Everybody has one. Whether it is a desktop or a notebook, most people have a computer, which serves as the centre of their digital world. But, while these devices often contain so much data that it is claimed with conviction that 'my whole life is on that machine', how many people have a viable backup regime to make sure that when the machine breaks down - for they all eventually fail - the data will persist in perpetuity.
Desktop backup as a whole is arguably the most neglected discipline within the IT field.
Petrus Human is technical director at Attix5.
The answer is disturbing, to say the least. Even industry people, who do know better, do not take the necessary precautions. Imagine how much worse it must be in every other profession, where computers are not particularly well understood. The reality is that desktop backup as a whole is arguably the most neglected discipline within the IT field.
This is despite the fact that the data of most companies (whether SME or larger enterprises) resides on desktops and laptops. Some studies say that up to 80% of company data leaves the premises daily.
Continuity conundrum
So, how do companies solve what is really a considerable problem and source of risk? First, look at how desktop backup is achieved.
There are many ways to protect data residing on desktops and laptops. Some are more effective than others. Most rely on that most fallible of agents - the person who owns the machine.
The methods typically found in the field are as follows:
1. No backup. Simple, and completely ineffective. A crash means starting over. While one may think it is only individuals who take this rather reckless approach to backup, the fact is that even in companies there are many, many unprotected machines. And it's not just the receptionist's PC either...
2. A shared folder on the network. This is a completely manual operation that relies on the user to copy important data over to a shared drive or server. There is no control as non-work-related data can be copied. More often than not, nothing is copied across, or videos and other content are stored.
3. Synchronisation to another machine. This is somewhat more reliable - but again, only one folder is protected on the user's machine and non-work data such as photos and jokes find their way into the synched folder.
4. Backup to tape CD/DVD/memory key. While this can create a reliable backup of data on the PC or notebook, it tends to be ad hoc, relying on the discipline and diligence of the user. Once the backup is made, it also tends to lie forgotten in a desk drawer or file cabinet. In the event of a failure, can it be found?
5. Automated desktop/laptop backup applications. Since such applications, which leverage the Internet and a remote data centre to securely store data, they are the only solution that removes the human factor. For that convenience and peace of mind, there is a price to pay - although it is affordable to most. Options for such solutions depend on the size of organisation, the number of users and devices and the physical layout of the offices.
The case for an 'online' automated backup service, which makes use of the principles of software as a service (SaaS) and cloud computing, is quite clear. The SaaS part means the user pays a monthly fee to use the solution. The cloud computing bit means information is securely transmitted over the Internet and into the 'cloud' - that is, it gets stored 'somewhere' in a data centre. Users don't, in truth, need to know where. And since it is protected with 448-bit Blowfish encryption, no one except for the user can ever make any sense of that data.
The good news is that the computer-using public has a choice of service and even technology providers. There are many available, both internationally and locally.
It is important to do some shopping around to find a solution that will deliver what it promises. Probably most important, though, since users are going to the trouble of making sure their data is indelible, is to ensure the selected provider offers a dual site redundant solution. That means that critical data is backed up to a secure storage server across the Internet... and the provider offers replication of the backed up data to another geographic location. So, even if the service provider has a cataclysmic failure, a copy of the information exists.
Share