ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

I Lost Data Once… A Collection of Horror Stories; Part 2

I Lost Data Once… A Collection of Horror Stories; Part 2

Here’s a horror story about an entrepreneur who, at a glance, was following many data backup best practices. Unfortunately, at the end of the day, things didn’t go so well when a crucial task was missed.

The Backup That Let Me Down

Story from a property manager

A little background about me; I was formerly a sales manager, and I did things the ‘old school’ way. I learned as much as I could about my prospects so when I’d follow up I’d have a lot to talk to them about. I’d know their birthdays, their anniversaries, their kids’ names, you name it. I also learned that having a detailed record of all of their interactions with my company helped me give them a very personalized touch. 

I was always inspired by my dad, who basically built and ran a series of rental properties with his own two hands while working a full-time job. I scrimped and saved until I could buy the duplex I was living in, and the rest is history.

Today, my properties are my main source of income and my family and staff rely on them. That means collecting rent, paying taxes and payroll, managing utilities, and keeping up with my maintenance team requires a fair amount of logistics.

My dad gave me two critical life lessons that I’ll never forget. The first one is measure twice, cut once, and the second is you can’t do it all, so rely on the expertise of others. I’ve always taken these lessons to heart, but I did have some tricks that my dad never did.

I wanted my apartments to be nice, so many of them include things like Wi-Fi, smart locks, and some even have gates. Some of the commercial properties have even more going on. Either way, managing everything requires a pretty elaborate setup at my main office, and keeping track of tenant names, documentation, and employees is dependent on my IT.

I followed my dad’s lesson and relied on a trusted IT company to set everything up, and when they recommended I get a backup system, I didn’t bat an eye. They set it all up and showed my office manager how to use it, how to restore files if ever needed, and they checked back in a month later to check their work.

That was three years before the event…

The event happened at the worst possible time. We were juggling with some maintenance issues, we had some tenants cycling out, and it was all happening during tax season. Oh yeah, and my office manager was on her honeymoon.

The software that handles all of our internal communication, scheduling, and payroll got corrupted. After a morning of sweating over it myself, I finally called my poor office manager, who was literally on the edge of cell phone service AND roaming on a beach in the Bahamas. She helped walk us through accessing the backup to restore. I had also called and left a message at the IT company that originally set up the backup.

The restore ran, and a couple hours later it said it was finished. We opened up the software but the data was still corrupted. We tried another restore to pull data from a previous backup, and a few hours later we got the same result.

We finally got tech support on the phone and it turns out that the software changed how it stored its data a year ago, so it wasn’t being backed up. Everything else was, but this critical piece of my business wasn’t being backed up at all.

This data was so crucial that we would have had to spend months and hundreds of hours of labor before we would reach normality again. Not to mention the embarrassment of having to go to our tenants with our tails between our legs to collect bank account and contact info. Worst of all, we were made clearly aware of the issue back when our software updated - we just didn’t think it would have affected our backup. We didn’t even think about the backup.

Fortunately, after several days of phone calls and hair pulling, followed by a big fat bill, the data was able to be accessed and we were back in business. Honestly, I would have paid that bill four times over to get my data back (but don’t tell the IT company or the software vendor that, sheesh!).

It could have been prevented, and now we actively test our backups once per month. It only takes us a few hours, and that time is absolutely worth it. We essentially simulate a situation where the only data on our network is the backup, and see if we can run off of that.

Since we’ve been doing these monthly tests, we’ve actually found two other major instances where data wasn’t being backed up, so it’s already saved us from a future disaster.

Test your backups, or else you may as well not have backed up at all!

The Lesson

Thank you so much for sharing that story! Things can definitely change on your network over time, and systems that you’ve set up should be audited to make sure they are performing their job. For example, adding a new device or application on a secure network could lead to that network no longer being secure. The same goes for backup. 

We perform tests of backups in a similar fashion, because if your backup doesn’t contain everything you need, it won’t do you much good when you need to restore from it.

Looking to prevent a future horror story from affecting your business? Give us a call at 866-326-7214 and ask about our data backup solutions.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup communications Smartphone Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Automation Tech Term Windows 10 Business Continuity Facebook Passwords Holiday Disaster Recovery Covid-19 IT Support Browser Apps Managed Service Windows 10 Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Internet of Things Remote Work Data Management Saving Money Operating System Government Workplace Strategy Gadgets Artificial Intelligence Managed IT services Networking Windows Spam Business Technology Mobile Device Management Blockchain WiFi Bandwidth Server Information Remote Encryption App Virtualization Office 365 Apple Information Technology Employee/Employer Relationship History Gmail Office Budget Two-factor Authentication Conferencing Cybercrime Access Control Data Security Health Big Data Wi-Fi BDR Analytics IT Management Training Hacker Cost Management Compliance Document Management Patch Management Vendor Employer-Employee Relationship Save Money Help Desk Remote Monitoring Hacking Voice over Internet Protocol Remote Computing Password Managed Services Computing Data loss Vendor Management Money Hard Drive Customer Service Unified Threat Management Firewall Legal Augmented Reality Word Search... Data storage Best Practice IBM Applications Website Retail Vulnerabilities Alert Project Management Hiring/Firing Mobile Office Outlook BYOD Free Resource Google Maps Chrome How To Scam Windows 11 Sports Social VPN Twitter SaaS DDoS Mobile Computing Update Law Enforcement Marketing End of Support Printer iPhone Education Running Cable Cortana Data Breach Content Filtering Storage Paperless Office Antivirus Router Maintenance Travel Virtual Reality Social Engineering Monitoring Cryptocurrency The Internet of Things Healthcare Black Market YouTube Cleaning User Remote Workers Websites Robot Laptop Windows 7 Mobility Meetings Software as a Service Virtual Private Network Data Protection Telephone Downtime Solid State Drive Safety Current Events Excel Solutions Chromebook Drones Virtual Desktop Experience PowerPoint Images 101 Administration Integration Automobile Display Presentation Tech Terms Specifications Virtual Assistant How To Managed IT Microchip IT Consultant Disaster Flexibility Digital Employees Avoiding Downtime Customer Relationship Management Holidays Co-Managed IT Taxes Identity Theft Processor Entertainment Hack Lithium-ion battery Notifications Unified Communications Cooperation Video Conferencing Google Docs Processors Virtual Machines Bluetooth Physical Security Computer Repair Distributed Denial of Service Office Tips Multi-factor Authentication Professional Services Private Cloud Memory Start Menu HIPAA Downloads Saving Time Computer Care Vulnerability Politics Wireless Technology Managed Services Provider Computers Bitcoin Machine Learning eWaste Settings Banking Term Google Apps Tablets Google Wallet Download Piracy intranet Shortcut Messenger Deep Learning Telework Wireless HTML Browsers Smartwatch Supercomputer Nanotechnology Communitications Heating/Cooling Microsoft 365 Google Calendar Environment Virus Smart Technology Business Metrics Google Play Hosted Solution Windows XP Upload Procurement Software License Social Networking Books Social Network FinTech Motion Sickness Data Analysis CES Society Screen Reader IT Assessment Inbound Marketing Comparison Google Drive Language Security Cameras Trends Supply Chain Management Mobile Technology Value Devices Cyber security Knowledge Reading Corporate Profile Monitors Customer Resource management Organization Visible Light Communication Fileless Malware Employer Employee Relationship Windows 8 Smart Devices Tip of the week Television Telephony Supply Chain Cabling Gamification Remote Working Electronic Payment Company Culture Staffing Regulations Trend Micro Relocation Tablet Displays Telephone System AI G Suite Advertising Work/Life Balance Directions Digital Security Cameras Tracking Tech Support Backup and Disaster Recovery Electronic Health Records IP Address Transportation Mouse VoIP Workplace Content Desktop Wasting Time Phone System Accountants eCommerce Modem Electronic Medical Records Web Server Videos Digital Payment Database Surveillance SharePoint In Internet of Things Scams Hacks Worker Network Congestion Managing Costs Recovery Equifax Competition SSID Reliable Computing Access Writing Health IT Media Public Cloud Tactics Development Hard Drive Disposal Employer/Employee Relationships Computer Accessories Time Management Entrepreneur Cables LiFi Username Virtual Machine Documents Startup Optimization Application Freedom of Information Audit Scalability Spyware Reviews Text Messaging Navigation 2FA File Sharing Proactive IT Addiction email scam Teamwork Administrator Business Intelligence Redundancy Point of Sale Bring Your Own Device Data Storage Mobile Security Hypervisor Securty Legislation News Medical IT Cache User Tip Shopping Evernote Paperless Workers Music Network Management Domains SQL Server Unified Threat Management Shortcuts PCI DSS Licensing Emails Humor Troubleshooting Fake News Printing Proxy Server Gig Economy CCTV Business Communications Service Level Agreement Internet Service Provider Computing Infrastructure Azure Botnet Touchscreen Be Proactive Emergency Rental Service Micrsooft Management Regulations Compliance Computer Malfunction Device security Managed IT Service Wireless Headphones Memes Public Speaking Microsoft Excel Vendor Mangement Flash Workplace Strategies Telephone Systems Tech Human Resources Samsung Business Growth Streaming Media Going Green Net Neutrality Business Cards Keyboard Uninterrupted Power Supply Error Financial Data Webcam IT Business Owner Hard Drives Business Mangement Bookmark Risk Management

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?