10/12/2023 0 Comments 3 2 1 backup methodologyUtilize your adherence to the 3-2-1 policy in marketing and sales strategies to prove your commitment to security. In addition to the competitive edge of a stringent SLA is gaining the confidence of clients and prospects. Ultimately, from a business perspective, MSPs delivering “no matter what” data availability can also meet competitive service level agreements (SLAs). The clear advantage for MSPs who decide to follow the 3-2-1 backup policy is data redundancy for recovery regardless of cyberattack, accidental loss, or natural disaster. Depending on what your vendor and their solution are capable of, you may also achieve the additional “1” – an immutable or air-gapped copy – without requiring another vendor and extra management costs. Of course, you have options, including internal hard disk drives and various removable storage media, but Axcient recommends using the cloud and a device managed by your BDR vendor. At the same time, it takes care of the “1” component of the 3-2-1 plan while also satisfying the “2” requirement. Similarly, storing backup copies at different locations – both on an appliance and in the cloud – safeguards your opportunities for data restoration. With three copies, there’s a better chance that despite the attack or location of the disaster, you will have at least one backup available for recovery. Due to that threat, at least two backups in addition to your production data is the new normal. Bad actors are not only targeting SMBs – which includes MSPs – but they’re focused on corrupting backups for maximum ransomware success and system destruction. COMPUTER EMERGENCY READINESS TEAM Why is it important for MSPs to Follow the 3-2-1 Backup Rule?īack in the day, one backup might have been good enough, but today’s cybersecurity landscape demands reinforced security. Saving just one backup file may not be enough to safeguard your information.” “All computer users, from home users to professional information security officers, should back up their critical data on their desktops, laptops, servers, and even mobile devices to protect it from loss or corruption. The 3-2-1 policy became so widely adopted that in 2012 the Cybersecurity & Infrastructure Security Agency (CISA) released a publication summarizing the pros, cons, and security considerations of the backup options commonly used to fulfill the policy. The rule says that to increase the chances of recovering lost or corrupt data, you should do the following:ģ – Maintain at least 3 copies of your data: 1 production version + 2 backupsĢ – Store the backup copies in 2 different locationsĪnd in recent years, an additional “1” was added to accommodate the growing number of successful ransomware attacks and industry-led data compliance requirements.ġ – Create 1 immutable or air-gapped backup copy While he’s not the first to realize the benefits of data redundancy onsite and in the cloud, Krogh did an excellent job distilling the security tactic into a simple formula. You’re probably familiar with the rule, but do you know where it came from? Peter Krogh, a photographer, writer, and consultant, introduced the 3-2-1 backup rule in his 2005 book, The DAM Book: Digital Asset Management for Photographers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |