Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Learn Why Backups are Most Crucial to Users

Learn Why Backups are Most Crucial to Users

Data loss is no joke - and we’ve heard plenty of stories from people who have experienced it firsthand, when personal or business data was lost. We appreciate everyone who shared their experiences with us, and allowed us to post them here. First, we’ll tell the story of someone who learned something in college that wasn’t in the syllabus.

Don’t forget to share your own stories with us in the comments!

College was a pretty great time for me, so I have a lot of good memories of it. Of course, they weren’t all great... One memory in particular still bothers me a little: when I almost failed in sophomore year because my computer went bad.

I went to college to study journalism, so there was a lot of writing involved. So much so, that my Dad surprised me before I started my second year with a computer for my dorm room so I could write and edit my copy in peace. The student computers on campus were a little ways from the dorm, so it was nice not to have to hike across campus by myself.

Sophomore year started wonderfully - I wrote a few articles for the student paper each week, and I got some of my general studies courses out of the way so I could focus on professional development during my later years. I even went abroad for a few weeks on a mission trip that fall, and had assembled quite a photo album with the digital camera I had bought for the occasion.

However, toward the end of that first semester, everything went wrong, all at once.

I had heard I should keep up a backup, but I really didn't think I'd have a problem. My Dad had just bought me this new computer just before the semester started, so everything was updated and new. I had a copy of *most* of my files when I moved them over to the new computer, so I figured I was in good shape for a while.

Then, just before Thanksgiving, I was in a bit of a rush. My roommate had already taken care of everything she had to and was pretty much just waiting to go home for the holiday - she just had a few more classes to attend. 

I, on the other hand, was swamped - I wanted to get a few assignments started before break so I wouldn’t have to play catch-up after, and I had bitten off more than I could chew. 

I had to make sure I would have enough time to write everything that the paper would need after break, so I was trying to get a head start on some projects I knew were coming up. One was a research paper for the global history course I was taking. 

Knowing full well that very few college students would work on a research paper before a break, the professor had literally had us drawn our topics from a hat. I had pulled… the Hussite Wars, I think... and I had already put together an outline for this paper to be built around. This thing was supposed to be pretty hefty, with a full bibliography, according to our professor.

So there I was, typing away as my roommate watched Miss Congeniality for the third time that week. Just as Sandra Bullock was teaching self-defense using the SING technique, my computer started making weird sounds, and suddenly the screen went blank.

After a moment of shock, I started to panic. I had just put in hours and hours of work on this paper, and it was suddenly gone. Then I looked closer - everything was gone. All of my files, all of my work - everything… including the pictures I had taken during my trip.

My heart was broken, and my gut felt like it was filled with concrete.

It was late at night, so campus IT services had already gone home. I couldn’t sleep a wink, and the first thing I did in the morning was to haul my computer over to the IT service desk. They looked it over, and found that there was, unfortunately, nothing they could do to restore my files, although they got the computer working again.

I went home for break pretty stressed out - not only had I essentially wasted a ton of time on work that I was going to have to redo, I didn’t have all of the pictures that I had from my trip - those were what really hurt to lose. That’s why I was so happy when my Dad reminded me that I had already made him a CD of all the pictures I had taken, and he made me a copy to bring back.

The next few weeks were miserable, as I basically had to stay up all hours to get everything done. Somehow, I managed. I have since learned my lesson, and when working on an assignment, I ALWAYS keep a backup - although I don’t use a CD anymore.

What We Can Do Better

To protect your business’ data, you should always have more than one copy of it saved, and these copies should be kept in separate locations. While you should be taking multiple backups a day, it is best if they run continuously, ensuring that the most work you would lose would amount to just a few minutes.

We want to thank our contributor today, and remind you that Central Technology Solutions can assist your company with its data backup and continuity needs. Reach out at 1-844-237-4300 to learn more about our solutions!

Windows 7’s Time Has Come
4 Timeless Cybersecurity Rules to Live By


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, August 04 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Hosted Solutions Data Privacy IT Services Network Security Data Backup Email Malware Internet Hackers Software IT Support Business Efficiency Outsourced IT Innovation Microsoft Data Recovery Computer Hardware Mobile Devices Productivity Managed IT Services Small Business Google Upgrade Business Continuity IT Support Cloud Computing Backup Cybersecurity Collaboration Ransomware Phishing Smartphone Tech Term User Tips Communication Workplace Tips Managed Service Provider Disaster Recovery Managed IT Services Business Management Windows 10 VoIP Smartphones Managed Service Internet of Things Mobile Device Android Paperless Office Remote Monitoring Social Media Quick Tips Data Management communications Network Facebook Browser Encryption Managed IT Saving Money Server Artificial Intelligence Save Money Office 365 Windows 10 Windows Business Technology Virtualization BDR Miscellaneous Covid-19 Risk Management BYOD Help Desk Wi-Fi Compliance Passwords Holiday Government Vendor Management Health App Document Management Password Office Remote Work Microsoft Office Mobile Device Management Users Automation Training Windows 7 Apps Healthcare Unified Threat Management Data Security Big Data Analytics Chrome Recovery Firewall Bandwidth Applications Avoiding Downtime Bring Your Own Device Going Green Employer-Employee Relationship Robot Laptops Gmail Telephone Systems Information Technology SaaS Infrastructure Wireless Regulations Data loss Vulnerability Blockchain Computers Storage Information Apple Hosted Solution IT Management Redundancy Website Mobility File Sharing Processor Tip of the week Money Scam Two-factor Authentication Computing Project Management Data storage Antivirus Content Filtering Customer Relationship Management Employee-Employer Relationship Printing Virtual Private Network Operating System Politics Gadgets IT Service Work/Life Balance Access Control Remote Computing Unified Communications Settings Hard Drive IoT Downtime Flexibility Social OneDrive Machine Learning Company Culture RMM Customer Service Software as a Service Tablet Meetings Virtual Reality Router Proactive VPN Files Maintenance Budget Sports Display Private Cloud Bitcoin Remote Worker Remote Monitoring and Management End of Support Tech Support Management Data Breach Outlook Mouse Network Management Internet Exlporer HIPAA Assessment Remote Workers Monitors Digital Payment Cooperation How To Social Network Electronic Medical Records Websites Identity Theft Google Drive Server Management Alert Licensing Mobile Security Spam Business Growth Consultation Uninterrupted Power Supply File Management YouTube How To Samsung WiFi Mobile Computing Payment Cards Electronic Health Records Mobile Office Hacker Monitoring Chromebook Word Search Employees Administration Augmented Reality Co-Managed IT Dark Web Solid State Drive Current Events LiFi Wireless Technology Legal Recycling Education Utility Computing Consulting The Internet of Things Professional Services Managed Services Upgrades Data Storage IT solutions Smart Technology Twitter Patch Management Time Management Managed Services Provider Networking Net Neutrality 3D Printing CRM Multi-Factor Security Wearable Technology Best Practice Hard Disk Drives Virtual Machines IT Budget Microsoft Excel Modem Batteries Enterprise Content Management Hacking Finance Printer Alerts Cyber security Theft Distributed Denial of Service Annual Convention Projects Servers Gamification Remote Working Marketing Processors Cabling Wasting Time Smart Devices Wires Human Error Office Tips Buisness Comparison Identity Proactive Maintenance Cost Management Digitize E-Commerce Unsupported Software Virus Point of Sale Google Calendar Solid State Drives Connectivity Credit Cards Update Cookies Windows 8 Save Time ROI Disaster Vulnerabilities Trending Authentication Teamwork WPA3 Mail Merge Financial Managed IT Service San Diego Identities Return on Investment Enterprise Resource Planning Bookmarks Technology Laws Cybercrime Database VoIP Sensors Sponsor Permission Telephony Specifications Database Management Touchscreen Shadow IT Features Techology Social Engineering USB Sync Mobile Data Law Enforcement Legislation IT Technicians Google Wallet Options Holidays Lenovo Public Cloud Permissions Nanotechnology Notes Geography Authorization SharePoint Staff Shared resources Windows Server 2008 Fleet Tracking Address Procurement Botnet Break Fix Social Networking Hard Drives Google Docs Active Directory Mobile Statistics Favorites Peripheral Travel Humor Voice over Internet Protocol Digital Obstacle Test Dark Data Personal Information Black Friday Roanoke — Central Technology Solutions GDPR Cache Outsourcing Disaster Resistance Safety Mobile Device Managment Software Tips Unified Threat Management Hotspot Gadget Mirgation Drones 5G Star Wars IT Superfish Automobile Computer Care Fraud Screen Reader Backups PowerPoint Value of Managed Services High-Speed Internet Notifications Downloads Deep Learning Asset Tracking Motherboard Windows Server Bluetooth Conferencing PCI DSS Spyware Telephone MSP Course GPS Cyber Monday technology services provider Video Conferencing Cyberattacks Proactive IT Outsource IT Black Market User Error Language Development Shortcut Zero-Day Threat Migration Alt Codes Wireless Internet Business Telephone Writing Emoji Virtual Desktop Smart Tech Crowdsourcing Operations Manufacturing Firefox Optimization OneNote Network Congestion Supercomputer Data Warehousing Cryptocurrency Security Cameras User Management Managing Stress Instant Messaging Transportation Mobile VoIP Tech Terms Computer Repair Tracking Technology Assurance Group ’s 18 eWaste Heating/Cooling Biometric Read Only IT Consulting Laptop G Suite History Computing Infrastructure Virtual Assistant WannaCry Vendor Cables Backup and Disaster Recovery Physical Security Taxes Technology Tips Chatbots Typing Employer/Employee Relationships IT Assessment Retail Cortana Google Maps Hacks Webcam Emergency Students CrashOverride Printers IT Consultant Error Web Server Regulation Cameras Motion Sickness CCTV Administrator Hard Disk Drive Relocation