Site icon Martin Haller, A blog about corporate IT protection and management

Data Backup – How to Not to Lose Data When Hacked (In Real Life)

backup-technologies

In the previous article, “Data Backup – How to Not to Lose Data When Hacked (In Theory)”   I wrote that backups are what you have to keep in case of a network attack, and you have to be sure you can rely on them. At PATRON-IT, after several years of work (experience with different technologies) and a series of debates, we have developed a number of proven technologies that we trust and use for all of our customers. For each customer, always at least 2 of them. Better safe than sorry. 🙂 This way we are sure that the backups will survive.

Veeam endpoint backup + Synology NAS

Our most versatile backup technology that resists both ransomware and human invaders while being affordable. It consists of backing up entire servers/stations with Veeam endpoint backup (free for stations and servers) to a shared folder on NAS. NAS is any Synology that supports Btrfs (supports snapshots). We have automatic snapshots of shared folders with backups on NAS.

Altaro + Hyper-V

Altaro is a paid backup software that supports both Hyper-V and VMware. By serving virtual servers, it is not suitable for the smallest businesses without virtualization. Altaro is a cheaper alternative to more expensive Veeam Backup & Replication. Alternately, we back up virtuals to local server storage (high bandwidth) or to some network storage (different server or NAS).

Windows server backup

Sort of an “emergency” in our tools. This is a Windows Server component from 2008. Windows server backup is easy to use, can manage backup space itself, can use VSS snapshots (as a pseudo “change block tracking”) to speed up backup.

We have used it more often previously. We now replace it with the above-mentioned technologies. It is more down-stacked, slower for backups, with larger backups, and smaller disk drives. In addition, there is a risk of overwriting old backups (if there is a big change to production data [eg due to ransomware] and the target partition for backup is small).

Supplementary technologies

In addition to the previous core technologies that we always back up the entire server/station with, we also use the following supplementary ones.

Managed online backup

This is a cloud data backup that we have integrated into our monitoring system. Supports backup of different databases, virtual servers, and local and shared folders. In addition, we have the option of archiving (keeping the backup for an unlimited period of time). Alternatively, you can use Azure Backup or other cloud backups.

The advantage of cloud backups is that backups cannot be deleted from the server or station and are so resistant to viruses and hackers. In addition, because they are in another place, they will also resist natural disasters and thieves within a company. An advantage is a direct connection to our monitoring system.

Tapes/tandberg

An alternative to cloud backups where there is insufficient internet connection speed or the customer does not want to have data somewhere in the cloud. External media (with encrypted backups) is taken off-site and not available online. Therefore, backups are resistant to thieves, natural disasters, viruses, and hackers. Of course, monitoring of backups is provided by the monitoring system.

Previous versions

The basic functionality of the operating system from Windows 7 and Windows Server 2008. It allows you to set up regular “snapshots” of the disk. Users can then restore their data by themselves (right mouse button on the folder/file and select “restore previous versions”).

The advantage of the technology is mainly the speed of the “snapshot”, which is just a few seconds. Ideally, it fits into a shared folder where backups can be scheduled every hour (even more often). When the user deletes a shared file or makes a bad edit, you restore the file in a few tens of minutes from the old backup. Additionally, backups are economical to space (in fact, they begin to take up space only when data on disk changes – the so-called. copy-on-write).

We use the technology on all servers with shared folders and simplified at all stations.

Snapshots

For some customers, we also use Snapshots at Hyper-V or directly on a shared network repository. So far, this is nothing standardized, but rather a means of addressing customer specific needs (unfortunately, exceptions to standards sometimes exist). We will see if this will become a standard depending on how things will evolve in the future..

Conclusion

For the sake of clarity, I have tried to capture the different properties of each method into one summary table.

Overview of our backup methods

How do you like our backup solutions? Do you have any better solutions or ideas for innovation? Please let me know, I will be very pleased by your feedback.

Do you like topics, I write about?

It is not necessary to periodically visit my blog to check if there is a new article. Subscribe below for notifications. You will be the first one who will know about new article.

Exit mobile version