Recovery for Business

4 Critical Risks Facing Microsoft Office 365 Implementation

The Essential Guide for Protecting Your Legal Practice From IT Downtime

How To Backup Your Hard Drive With Pros 4 Technology Online Backup

netfusion Data Guardian Online Backup

Management in Today s Regulatory Environment

STORAGECRAFT SHADOWPROTECT 5 SERVER/SMALL BUSINESS SERVER

About Backing Up a Cisco Unity System

Version: Page 1 of 5

StorageCraft Technology Corporation Leading the Way to Safer Computing 2009 StorageCraft Technology Corporation. All Rights Reserved.

Backup and Recovery in Laserfiche 8. White Paper

Backup and Recovery Plan For Small Businesses

Click to begin. Maitre'D Full System Backup & Restore

Top Cloud Solutions For SMBs

Cloud Backup and Recovery

Clickfree The Effortless Backup Solution

Introduction to Microsoft Small Business Server

Online Backup Solution Features

Yiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1

SOLUTIONS INC. BACK-IT UP. Online Backup Solution

How to Plan for Disaster Recovery

Introduction. Ease-of-Use

Online Backup Plus Frequently Asked Questions

SVA Backup Plus Features

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software.

Microsoft System Center: MS Data Protection 2007 Center Protection Manager Implementing 2012

Computer Backup Strategies

BUSINESSES NEED TO MAXIMIZE PRODUCTIVITY, LOWER COSTS AND DECREASE RISKS EVERY DAY.

IDERA WHITEPAPER. The paper will cover the following ten areas: Monitoring Management. WRITTEN BY Greg Robidoux

BackupAssist v6 quickstart guide

Competitive Analysis Retrospect And Our Competition

Acronis True Image 2015 REVIEWERS GUIDE

BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS. Disasters happen. Don t wait until it s too late.

Shared Machine Room / Service Opportunities. Bruce Campbell November, 2011

inforouter Version 8.0 Administrator s Backup, Restore & Disaster Recovery Guide

Data Protection Simple. Compliant. Secure. CONTACT US Call: Visit:

Whitepaper: Cloud Computing for Credit Unions

eztechdirect Backup Service Features

Offsite Backup with Fast Recovery

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

CHAPTER 9 System Backup and Restoration, Disk Cloning

efolder White Paper: Dedicated File Backup vs. File Sync Backup: 5 Questions MSPs Should Ask to Determine the Best Backup Solution for Their Clients

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA

Symantec Backup Exec 2014 Icon List

Fixed Destinations. BackupAssist Quick-Start Guide for. BackupAssist installation, configuration and setup.

SOLUTION GUIDE AND BEST PRACTICES

Contents. Instructions for Using Online HIPAA Security Plan Generation Tool

SOP Common service PC File Server

Recovering Microsoft Exchange Server Data

What You Should Know About Cloud- Based Data Backup

Data Integrity: Backups and RAID

How To Restore A Server From Backup To Backup

HP Data Protector Express Single Server Edition technical white paper

Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems

Disaster Prevention and Recovery Plan

It s All About Restoring Your Data Achieving Rapid Business Resumption with Highly Efficient Disk-to-Disk Backup & Restore

TECHNOLOGY OVERVIEW INTRONIS CLOUD BACKUP & RECOVERY

Zmanda Cloud Backup Frequently Asked Questions

InsightCloud. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

Create your own brick-level backup script for Exchange Server 5.5

SECURE BACKUP SYSTEM DESKTOP AND MOBILE-PHONE SECURE BACKUP SYSTEM HOSTED ON A STORAGE CLOUD

All can damage or destroy your company s computers along with the data and applications you rely on to run your business.

Recommended Backup Strategy for FileMaker Server 10 and 11 for Macintosh & Windows Updated September 2010

Gladinet Cloud Backup V3.0 User Guide

The next generation, proven, affordable way to protect business using disk-based recovery

VIPERVAULT STORAGECRAFT SHADOWPROTECT SETUP GUIDE

How To Choose An Online Backup Solution

Tape or Disk Backup Which is Best?

MFR IT Technical Guides

AVLOR SERVER CLOUD RECOVERY

Manufacturers Need More Than Just Backup... But they don t need to spend more! axcient.com

The Microsoft Large Mailbox Vision

Adobe Reader 7.0 Frequently Asked Questions for Digital Edition Users

Redundancy Options. Presented By: Chris Williams

Xopero Centrally managed backup solution. User Manual

M4 Systems. M4 Online Backup. M4 Systems Ltd Tel: International: +44 (0)

Contents. Introduction. What is the Cloud? How does it work? Types of Cloud Service. Cloud Service Providers. Summary

10 Things Your Data Center Backup Solution Should Do. Reliable, fast and easy backup is only the beginning

Real World Considerations for Implementing Desktop Virtualization

always on meet the it department PROPHET managed services ebook Business Group Meet the Always On IT Department

ESG Report. Data Protection Strategies for SMBs. By Heidi Biggar Storage Analyst, Data Protection Enterprise Strategy Group.

Portable Media. BackupAssist Quick-Start Guide for. BackupAssist installation, configuration and setup. Contents.

BUSINESS COMPUTER SECURITY. aaa BUSINESS SECURITY SECURITY FOR LIFE

Backup Exec 12.5 Icons Glossary

Financial Services Need More than Just Backup... But they don t need to spend more! axcient.com

True Cost of Tape Backup

Why Endpoint Encryption Can Fail to Deliver

Tiburon Master Support Agreement Exhibit 6 Back Up Schedule & Procedures. General Notes on Backups

MFR IT Technical Guides

Data Backup Options for SME s

Data Storage And Backup

WHITE PAPER. How Deduplication Benefits Companies of All Sizes An Acronis White Paper

Transcription:

eguide CREATING A BETTER BACKUP PLAN Copyright 2015 Gallery Systems. All rights reserved.

CONTENTS Backing Up is Hard To Do...3 The Front Line of the Backup Plan...4 Holes in the Backup Plan...5 Solving the Problem of Servers Created by Non-IT Personnel...8 Solving the Problem of Data Waiting to be Backed Up...9 Solving the Problem of Online Data Under Attack...10 ABOUT THE AUTHOR: DAVID CUMMINGS Systems Engineer, David Cummings, is Gallery Systems network and database administrator and supervises the network security for our clients data. With telecom and computer networking experience spanning three decades, David is a Microsoft Certified DBA, a Microsoft Certified Systems Engineer, and a Cisco Certified Network Administrator. Solving the Problem of Accessibility to Backed Up Data...12 Solid Backup Plans Save Time & Productivity...13

BACKING UP IS HARD TO DO We all know the importance of backing up data. Backups ensure business continuity, support worker productivity, satisfy legal archive requirements, and provide for disaster recovery. But, there are many things to consider in developing and maintaining an enterpriselevel backup plan. Accounting for all data needing backup can be a challenge. The purpose of this guide is to suggest ways to ensure your Backup Plan accounts for all necessary data and is as secure as possible.

THE FRONT LINE OF THE BACKUP PLAN In an old Sex and the City episode, a Mac repair tech asks a distraught Carrie Bradshaw, When is the last time you backed up your work, and she says, I don t do that. Later, friend Miranda asks about backups, and Carrie says, You know, no one talks about backing up. You ve never used that expression with me before, but apparently everybody s secretly running home at night and backing up their work. Times have changed since 2001 when that episode aired, and no one today would be surprised by the question of backups. Of course there are backups. That s what IT does, isn t it? Backs up our work? In the case of poor Carrie Bradshaw, her entire laptop (and her life s work as a columnist) fell victim. If her friends had thought to ask the question, Do you backup? before her laptop crashed, they would have been performing the task of Front Line Backup Activity: identifying the holes in the backup plan by talking directly with the data contributors themselves. The Front Line of the Backup Plan is the users themselves; and users include IT personnel. In your Backup Plan, everyone should be queried regularly about any possible data that should be backed up but isn t being backed up. The answer, however, is yes and no, because in any organization, office or development environment of any kind, there are going to be holes in the backup plan: data that should be getting backed up simply isn t.

HOLES IN THE BACKUP PLAN For any enterprise organization, the Backup Plan normally includes backing up things like shared network drives, published UNC folder shares, shared SQL database servers and their databases, shared Oracle database servers and their instances, mail servers and all email and associated data, Domain Controllers and the Active Directory database, media servers and all their stored media, as well as other data objects that might be unique to a particular institution. But what are some possible holes in the backup plan? Holes in the backup plan can be grouped by whether they are user-related problems (problems on the Front Line) or more IT-related (problems on the Back End). IT-related holes are problems with servers, software and the organization of backups. Here s a quick summary of problem sources: USER-RELATED (FRONT LINE) a. Work in progress: the data being keyed in at any given moment b. Local hard drives on user workstations and laptops c. Servers created by non-it personnel IT-RELATED (BACK END) a. Data waiting to be backed up b. Online data under attack c. Backup data accessibility problems

SOLVING THE PROBLEM OF LOCAL WORK Items 1a and 1b can be considered together. The problem is basically one of protecting the user from losing the work she is performing at any given moment. Here are some solutions: 1. Encourage users to work directly on networked drives, or in network-shared UNC folders at all times. That way, whenever they hit the save button, they are saving directly to the most robust drives in the organization. Though not always possible due to issues of connectivity or impeded productivity, this should be considered. 2. Encourage users to make use of simple synchronization programs, such as Beyond Compare, that are cheap to buy and easy to use. Then, if they are saving to their local drives, they can periodically synchronize their drive with the associated network path. Users will often balk at doing this, but in the long run may find that the pain of the extra save is outweighed by the gain of never losing their work. 3. Use Microsoft Office products, or other software that have background saves. Google docs is also an option, though there might be security considerations. Encouraging users, whenever possible, to use software that has automatic save capability, prevents or limits lost data when their computer suddenly crashes. 4. Remind users to save regularly. If they are creating content using software that doesn t have auto-save functionality, they should be hitting the save button regularly. We ve come a long way from 2001, but it s still all too common for IT personnel to hear the lament, I was typing all afternoon and my computer crashed and I lost everything.

5. Consider the use of auto-save plugins, of which there are many, to backup work on software that doesn t have auto-save capability. 6. Fortify the Front Line by making sure you know what user data should be backed up, such as local document folders, and that users know to report any new sources of data that should be included in backups. 7. Encourage laptop users to use network shares and/ or folder synchronization as much as possible, especially if they are on a laptop that doesn t have a RAID set (which is most laptops). 8. Consider using SSD drives. Laptops represent a special problem because they typically do not have or support two drives, and those that do, don t generally support hardware RAID. SSD drives are perhaps more reliable than HDD drives. 9. Have users work in RAID sets on their local computers, since some computer crashes involve the local disk drive. 10. Consider the use of auto-synchronization programs that run in the background, across the network, synchronizing user document folders with network shared folders. RAID sets can fail, data corruption can be transmitted across all members of the RAID set, and it is possible to have a situation where the data on a workstation drive or drive-set is completely inaccessible. This type of failure can be mitigated by having ongoing auto-synchronization of data between important folders on user workstations and related folders on network shares. 11. Consider using Windows Shadow Copy where applicable, though the pros and cons of this service must be discussed in your organization. Each user s work represents time. That s time purchased by the organization, and time dedicated to the project. As much as possible, the goal of any backup plan is to avoid having to go back and re-create the work, and re-spend the time.

SOLVING THE PROBLEM OF SERVERS CREATED BY NON-IT PERSONNEL In many organizations, especially software development organizations, non-it users have the ability to create their own virtual machines, and build their own database servers. If this is the case, special care must be given to ensure IT is up to date. You want to avoid any situation like this: A distraught user comes to you and says, I just lost a database in which I spent two months writing stored procedures and I need the backups for that database server. And all you can do is repeat the words of Carrie Bradshaw: I don t do that.

SOLVING THE PROBLEM OF DATA WAITING TO BE BACKED UP How safe is the data on those mapped networked drives or networked shared folders, the ones that are so ubiquitous in a modern organization, and are so counted on by users to be a safe place to save files? In an organization with only a single-time-zone and dayshift, the backup tape drives turn on after the lights go out. Then, at some point in the evening or early morning, all the new data on the network is fully backed up to tape. But, it s important to consider that normal system backups are point-in-time backups, and data also needs to be protected during the day, while users are adding content and updating databases. Plus, there is the added challenge for organizations with 24-hour operations. Here are steps to ensure the integrity of data on the network shares between backup times: 1. Utilize RAIDed hard drives. It s likely that all enterprise-aware organizations use RAIDed drives for their network storage. Discussions of which RAID set is best in which circumstance should be ongoing in your organization. Ask questions like: are you using the right RAID level for each given set of data? And, should you reconsider your overall disk drive RAID strategy? A discussion of pros and cons of the different RAID levels available is also important. 2. Synchronize networked data to a secondary set of network folders, because regardless of the RAID level, entire RAID sets can fail. The data on the network shares themselves should be synchronized to a set of mirrored folders on different servers so that if a live shared folder goes offline, the synchronized copy can quickly be brought online with as little lost data as possible. There are many software solutions for folder synchronization.

SOLVING THE PROBLEM OF ONLINE DATA UNDER ATTACK Every organization has a security strategy that includes malware protections at the firewall level, at the server level, and at the workstation level. However, malware still gets through. One of the most insidious forms of malware in existence, and one that can only be truly protected against with good backups, is ransomware. Ransomware encrypts your files with an unbreakable encryption, and then delivers instructions for data recovery that involves paying a fee to the ransomware hacker (who then may or may not give you a decryption key). has access to, including all the networked shared drives. In a very short time, your entire network drive system is encrypted and essentially destroyed. The synchronization software will propagate those encrypted files to the secondary backups since the encrypted files will appear as updated files, filling those secondary shares with the same useless files that your primary network drives now contain. The only recovery technique for ransomware encryption is to restore from uninfected backups. Ransomware is often distributed to users via a link or download in an email, so it often gets past malware protection software undetected. Once ransomware starts running on a user s workstation, it encrypts all the files on all the drives that workstation

Though no protection against ransomware is 100% effective, here are steps that should be considered: 1. Have as much malware protection in place as possible, at both the firewall level and the server OS level. 2. Put a percentage limit in the synchronization software, so that it will refuse to run if it detects changes over a certain low threshold, say 10%. 3. Have the synchronization software address the secondary shares by their UNC paths. Do not have networked drives mapped to the secondary shares. Most ransomware is only aware of drive letters (local or mapped) and doesn t have access to UNC path shares. 4. Perform backups-to-tape as frequently as possible. Tape backups can t be replaced with ransomware-encrypted data. Once data is backed up to tape, it is truly safe (as long as the tape media itself remains viable). If possible, perform incremental tape backups throughout the day. 5. If possible, shift from network mapped drives altogether, and have users save data to UNC paths instead. This might be impractical for large organizations, but should be considered and discussed.

SOLVING THE PROBLEM OF ACCESSIBILITY TO BACKED UP DATA If you need to restore data from an offline backup that exists on a tape or on a backup-to-disk hard drive, how accessible are those backups? If you have a large network, a multitude of users, and a huge amount of new data being backed up each week or month, the number of tapes or hard drives in the backup inventory can become large and unwieldy. Also, finding where a particular piece of data is can become complicated. Most enterprise backup software uses catalogs of one kind or another and these catalogs can require refreshing or rebuilding, which means searching through tapes to find the files you want to restore. In the case of a full system recovery following a ransomware attack, or major hardware failure, it s probably not difficult to find the most recent full+differential system backups, though the time to restore can be significant. But, if someone is asking for a file that was backed up last month, or last year, the search process can be daunting. Here are strategies to handle problems involving data accessibility: 1. Invest in a tape library device instead of individual tape units, if such an investment is within your organization s budget. 2. Research which backup software to use, with particular attention paid to the method of cataloging and the accessibility of catalogs, particularly old catalogs, even if the particular backup media itself is not online. 3. Consider replacing (or augmenting) tape backups with backups-to-disk, though the pros and cons of that choice should be thoroughly discussed in your organization. 4. Consider replacing or augmenting tape backups with backups-to-cloud-storage, though again, there is a lot to consider on this subject.

SOLID BACKUP PLANS SAVE TIME AND INCREASE PRODUCTIVITY Bottom line: backups save time and improve productivity, which translates into saved money. They save the user from having to re-write a document or re-enter data. They save the development company from having to re-develop software. They save the IT department from having to re-build an entire network from scratch. There are practically no Carrie Bradshaws anymore, as most people understand the importance of good backups. It s filling in all the holes that can be tricky, and worth ongoing discussions within organizations. Analyzing whether you have as complete a backup strategy as possible can potentially save your organization lost data, lost time and lost productivity.

HOSTING SERVICES FROM GALLERY SYSTEMS Gallery Systems offers scalable hosting services that can manage as much or as little of the IT for your collections management application as you need. With Gallery Systems as your hosting partner, your institution s staff will have secure, web-browsing-enabled access to your data from anywhere. We can handle the nightly backups, schedule service upgrades, monitor database health, and perform all other system administration duties. The data always belongs to you and is accessible only to you and your staff as we rigorously follow your rules for data connectivity and security. ABOUT GALLERY SYSTEMS Over 800 clients worldwide trust Gallery Systems with the cataloging and management of their collections. For over 30 years, Gallery Systems collection management and web publishing software has been the leading choice of the finest cultural institutions, from private collectors and museums, to corporate and government archives and agencies. Find out how we can help with your collections management and application hosting needs. Visit us today at /IT.