Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Learn Why Backups are Most Crucial to Users

Learn Why Backups are Most Crucial to Users

Data loss is no joke - and we’ve heard plenty of stories from people who have experienced it firsthand, when personal or business data was lost. We appreciate everyone who shared their experiences with us, and allowed us to post them here. First, we’ll tell the story of someone who learned something in college that wasn’t in the syllabus.

Don’t forget to share your own stories with us in the comments!

College was a pretty great time for me, so I have a lot of good memories of it. Of course, they weren’t all great... One memory in particular still bothers me a little: when I almost failed in sophomore year because my computer went bad.

I went to college to study journalism, so there was a lot of writing involved. So much so, that my Dad surprised me before I started my second year with a computer for my dorm room so I could write and edit my copy in peace. The student computers on campus were a little ways from the dorm, so it was nice not to have to hike across campus by myself.

Sophomore year started wonderfully - I wrote a few articles for the student paper each week, and I got some of my general studies courses out of the way so I could focus on professional development during my later years. I even went abroad for a few weeks on a mission trip that fall, and had assembled quite a photo album with the digital camera I had bought for the occasion.

However, toward the end of that first semester, everything went wrong, all at once.

I had heard I should keep up a backup, but I really didn't think I'd have a problem. My Dad had just bought me this new computer just before the semester started, so everything was updated and new. I had a copy of *most* of my files when I moved them over to the new computer, so I figured I was in good shape for a while.

Then, just before Thanksgiving, I was in a bit of a rush. My roommate had already taken care of everything she had to and was pretty much just waiting to go home for the holiday - she just had a few more classes to attend. 

I, on the other hand, was swamped - I wanted to get a few assignments started before break so I wouldn’t have to play catch-up after, and I had bitten off more than I could chew. 

I had to make sure I would have enough time to write everything that the paper would need after break, so I was trying to get a head start on some projects I knew were coming up. One was a research paper for the global history course I was taking. 

Knowing full well that very few college students would work on a research paper before a break, the professor had literally had us drawn our topics from a hat. I had pulled… the Hussite Wars, I think... and I had already put together an outline for this paper to be built around. This thing was supposed to be pretty hefty, with a full bibliography, according to our professor.

So there I was, typing away as my roommate watched Miss Congeniality for the third time that week. Just as Sandra Bullock was teaching self-defense using the SING technique, my computer started making weird sounds, and suddenly the screen went blank.

After a moment of shock, I started to panic. I had just put in hours and hours of work on this paper, and it was suddenly gone. Then I looked closer - everything was gone. All of my files, all of my work - everything… including the pictures I had taken during my trip.

My heart was broken, and my gut felt like it was filled with concrete.

It was late at night, so campus IT services had already gone home. I couldn’t sleep a wink, and the first thing I did in the morning was to haul my computer over to the IT service desk. They looked it over, and found that there was, unfortunately, nothing they could do to restore my files, although they got the computer working again.

I went home for break pretty stressed out - not only had I essentially wasted a ton of time on work that I was going to have to redo, I didn’t have all of the pictures that I had from my trip - those were what really hurt to lose. That’s why I was so happy when my Dad reminded me that I had already made him a CD of all the pictures I had taken, and he made me a copy to bring back.

The next few weeks were miserable, as I basically had to stay up all hours to get everything done. Somehow, I managed. I have since learned my lesson, and when working on an assignment, I ALWAYS keep a backup - although I don’t use a CD anymore.

What We Can Do Better

To protect your business’ data, you should always have more than one copy of it saved, and these copies should be kept in separate locations. While you should be taking multiple backups a day, it is best if they run continuously, ensuring that the most work you would lose would amount to just a few minutes.

We want to thank our contributor today, and remind you that Central Technology Solutions can assist your company with its data backup and continuity needs. Reach out at 1-844-237-4300 to learn more about our solutions!

Windows 7’s Time Has Come
4 Timeless Cybersecurity Rules to Live By


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, January 18 2020

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Productivity Hosted Solutions Privacy Data Network Security Email IT Services Malware Data Backup Internet Hackers Software Outsourced IT Microsoft Productivity Innovation Computer IT Support Managed IT Services Business Data Recovery Mobile Devices Efficiency IT Support Hardware Upgrade Ransomware Backup User Tips Small Business Cloud Computing Google Business Continuity Tech Term Windows 10 Phishing Managed IT Services Communication Collaboration Cybersecurity Internet of Things Workplace Tips Smartphone Smartphones VoIP Managed Service Provider Business Management Android Remote Monitoring Disaster Recovery Paperless Office Data Management Facebook Social Media Managed IT Windows 10 Save Money Windows communications Server Managed Service Encryption Artificial Intelligence Office 365 Mobile Device Browser BDR BYOD Virtualization Holiday Passwords Help Desk Network Saving Money Risk Management Apps Government Document Management Quick Tips Wi-Fi App Miscellaneous Password Business Technology Mobile Device Management Automation Laptops Applications Bring Your Own Device Gmail Avoiding Downtime Unified Threat Management Healthcare Going Green Vendor Management Employer-Employee Relationship Compliance Robot Big Data Analytics Chrome Training Firewall Bandwidth Microsoft Office Windows 7 Recovery IT Management Redundancy Money Tip of the week Data storage Content Filtering Scam Project Management Antivirus Wireless Infrastructure SaaS Telephone Systems Data loss Vulnerability Blockchain Information Computers Processor Apple Hosted Solution File Sharing Website RMM Files Computing Customer Service Software as a Service Router Two-factor Authentication Politics Information Technology Maintenance Work/Life Balance VPN Virtual Reality Printing Gadgets Operating System Customer Relationship Management Remote Computing Data Security Users Regulations Unified Communications Office IT Service Settings Access Control Machine Learning Mobility Downtime Storage Tablet Social Education How To Samsung Solid State Drive Recycling LiFi Wireless Technology Legal Utility Computing Consulting Word Search Current Events Chromebook Dark Web IT solutions Flexibility Private Cloud Proactive The Internet of Things Tech Support Budget Employee-Employer Relationship Sports Smart Technology Digital Payment Remote Monitoring and Management Upgrades Bitcoin Management Websites Identity Theft Networking Twitter Net Neutrality Patch Management Social Network Mouse Licensing Remote Workers Outlook File Management Virtual Private Network Display Network Management Internet Exlporer Google Drive Hard Drive End of Support Health Assessment IoT Spam Payment Cards HIPAA YouTube Monitors Business Growth Server Management WiFi Cooperation How To Alert Mobile Security Electronic Medical Records OneDrive Co-Managed IT Employees Consultation Monitoring Uninterrupted Power Supply Mobile Computing Hacker Administration Professional Services Company Culture Optimization Black Friday Roanoke — Central Technology Solutions Deep Learning Supercomputer MSP Disaster Resistance Security Cameras User Management Unified Threat Management Hotspot Crowdsourcing Meetings Cyberattacks Digital Obstacle Manufacturing Development Zero-Day Threat Superfish Virtual Desktop Safety Fraud Screen Reader G Suite History Dark Data Personal Information Transportation Mobile VoIP Mirgation Tracking Employer/Employee Relationships Motherboard Alt Codes Google Maps OneNote Bluetooth Virtual Assistant Vendor Downloads Augmented Reality Taxes Managing Stress Instant Messaging Hard Disk Drives Virtual Machines Cyber Monday technology services provider IT Budget Tech Terms Proactive IT Notifications Remote Worker Batteries User Error Language Cryptocurrency eWaste Read Only Spyware Course Cables Backup and Disaster Recovery Black Market Projects Smart Tech Cabling Managed Services Provider Shortcut Cyber security Migration Finance Firefox Writing Emoji Proactive Maintenance Data Warehousing Typing Wasting Time Smart Devices Operations Hacks Enterprise Content Management Solid State Drives Credit Cards Technology Assurance Group ’s 18 Best Practice Theft Heating/Cooling IT Consulting Marketing ROI Remote Work Computing Infrastructure Point of Sale Network Congestion Wires Human Error Time Management Return on Investment Cybercrime Cost Management E-Commerce WannaCry Buisness Computer Repair Teamwork Technology Tips Chatbots Vulnerabilities Authentication Retail Cortana Database Management Microsoft Excel Modem Sync Connectivity Hacking Physical Security Database Sensors Multi-Factor Security Wearable Technology Telephony Options Holidays Distributed Denial of Service Annual Convention Public Cloud WPA3 Financial Servers Data Breach 3D Printing Notes Printer Alerts Windows 8 Law Enforcement Save Time Enterprise Resource Planning Bookmarks Identity Botnet Permission Processors Active Directory Identities Travel Features Shared resources Windows Server 2008 Comparison Geography Authorization GDPR Cookies Mobile Device Managment Software Tips Disaster Trending Office Tips Voice over Internet Protocol Google Calendar Update 5G IT Managed IT Service San Diego Google Wallet Automobile Computer Care Fleet Tracking Procurement Technology Laws Unsupported Software Virus PowerPoint Value of Managed Services Gadget Mobile Favorites Mail Merge Specifications Test Touchscreen Techology Windows Server Hard Drives Google Docs Cache Electronic Health Records VoIP Sponsor High-Speed Internet Lenovo Social Engineering USB Permissions Nanotechnology Star Wars Telephone Legislation IT Technicians Humor GPS Address Wireless Internet Business Telephone Break Fix Social Networking Drones Asset Tracking Statistics Mobile Data Managed Services SharePoint Staff Backups Conferencing Relocation IT Assessment Webcam Hard Disk Drive Students IT Consultant Error Printers Emergency Web Server CrashOverride Cameras Regulation Motion Sickness Administrator CCTV