{"id":28057,"date":"2019-01-14T17:31:26","date_gmt":"2019-01-14T13:31:26","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=28057"},"modified":"2024-08-06T12:24:36","modified_gmt":"2024-08-06T08:24:36","slug":"smb-backup-local","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/smb-backup-local\/","title":{"rendered":"Part 1: Building the Backup Infrastructure for SMBs: Local Systems"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">This article is the first in a series. In this part, we will cover building the backup infrastructure for a small team of 15 people or less, that is running their computer systems primarily on in-house hardware \u2013 a server or NAS, and PCs for each user. <\/span><!--more--><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019ll assume that most information is stored locally in your building. Later articles will cover other options \u2013 backing up a cloud infrastructure and backing up a hybrid infrastructure where some data is stored on-site and some in the cloud. <\/span><\/p>\n<div class=\"table-of-content \">\n\t\t\t\t<p>Table of Contents<\/p>\n\t\t\t\t<ul><\/ul>\n\t\t\t\t<\/div>\n<p><span style=\"font-weight: 400;\">Data is the lifeblood of any organization. If it is lost or stolen, how long would it take to recreate the information about your customers, suppliers, partners, and products? These days there are more threats than ever to contend with and the ways to lose your data are multitudinous:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Ransomware that encrypts your data so you can\u2019t access it, (or even encrypts your backups as well as the online copies of data) <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Malware that erases data or sends it to another location <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Users who make mistakes and erase or overwrite files <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Equipment failures that render data inaccessible, scrambled or permanently destroyed <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Natural disasters that destroy not only your computers but the data stored on them<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">So you need<\/span><b> a backup strategy<\/b><span style=\"font-weight: 400;\">, and maybe more than one \u2013 the system that can easily and quickly restore an entire server may not work well for restoring a single file that a user accidentally deleted. Fortunately, there are backup systems for every need, from simple backups of data from one system to a second to disaster recovery systems that can recreate all of your systems at a new location in minutes if necessary. Another related but separate function is <\/span><i><span style=\"font-weight: 400;\">archiving<\/span><\/i><span style=\"font-weight: 400;\"> and <\/span><i><span style=\"font-weight: 400;\">e-discovery<\/span><\/i><span style=\"font-weight: 400;\"> for communications \u2013 voicemail, email, instant messages, video conferences and more that might be needed if your company is involved in a lawsuit or has to document a data breach. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">To provide your critical-mission data availability, follow <\/span><span style=\"font-weight: 400;\">the 3-2-1 Backup strategy<\/span><span style=\"font-weight: 400;\"> when you build out your backup and recovery infrastructure.<\/span><\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/following-3-2-1-backup-strategy\/\" target=\"_blank\" rel=\"noopener noreferrer\">Following 3-2-1 Backup Strategy with MSP360 Backup<\/a><\/p>\n<p><span style=\"font-weight: 400;\">To build an effective backup infrastructure, you need to ask yourself some questions before:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Where is the data located? <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">How much data is there? <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">How quickly does it need to be back up and running if something happens? <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">What level of security is required? <\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">There might be 15-person companies with only a few dozen customers and a few years worth of data to protect that might store backups of everything on a single hard drive, and others that do movie special effects or scientific data processing that would need a truck full of storage to hold everything, and might need hours or days to transfer everything from one system to another. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Some might be able to survive for a week or two without access to all their data, while others would lose tens or hundreds of thousands of dollars for every hour their systems are offline. For the first, a basic backup system that can restore data to a new server in a few hours would suffice; for the second, it is possible, though expensive, to recover a complete failover data center system and have everything available in seconds even if a whole data center is taken out by a hurricane. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The traditional local backup approach involves making a copy of your data on a set schedule and storing it on a storage device that can be sent to a separate location if necessary. Rather than doing a complete backup every night, many modern systems can backup only what has changed since the last backup; this is called an <\/span><a href=\"https:\/\/www.msp360.com\/resources\/blog\/incremental-backup-guide\/\"><span style=\"font-weight: 400;\">incremental backup<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/backup-types-comparison\/\">Backup Types Comparison<\/a><\/p>\n<p><span style=\"font-weight: 400;\">With early backup methods, that was an iffy strategy since a complete restore required restoring from the last full backup and then all of the incremental backups since the full backup. Today, an incremental backup can be automatically integrated with the backup system so that you get the best of both worlds \u2013 an up-to-date backup that still only requires backing up the files changed since the previous backup. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another issue to deal with is that backups must protect against ransomware that often targets and encrypts not only the day-to-day files used by an organization but even the backups. To protect backups from ransomware, vendors typically use one of two systems \u2013 either an approach like anti-virus that attempts to catch malware in the act and keep it from corrupting backups or a <\/span><span style=\"font-weight: 400;\">write once read many (WORM) system<\/span><span style=\"font-weight: 400;\"> that provides protection against ransomware by never overwriting an old version of a file. Since new versions of files are kept separate from older ones when ransomware encrypts files and attempts to encrypt the backups, new versions of the files are created that are encrypted, but the old, unencrypted files are still available as well. This uses more storage space, but it is relatively cheap, and many consider this a good investment to prevent data loss.<\/span><\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/worm-compliance-explained\/\" target=\"_blank\" rel=\"noopener noreferrer\">WORM Compliance Explained<\/a><\/p>\n<p><span style=\"font-weight: 400;\">Data must be protected, but more than that, you need to be able to get up and running in case something happens to your systems. This means disaster recovery in addition to traditional backups. You need to ask yourself <\/span><i><span style=\"font-weight: 400;\">how long you can go without your data and the systems the data is stored on<\/span><\/i><span style=\"font-weight: 400;\"> \u2013 whether it is minutes, hours, days, or weeks. If the answer is longer than it would take to buy a new server, set it up, and restore the data from your backups, then you may want to consider backing up to a virtual machine in the cloud. The downside to this approach is that it costs more, especially over time \u2013 you can buy a backup device and backup software, and that one capital expenditure will last until it\u2019s no longer compatible with the server you\u2019re running, probably several years. The cloud backup will cost you something every month.<\/span><\/p>\n<h2><b>Hardware<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The simplest example of a business network is a number of workstations connected to a file server running Windows or Linux, or a NAS device that provides the same functionality. Clients typically store all the files they use day to day locally on their workstations, \u00a0but there is still file server that needs to be backed up \u2013 local workstations don\u2019t have to be copied with <a href=\"https:\/\/www.msp360.com\/resources\/blog\/file-level-vs-image-level-backup\/\">image-based backup<\/a> individually since they can be re-installed (re-imaged) with the master image if there are problems. But the file backup of individual workstations is still required.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-28058 aligncenter\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/01\/pic1.png\" alt=\"SMB local backup infrastructure\" width=\"506\" height=\"325\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/01\/pic1.png 506w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/01\/pic1-300x193.png 300w\" sizes=\"auto, (max-width: 506px) 100vw, 506px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">In this case, all you need to back up is the server, and the size of the device you need for backups will be several times larger than the volume on the server, generally three or four times larger. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are two technologies that can reduce the size of the backup device needed \u2013 <\/span><b>compression <\/b><span style=\"font-weight: 400;\">and <\/span><a href=\"https:\/\/www.msp360.com\/resources\/blog\/deduplication-meaning-approaches-tips\/\" target=\"_blank\" rel=\"noopener noreferrer\"><b>deduplication<\/b><\/a><span style=\"font-weight: 400;\">. Compression reduces the size of data, and deduplication saves space by copying only unique files or parts of the files. If you back up six home directories and they each have a file called <\/span><i><span style=\"font-weight: 400;\">addressbook.ost<\/span><\/i><span style=\"font-weight: 400;\">, only the first copy will be backed up. If any of the six files needs to be restored, they can be put back with only that one file. If there are two different versions of the file, both get backed up. Some deduplication systems work on small parts of files so that if two files are mostly the same, only the part that is different needs to be stored separately. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition to the device or devices that your backup system stores data on (targets), your backup\/disaster recovery system may also include servers, whether physical systems or virtual machines. These can be used in the event of a server or even the whole data center is damaged or unavailable. If not only the data but the server that data resides on is lost, you can restore the data <\/span><a href=\"https:\/\/www.msp360.com\/resources\/blog\/cloud-disaster-recovery\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">to a virtual server in the cloud<\/span><\/a><span style=\"font-weight: 400;\">, start the virtual server, and quickly have your whole system up and running. Once the issues with the original system are resolved, the data and applications can be migrated back to the original server.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Many companies that sell backup hardware and software can help you determine how much storage you need for backups and offer you the storage system and software to run the backup system. This is often an easy choice for part-time administrators who have many other duties \u2013 just call a company, receive the system, plug it in, and follow the prompts, and your backups are running. These companies often offer technical support to get your system up and running as well.<\/span><\/p>\n<h2><b>Software<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The backup software you need will depend partly on the services you use in your work. Most typical organizations have several different types of data stored on different types of systems, such as:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">user\u2019s files, including word processing documents, PDFs, Excel files, etc. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">accounting data <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">transaction data <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">and customer information stored on database servers <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">email and other messaging data stored on email servers <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">payroll information stored in cloud applications etc. <\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Each type of data may require different backup software, or a single over-arching backup application may be able to work with all the different storage systems but require more setup to start with. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">While determining the need for backup, write down all the different data types, applications, and machine types your organization has. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are several types of backup applications, as well. One type backs up data on a set schedule, while another provides continuous data protection (CDP) capturing each change as it happens in real time. CDP ensures that little or no data is lost in the event of a failure, as compared to whatever has changed since the last backup for standard backups. However, CDP requires more system resources as it monitors data changes in real time and creates multiple file versions. This can normally be enabled for the most critical data, while once-a-day snapshots or even once-a-week backups might suffice for less critical information that isn\u2019t changed often.<\/span><\/p>\n<h2><b>Backup and Storage Compliance <\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Depending on the type of business you have, there might be regulatory requirements to meet for some or all of your data. If you take payments via credit card or other online transactions, the payment card industry data security standards (<\/span><a href=\"https:\/\/www.pcisecuritystandards.org\/pci_security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">PCI DSS<\/span><\/a><span style=\"font-weight: 400;\">) will apply. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you store medical information, the health insurance portability and accountability act (HIPAA) has many different requirements. To make matters more interesting, the various regulations may have different requirements for the same data, or even contradict each other \u2013 one requiring that data be archived for the life of a patient, while another requires that personal information must be expunged after a set period. Many backup services can help you navigate these requirements offering specific compliance packages for different types of data or different industry requirements. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">These regulations may influence where or how you make your backups. Many standards have strict security requirements for data kept off-site, and others may require that you make tapes or detachable disks and store them off-site. <\/span><\/p>\n<h2><b>Some Tips and Tricks on Backup Infrastructure<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The best thing any administrator can do is test, and test regularly. <\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Pick a file or directory and try to restore it once a month. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Do a complete restore of one whole system once every quarter. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Do a failover of the whole data center once in a while including spinning up virtual machines in the cloud and restoring to them. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Don\u2019t test something once and assume that it will work thereafter.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Unfortunately, it is often the case that a system will stop working without letting anyone know, and then when it\u2019s needed, the data is not really there any longer. Most backup systems will send regular reports on backup jobs completed and will notify the administrator if there\u2019s an error. However, there are ways that this can escape the notice of a busy individual and it\u2019s very easy to miss something until someone attempts a restore and discovers that not everything was being backed up properly. So test, and test regularly. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another common issue these days is data sprawl. One manager uses Amazon Web Services to create a database and store a bunch of information, but doesn\u2019t set up backups. Then another user creates a different database in Azure, but uses a default password and no encryption of customer data. It\u2019s so easy to set up software in the cloud and store a lot of data and there\u2019s often no oversight to ensure that backups, security, or regulatory compliance are in place, until it\u2019s too late. Many of the recent data breaches are the result of this kind of problem. <\/span><\/p>\n<div class=\"perfect-pullquote vcard pullquote-align-full pullquote-border-placement-left\"><blockquote><p>Set a company policy for approving new applications, and make sure that security and regulatory compliance guidelines are followed.<\/p><\/blockquote><\/div>\n<h2><b>How MSP360 Can Help with Building the Backup Infrastructure<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">MSP360 offers a <a href=\"https:\/\/www.msp360.com\/resources\/blog\/backup-vs-disaster-recovery\/\">backup and disaster recovery<\/a> software for servers and endpoints. With MSP360 Backup you can easily back up data to local storage: local disks, network shares, NAS devices, and perform the peer-to-peer backup (backup to the storage over a VPN)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Download <\/span><a href=\"https:\/\/www.msp360.com\/backup\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">MSP360 Backup<\/span><\/a><span style=\"font-weight: 400;\"> and check out its advantages during the free 15-day trial.<\/span><\/p>\n<p><span class=\"further-reading \">Further reading<\/span>\u00a0<a href=\"https:\/\/www.msp360.com\/resources\/blog\/smb-backup-cloud-apps\/\" target=\"_blank\" rel=\"noopener noreferrer\">Part 2: Building the Backup Infrastructure in Small Organizations with Cloud Apps<\/a><\/p>\n<p><span class=\"further-reading \">Further reading<\/span>\u00a0<a href=\"https:\/\/www.msp360.com\/resources\/blog\/smb-backup-hybrid\/\" target=\"_blank\" rel=\"noopener noreferrer\">Part 3: Building the Backup Infrastructure in Small Organizations: Hybrid Systems<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article is the first in a series. In this part, we will cover building the backup infrastructure for a small team of 15 people or less, that is running their computer systems primarily on in-house hardware \u2013 a server or NAS, and PCs for each user.<\/p>\n","protected":false},"author":63,"featured_media":28083,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[883,877],"tags":[],"class_list":["post-28057","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-backup-and-dr-articles","category-blog-articles"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/28057","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/63"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=28057"}],"version-history":[{"count":6,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/28057\/revisions"}],"predecessor-version":[{"id":58271,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/28057\/revisions\/58271"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/28083"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=28057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=28057"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=28057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}