ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Maintain and Backup Your IT

Tip of the Week: Maintain and Backup Your IT

Imagine for a minute that you work in a small factory or machine shop. Some wind comes through and drops a 200-year-old maple tree through the roof onto the machines that you use to create your product. The devastation is total. If you have a second factory built to scale from the first, you could just ship your workers over to that one and keep productivity high. Chances are, however, there is no second factory. Your business is done until you can get the situation fixed. It could take days, weeks, or even months to get your business back on track; and if the stats are any indication, it probably won’t. 

The same goes for the business that depends mostly on data to make things happen. Today we will take you through the scenarios between two very different offices:

Scenario 1: The Call Center

Sonny runs a call center. He has a few contracts to provide customer support for a food distributor, a class action lawsuit, and a chain of hardware stores. Each call that is made is logged by the call center software on a centralized server. When the company started, they had put in a backup system, but over the years (and through growth) it has become antiquated and unreliable. The hardware is getting older and isn’t meticulously maintained. 

One day, one of the unpatched applications used in the call center is hacked and flooded with malware. As it is fixed, it is found out that a whole database is corrupted and inoperable. Hundreds of clients from one business have had their data deleted and hundreds more are exposed from the data breach. The company could have stopped the bleeding somewhat if it had a reliable backup system that would have allowed for the data to be utilized while a plan for new hardware took shape. Instead the company is sure to go belly up now because IT wasn’t sufficiently maintained and backed up, and no company with a reputation for losing customer data does very well, especially as data privacy awareness improves.

Scenario 2: The Bakery

Michael runs a bakery and a distributor. They bake your favorites and more. As an industrial bakery, their whole endeavor is based on inventory control, efficiency, and timing. As a result, they have invested in a business intelligence strategy that will let them know what products the customers like, where they like them most, and how to get them to those customers. Since there was no place to put servers in their location, they have decided to run their IT in the cloud. 

Since they host their operations, communications, and their BI system in the cloud, their data is backed up as a part of a service agreement. The data will reliably be there until they choose that it shouldn’t be. By keeping their data available and redundant, the cloud provider makes depending on technology easier. 

There was no mention of BDR until now. That’s because the only thing that matters is that you have your data backed up using the 3-2-1 rule. That dictates that:

  • You have a total of (at least) three copies of your data.
  • Two of these copies are maintained as backups.
  • (At least) one of these copies is stored in an offsite data center.

Protect your business by protecting your data. Leave your thoughts in the comments below, and if you are looking for more great anecdotes, return to our blog regularly.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Ransomware Data Backup communications Smartphone Microsoft Office Upgrade Smartphones Small Business Network Mobile Devices Data Recovery Communication Managed IT Services Productivity Quick Tips Social Media VoIP Users Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Covid-19 Disaster Recovery Passwords Holiday Windows 10 Managed Service IT Support Browser Apps Cloud Computing Outsourced IT Miscellaneous Data Management Remote Work Internet of Things Managed Service Provider Saving Money Government Operating System Workplace Strategy Artificial Intelligence Managed IT services Gadgets Networking Windows App Virtualization Remote Spam Mobile Device Management Business Technology WiFi Blockchain Bandwidth Server Encryption Information Budget Office History Two-factor Authentication Office 365 Employee/Employer Relationship Apple Information Technology Gmail Wi-Fi BDR Health Analytics Cybercrime Access Control Data Security Conferencing Big Data Help Desk Remote Monitoring Hacking Employer-Employee Relationship Vendor IT Management Hacker Remote Computing Training Cost Management Voice over Internet Protocol Compliance Document Management Patch Management Save Money Project Management Best Practice Applications Retail BYOD Alert Vulnerabilities Computing Hiring/Firing Vendor Management Hard Drive Outlook Money Password Customer Service Unified Threat Management Firewall Mobile Office Data loss Legal Augmented Reality Managed Services Word Data storage IBM Website Search... Black Market The Internet of Things Storage YouTube Cleaning Robot Websites Laptop Mobility Meetings Monitoring User Healthcare Google Maps Scam Windows 11 Twitter Sports Social SaaS DDoS Chrome VPN Remote Workers Law Enforcement End of Support Printer Update Windows 7 iPhone Free Resource Education Cortana Mobile Computing Content Filtering How To Marketing Paperless Office Travel Antivirus Running Cable Virtual Reality Router Social Engineering Maintenance Data Breach Cryptocurrency Processor Employees Start Menu Politics Downloads Avoiding Downtime Computer Care Machine Learning Settings Vulnerability Holidays Wireless Technology eWaste Multi-factor Authentication Solid State Drive Software as a Service HIPAA Data Protection Cooperation Downtime Video Conferencing Safety Chromebook Drones Virtual Machines Saving Time Computer Repair Virtual Desktop Automobile Bitcoin Professional Services Computers Experience Telephone How To Microchip Tech Terms Flexibility Managed Services Provider Managed IT Excel PowerPoint Digital Disaster Administration Virtual Private Network Hack Identity Theft Notifications Presentation Taxes Specifications Lithium-ion battery Unified Communications Current Events IT Consultant Virtual Assistant Google Docs Solutions Bluetooth Customer Relationship Management Distributed Denial of Service Processors Images 101 Office Tips Co-Managed IT Integration Physical Security Private Cloud Entertainment Memory Display Trend Micro Health IT Equifax Botnet AI Hard Drive Disposal Rental Service Digital Security Cameras Printing Micrsooft Electronic Health Records Transportation CCTV Tactics Username Flash Touchscreen Wasting Time Be Proactive Emergency Business Growth eCommerce Modem Computer Malfunction Startup Freedom of Information Telephone Systems email scam Videos Public Speaking Surveillance Vendor Mangement Navigation Addiction Managing Costs Workplace Strategies Samsung Streaming Media Mobile Security Keyboard Google Wallet Uninterrupted Power Supply User Tip SSID Webcam Legislation News Banking Messenger Media Hard Drives Troubleshooting Deep Learning Development Business Mangement Evernote Employer/Employee Relationships Network Management Virtual Machine Tablets intranet Business Metrics Reviews Shortcut Hosted Solution Optimization Proxy Server Emails Wireless Fake News Service Level Agreement Computing Infrastructure Books 2FA Heating/Cooling Google Calendar Environment Teamwork Supercomputer Society Hypervisor Smart Technology Management Windows XP Device security Language Data Storage Social Networking Virus Microsoft Excel Shopping Medical IT Motion Sickness Wireless Headphones Going Green Business Cards Reading Paperless Business Owner Comparison Monitors Google Drive Visible Light Communication Tech SQL Server Windows 8 Licensing Error PCI DSS Gig Economy Knowledge Humor Corporate Profile Bookmark Download Piracy Relocation Business Communications Television Displays Internet Service Provider Telephony Advertising Term Azure Employer Employee Relationship Tech Support Managed IT Service Supply Chain Cabling HTML Work/Life Balance Regulations Compliance Memes Tablet Browsers G Suite Nanotechnology Staffing Upload Software License Human Resources IP Address Inbound Marketing Mouse Net Neutrality VoIP Google Play Tracking Workplace Social Network In Internet of Things Financial Data Hacks Risk Management Network Congestion IT Data Analysis Web Server Screen Reader Trends Mobile Technology Reliable Computing Google Apps SharePoint Writing Security Cameras Digital Payment Scams Worker Customer Resource management Devices Electronic Payment Telework Tip of the week Smartwatch Competition Communitications Access Fileless Malware Microsoft 365 Recovery Public Cloud Gamification Company Culture Scalability Procurement Time Management Phone System Proactive IT Cables Telephone System LiFi Regulations Administrator Text Messaging FinTech Entrepreneur Bring Your Own Device CES Application Audit IT Assessment Spyware Directions Backup and Disaster Recovery Documents File Sharing Content Desktop Supply Chain Management Business Intelligence Value Redundancy Music Cyber security Point of Sale Electronic Medical Records Accountants Organization Securty Smart Devices Cache Database Workers Domains Remote Working Computer Accessories Unified Threat Management Shortcuts

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?