/

/

How companies lose data and how modern backup works

How companies lose data and how modern backup works

How companies lose data and how modern backup works

The 3-2-1 rule, data snapshots and cloud backups - a practical guide to protecting company data

The 3-2-1 rule, data snapshots and cloud backups - a practical guide to protecting company data

Andrzej Kossakowski

Andrzej Kossakowski

Andrzej Kossakowski

5 min

5 min

reading

Table of Contents

Data loss - a real threat to a company

There are two main threats related to company data. It can either be disclosed or lost. Data disclosure is a separate, broad topic - in this article, we will focus exclusively on data loss.

Data loss does not mean only physical deletion. An equally serious problem can be lack of access to data or corruption that makes it unreadable.

In practice, this means a situation where a company is unable to use its documents, systems, or work history.

Where data loss comes from

Data loss can have many causes. Some result from hardware failures, others from human error, random events, or malware attacks.

Hardware failure

In the morning, you turn on a computer or server and instead of the operating system, you see a disk error message. The system does not boot, and the data is unavailable. Hard drives and other data storage media are mechanical and electronic devices that wear out and fail.

User error

An employee organizes document folders and deletes files that seem unnecessary. Only after a few hours does it turn out that an important document or even the entire project directory structure was among them. In many companies, accidental user actions are one of the most common causes of data loss.

Malware attack

You come to work in the morning and try to open a document. Instead of its content, you see a message saying that the files have been encrypted and that a ransom must be paid to regain access. This is a typical ransomware attack scenario that blocks access to data across the entire company.

Random events

At night, a water system failure or a fire occurs in the building. IT equipment is damaged or completely destroyed. If the data was stored only in that location, the company may lose access to it with no possibility of recovery.

System issues

The operating system performs an update or a file system error occurs. After rebooting, some documents are corrupted or cannot be opened. The data is still physically on the disk, but the system cannot read it correctly.

Loss of access to data

There are also situations where data exists, but the organization has no access to it. This may result from loss of administrative accounts, loss of encryption keys, or authentication system errors.

Data loss in the cloud

Cloud data is stored on physical machines administered by people. These are also exposed to many threats. Every serious provider protects against data loss, but cases of data loss still occur. The cloud does not guarantee data security.

Basic rule: backup

The most effective way to protect against data loss is to perform regular backups. This should happen cyclically, preferably in an automated and monitored way. As a result, the process becomes as independent from the human factor as possible.

The backup frequency depends on business needs. For some companies, one backup per day is enough, accepting the loss of one workday of data. In other cases, backups are performed much more frequently - even every several minutes.

What it looked like in the past

Just over a dozen years ago, the classic backup method was saving data to magnetic tapes. The administrator created a backup and then put the tape into a "cabinet."

Although this solution gave a sense of security, in practice it often proved insufficient. Tapes were usually stored in the same location as the servers, so a fire or flooding destroyed both the data and the backups.

Additionally, it happened that during data restore attempts, the tape was damaged, and the data recovery process itself was very time-consuming.

Modern backup approach

Modern backup systems use several independent mechanisms at the same time.

At Helpwise IT, we apply the 3-2-1 rule:

  • 3 data copies

  • 2 different storage media

  • 1 copy stored outside the primary location

This approach significantly increases data security.


Diagram of the 3-2-1 backup rule

3

3

copies
of data

-

2

2

various
carriers

-

1

1

location
offsite
Source
Local copy
Backup
Replika
ZFS
Azure
Cloud
Backup: 03:00
Copied: 847 GB
Retention: 30 days

A secure backup is based on three data copies, two different media, and one copy stored outside the primary location.

Data snapshots

The first protection element is so-called data snapshots created very frequently, for example every 15 minutes. They are created on a local server and allow data to be restored to an earlier state almost immediately.

In typical situations - such as accidental file deletion or document corruption - data can be recovered within a few minutes, with a loss of no more than several minutes of work.

Second copy in another location

The second element is a data copy stored on a separate server. It is often located in a different geographic location.

This protects data from hardware failure, fire, or flooding, as well as from ransomware encryption.

To reduce the risk of backup encryption, the backup server should not be directly accessible from the corporate network. Instead, it pulls data from the source system by itself.

Third copy in the cloud

The third element is a copy stored in the cloud. This is an additional security layer that protects data in the event of a major failure or disaster affecting the entire local infrastructure.

Services of this type are often cost-optimized - data storage is inexpensive, while data restoration can be more expensive. In practice, however, this is acceptable because such a copy is used only in emergency scenarios.

Why backup is so important

There is no single solution that will secure a company in every situation. Only a set of complementary mechanisms - local copies, separate infrastructure, and cloud copies - provides real data security.

Backup is needed only at one moment - when something has already gone wrong.

Table of Contents

Request an IT support services quote

Briefly describe your situation - we will respond within 24 hours with a tailored proposal.

The personal data you provide will be processed for the purpose of preparing and sending an offer for your company. More information about your rights related to GDPR can be found in our Privacy Policy and Cookie Policy.

Thank you for submitting the form,

we will respond as soon as possible.

Working hours

Mon – Fri, 8:00 AM – 6:00 PM

Office address

Patriots Street 303, 04-767 Warsaw

We guarantee a quick response. We reply to every inquiry within 24 hours. In urgent matters - call.

Request an IT support services quote

Briefly describe your situation - we will respond within 24 hours with a tailored proposal.

The personal data you provide will be processed for the purpose of preparing and sending an offer for your company. More information about your rights related to GDPR can be found in our Privacy Policy and Cookie Policy.

Thank you for submitting the form,

we will respond as soon as possible.

Working hours

Mon – Fri, 8:00 AM – 6:00 PM

Office address

Patriots Street 303, 04-767 Warsaw

We guarantee a quick response. We reply to every inquiry within 24 hours. In urgent matters - call.

Request an IT support services quote

Briefly describe your situation - we will respond within 24 hours with a tailored proposal.

The personal data you provide will be processed for the purpose of preparing and sending an offer for your company. More information about your rights related to GDPR can be found in our Privacy Policy and Cookie Policy.

Thank you for submitting the form,

we will respond as soon as possible.

Working hours

Mon – Fri, 8:00 AM – 6:00 PM

Office address

Patriots Street 303, 04-767 Warsaw

We guarantee a quick response. We reply to every inquiry within 24 hours. In urgent matters - call.