What Is Backup And Disaster Recovery?
Backup and disaster recovery (BDR) is the process of copying and storing data in a specific location, and then recovering or restoring those files when an emergency occurs, such as data loss or data corruption. Backup and disaster recovery are two separate but connected concepts that organizations should always consider together.
Backup
Is the process of copying data from one location to another. This can be done on a regular basis, such as daily, weekly, or monthly. The goal of backup is to create a copy of your data that can be used to restore it in the event of a disaster.
Disaster Recovery
Is the process of restoring data from a backup. This can be done if your original data is lost or corrupted. The goal of disaster recovery is to get your business back up and running as quickly as possible after a disaster.
Essential Elements of a Strong BDR Plan
-
The types of data that need to be backed up
-
The frequency of backups
-
The location of the backups
-
The methods used to restore data
-
The costs of backup and recovery
The Vector Choice Advantage
Local BDR
This type of BDR solution stores backups on a local device, such as a hard drive or tape. Local BDR is a good option for small businesses that do not have a lot of data to back up.
Remote BDR
This type of BDR solution stores backups on a remote server. Remote BDR is a good option for businesses that need to protect their data from local disasters.
Cloud BDR
This type of BDR solution stores backups in the cloud. Cloud BDR is a good option for businesses that need to protect their data from a variety of disasters, including local disasters and cyberattacks.
How Is Vector Choice Different from Other Providers?
Vector Choice approaches cybersecurity differently than other IT Companies. By approaching cybersecurity, not from an "if", but from a "when it does happen" standpoint. They always take the assumption that you will be hacked, because 95% of all breaches will be due to user error. Which means, it's just a matter of time. Do you want a company that is just blocking the perimeter, or do you want a company that takes a wholistic approach and protects the perimeter, the internal network, and trains staff to account for the human element?
FAQ
How do you secure our confidential data?
We have multiple methods to secure your confidential data.
First, we ensure all computers/servers have disk encryption turned on and is monitored.
Second, we deploy tools to help encrypt data in transit, like VPN services.
Finally, we have monitoring services that can look for unauthorized access or mass data moves/deletion from services like SharePoint.
Do you provide reports on our IT systems?
A key part of our service is reporting. This is highly important for our clients that require compliance services. We have regular meetings with your account manager to ensure service levels, discuss changes to plans and technology roadmaps, and review reports. Reports include phishing training, health of systems, ticket update, cybersecurity reports, executive summary reports, and more.
Do you provide training services for new software?
We have a range of training videos and documents. If your company requires training for specific software, we can provide training as needed. We also include ongoing security training for our clients.
When I have an IT problem, how do I get support?
When a client has a problem, we open a ticket in our IT management system so we can properly assign, track, prioritize, document, and resolve client issues. You can call, email, or submit a ticket via our portal.
Is your help desk in-house or outsourced?
We provide in-house, dedicated technicians to your account who will get to know you and your company, as well as your preferences and history. We successfully resolve your IT issues and handle things the way you want.
Do you have a SOC (Security Operations Center) and do you run it in-house or outsource?
Yes, we have an in-house SOC that monitors your company's network for any security issues.