Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

An Experienced Endorsement for Testing Backups

An Experienced Endorsement for Testing Backups

Just because you think that you’re following best practices, doesn’t necessarily mean that you actually are. Take it from this aspiring entrepreneur, who shared his own personal experience with us, so you could benefit:

I used to be a sales manager, taught in the classic, old school approach. Basically, I just got to know my clients really well so I could always talk to them about something. Wishing them a happy birthday, finding out how their youngest did during his baseball game, I had a pretty comprehensive well of topics I could pull from. This let me keep a pretty detailed record of people and their interactions with me that allowed me to really make connections with them.

My dad used to moonlight as a rental property manager on top of his full-time position, and that really inspired me. I slowly saved up my money until I could buy the duplex I lived in, and from there, I was hooked.

That first investment grew into a business that supports my family and my staff. All of the processes of managing properties (things like collecting rent, paying taxes, handling payroll, managing utilities, and maintaining the rental spaces) mean that I rely on logistics quite a bit to accomplish it all.

My dad taught me two things that I have really taken to heart: Measure twice, cut once, and to do as much as I could, and let the experts do what I couldn’t.

The second lesson was really helpful when I was first equipping my rental properties. I like to think my places are pretty nice, so they feature things like quality Wi-Fi connections, smart locks, and other things that need a little bit of management. The commercial properties I have are equipped with even more of these kinds of things. All of this tech needs a lot of horsepower, so to speak, so I have a pretty hefty setup at my main office. I also need my technology to help me keep track of who my tenants are, the documentation they’ve given me and the stuff I have to keep, as well as to manage my employees the way I need to.

Now, I can’t do very much at all with a computer unless it’s something I use it for every day, so I listened to my old man’s advice and called a reputable IT company. They came in, set everything up, and when they recommended a backup system, I approved it. The IT company set everything up, taught my office manager to use it and how files could be restored, and even stopped in a month later to check in.

This was all great, and we went along with our business for a few years after that.

Then, we got slammed from all sides. A few tenants were moving out, there were some maintenance concerns that we were dealing with, it was the middle of tax season, and the office manager who knew how everything worked had just left for a much-deserved cruise with his family.

Of course, it was then that the software we rely on for pretty much everything - internal communication, payroll, and scheduling - it just stopped working, and our data was all messed up.

Nobody could figure out what to do, and I finally had to make the very expensive call to my office manager, who was kind enough to spring for the cruise ship’s cellular service in case something happened. That got us to the backup to restore from it. We had also left a message with the IT company.

It was a good thing we did, too, because when the restore was finished, we were still dealing with bad data. We tried again - same thing.

When we managed to get in touch with the company, they told us that some software change had messed up how data was stored in the backup, so while everything else was fine, that one software just stopped being backed up.

This was important stuff - like, the kind that it would have taken a HUGE amount of work and time to even get back to our normal business functions. Plus, we would still have to go back and ask all of our tenants for their sensitive information again. How would that have looked?

The worst part? We knew about the issue when the software was updated - we just never connected it to our backup.

Somehow, after a lot of stress and a pretty big bill, our data was recovered and we could get back to work. Frankly, while it was a really expensive process, I still look at it as a bargain.

However, with a few better practices, we could have avoided the entire issue. That’s why we’re now sure to test our backup at least once a month. A few hours gives me the peace of mind that my business won’t be thrown in jeopardy again. Basically, we just see if we can operate using only what’s on the backup.

These evaluations have already caught a few additional issues, so we’re already seeing the benefits. Make sure you’re backing up your data, and make sure you’re testing them!

We appreciate having this story to share with you, as it raises an important point. Your network is going to change as time passes, so you need to make sure that it is still working as intended. A secure network hosting an insecure application is effectively no longer a secure network. You can view your backups in the same way.

We test all the backups we maintain in a similar way. After all, if a backup doesn’t deliver what you need, it isn’t going to help you much when you need it.

Central Technology Solutions can help you avoid this kind of issue, and many others, from impacting your business. Learn more by reaching out at 1-844-237-4300.

Taking a Long Look at Smartphones
Windows 7’s Time Has Come
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, January 18 2020

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Productivity Hosted Solutions Privacy Data Network Security Email IT Services Data Backup Malware Internet Hackers Software Outsourced IT Innovation Computer Productivity Microsoft IT Support Managed IT Services Data Recovery Business Efficiency Mobile Devices Hardware IT Support Upgrade Backup Ransomware Cloud Computing Tech Term Small Business User Tips Business Continuity Google Phishing Windows 10 Collaboration Internet of Things Cybersecurity Workplace Tips Managed IT Services Communication VoIP Managed Service Provider Smartphone Smartphones Remote Monitoring Paperless Office Android Business Management Disaster Recovery Facebook Data Management Social Media Save Money Artificial Intelligence Encryption Server Managed Service Windows 10 Windows Office 365 Managed IT communications Browser Mobile Device BDR Network Help Desk BYOD Saving Money Risk Management Passwords Virtualization Holiday Government Document Management Quick Tips Wi-Fi Miscellaneous Business Technology Apps Password Automation App Mobile Device Management Big Data Firewall Avoiding Downtime Unified Threat Management Healthcare Chrome Employer-Employee Relationship Compliance Robot Bandwidth Bring Your Own Device Going Green Training Vendor Management Microsoft Office Windows 7 Gmail Recovery Analytics Laptops Applications Tip of the week Apple Scam Project Management Antivirus Money Infrastructure SaaS Hosted Solution Data storage Telephone Systems Website Data loss Vulnerability Blockchain Information Wireless Computers Processor Content Filtering File Sharing IT Management Redundancy Customer Service Software as a Service Router Unified Communications Social Two-factor Authentication Users Politics Virtual Reality Maintenance Work/Life Balance VPN Customer Relationship Management Downtime Computing Data Security Regulations Office IT Service Access Control Information Technology Machine Learning Mobility Operating System Printing Storage Tablet RMM Remote Computing Settings Files Gadgets Private Cloud Proactive Tech Support The Internet of Things Mobile Computing Employee-Employer Relationship Hacker Smart Technology Spam Digital Payment Solid State Drive Remote Monitoring and Management Upgrades Management WiFi Websites Identity Theft Wireless Technology Legal Networking Twitter Net Neutrality YouTube Current Events Patch Management Social Network Licensing Remote Workers Display File Management Virtual Private Network Administration Network Management Internet Exlporer Hard Drive End of Support Health Budget Assessment LiFi IoT Payment Cards HIPAA Education Monitors Bitcoin Server Management Cooperation How To Co-Managed IT IT solutions Alert Mobile Security Electronic Medical Records OneDrive Mouse Employees Consultation Outlook Monitoring Uninterrupted Power Supply Professional Services Company Culture Sports Google Drive How To Samsung Recycling Utility Computing Consulting Word Search Chromebook Dark Web Flexibility Business Growth Hard Disk Drives Virtual Machines Cyber Monday technology services provider IT Budget Hard Drives Google Docs Tech Terms Proactive IT Notifications Remote Worker Batteries User Error Language eWaste Read Only Spyware Course Cables Backup and Disaster Recovery Black Market Projects Smart Tech Cabling Humor Managed Services Provider Shortcut Cyber security Migration Enterprise Content Management Finance Firefox Writing Emoji Proactive Maintenance Data Warehousing Backups Wasting Time Smart Devices Operations Drones Solid State Drives Credit Cards Technology Assurance Group ’s 18 Theft Heating/Cooling IT Consulting ROI Remote Work Computing Infrastructure Point of Sale Deep Learning Network Congestion Chatbots Wires Human Error Time Management Return on Investment Cybercrime Cost Management E-Commerce WannaCry Computer Repair Teamwork Technology Tips Vulnerabilities Authentication Retail Cortana Database Management Microsoft Excel Modem Sync Connectivity Hacking Physical Security Database Sensors Multi-Factor Security Wearable Technology Telephony Alt Codes Options Holidays Distributed Denial of Service Annual Convention Public Cloud Cryptocurrency WPA3 Financial Servers Data Breach 3D Printing Notes Printer Alerts Law Enforcement Enterprise Resource Planning Bookmarks Comparison Identity Botnet Permission Processors Active Directory Travel Features Shared resources Windows Server 2008 Typing Geography Authorization GDPR Cookies Mobile Device Managment Software Tips Hacks Disaster Trending Office Tips Voice over Internet Protocol Google Calendar Mail Merge Update 5G IT Managed IT Service San Diego Automobile Computer Care Fleet Tracking Procurement Technology Laws Unsupported Software Virus PowerPoint Value of Managed Services Virtual Desktop Gadget Best Practice Mobile Favorites Specifications Test Touchscreen Techology Windows Server Cache Electronic Health Records VoIP Sponsor High-Speed Internet Lenovo Social Engineering USB Permissions Nanotechnology Star Wars Telephone Legislation IT Technicians GPS Address Wireless Internet Business Telephone Break Fix Social Networking Windows 8 Save Time Asset Tracking Statistics Mobile Data Managed Services SharePoint Staff Conferencing Manufacturing Optimization Black Friday Roanoke — Central Technology Solutions Supercomputer Identities MSP Disaster Resistance Security Cameras User Management Unified Threat Management Hotspot Crowdsourcing Meetings Cyberattacks Digital Obstacle Tracking Development Zero-Day Threat Superfish Safety Fraud Screen Reader G Suite History Dark Data Personal Information Transportation Mobile VoIP Marketing Mirgation Instant Messaging Employer/Employee Relationships Buisness Motherboard Google Maps OneNote Bluetooth Virtual Assistant Vendor Downloads Augmented Reality Taxes Google Wallet Managing Stress Webcam Hard Disk Drive Students IT Consultant Error Printers Emergency Web Server CrashOverride Cameras Regulation Motion Sickness Administrator CCTV Relocation IT Assessment