Introduction: Why Backups Matter
Data loss can happen to anyone through hardware failure, theft, natural disasters, ransomware, or simple human error. A comprehensive backup strategy is your insurance policy against losing irreplaceable files, photos, documents, and other digital assets. This cheatsheet provides practical guidance on creating, implementing, and maintaining a robust backup system that ensures your data remains safe and recoverable no matter what happens.
Core Backup Principles
The 3-2-1 Backup Rule
The gold standard for data protection:
- 3 – Keep at least three copies of your data
- 2 – Store the copies on two different media types
- 1 – Keep one copy offsite (physically separate location or cloud)
Extended 3-2-1-1-0 Rule
An enhanced version for maximum protection:
- 3 – Keep at least three copies of your data
- 2 – Store the copies on two different media types
- 1 – Keep one copy offsite
- 1 – Keep one copy offline (air-gapped from networks)
- 0 – Ensure zero errors through verification
Key Backup Types
Backup Type | Description | Pros | Cons |
---|---|---|---|
Full Backup | Complete copy of all selected data | Simplest to restore from; self-contained | Largest storage requirement; longest backup time |
Incremental Backup | Stores changes since the last backup | Quick backup process; efficient storage use | Slower restore (requires base + all incrementals); complex chain dependency |
Differential Backup | Stores changes since last full backup | Faster restore than incremental; no chain dependency | Larger storage than incremental; slower backups over time |
Mirror Backup | Exact copy of source | Quick verification; immediate availability | No version history; deletions/corruption replicate immediately |
Continuous Backup | Real-time capture of changes | Minimal data loss; granular recovery points | Resource intensive; more complex to manage |
Backup Storage Options
Local Storage Comparison
Storage Type | Best For | Durability | Speed | Cost | Capacity Range |
---|---|---|---|---|---|
External HDD | Large backups, primary backup | 3-5 years | Fast | Low (≈$20-25/TB) | 1TB-18TB |
External SSD | Frequent backups, portability | 5-7 years | Very Fast | Medium (≈$80-100/TB) | 500GB-8TB |
NAS Device | Home/small business central backup | 5+ years (drive dependent) | Fast (network limited) | High (≈$200-500 + drives) | 2TB-100TB+ |
USB Flash Drive | Small files, portable backups | 5+ years | Medium | Medium (≈$100-150/TB) | 32GB-1TB |
Optical Media (Blu-ray) | Archival, offline storage | 10-25+ years (archival grade) | Slow | Medium (≈$30-40/TB) | 25GB-100GB per disc |
Tape Storage | Enterprise, cold storage | 15-30 years | Slow write, sequential access | High initial, low per TB | 12TB-45TB per tape |
Cloud Storage Options
Service | Best For | Free Tier | Paid Plans | Special Features |
---|---|---|---|---|
Google Drive | Google users, document collaboration | 15GB | $2/mo (100GB), $3/mo (200GB), $10/mo (2TB) | Deep Google ecosystem integration |
Dropbox | Cross-platform, file sharing | 2GB | $12/mo (2TB), $20/mo (3TB) | Excellent sync, file versioning |
Microsoft OneDrive | Windows users, Office integration | 5GB | $2/mo (100GB), $7/mo (1TB with Office) | Office 365 bundle, Windows integration |
iCloud | Apple ecosystem | 5GB | $1/mo (50GB), $3/mo (200GB), $10/mo (2TB) | Seamless Apple device integration |
Backblaze B2 | Technical users, high-volume storage | – | $0.005/GB/mo (storage), $0.01/GB (download) | Very cost-effective for large data |
Amazon S3 | Developers, enterprise | – | $0.023/GB/mo (standard), tiered pricing | Extremely durable, multiple storage classes |
Wasabi | Cost-conscious businesses | – | $0.0059/GB/mo (flat rate) | No egress fees, competitive pricing |
Specialized Backup Services
Service | Best For | Features | Cost |
---|---|---|---|
Backblaze Personal | Individual computer backup | Unlimited storage, file versioning (30 days), external drive support | $7/mo per computer |
IDrive | Multiple device backup | Multiple computers/devices, disk image backup | $80/year (5TB), $100/year (10TB) |
Carbonite | Simple automated backup | Automatic file selection, unlimited storage | $84/year (basic), $120/year (Plus) |
CrashPlan for Small Business | Small business, remote workers | Unlimited retention, continuous backup | $10/mo per computer |
Acronis True Image | Full system backup, security | Disk imaging, ransomware protection, mobile backup | $50/year (1 computer), $90/year (3 computers) |
Backup Strategies by Data Type
Personal Files & Documents
- Recommended Strategy: Automated cloud backup + local external drive
- Backup Frequency: Daily cloud backup, weekly local backup
- Retention Policy: Keep 3-6 months of versions, yearly archives
- Key Tools:
- Cloud sync service (Dropbox, Google Drive)
- Automated backup software (Time Machine, Windows Backup)
- External drive for local copies
Implementation Steps:
- Organize files into clear folder structure
- Set up automatic sync to cloud storage
- Configure scheduled local backups
- Test recovery periodically
Photos & Videos
- Recommended Strategy: Primary cloud + secondary cloud + local storage
- Backup Frequency: Automatic upload for new media, monthly local backup
- Retention Policy: Indefinite (these are typically irreplaceable)
- Key Tools:
- Primary cloud storage (Google Photos, iCloud Photos)
- Secondary service (Amazon Photos, Flickr)
- External hard drive or NAS
Implementation Steps:
- Enable automatic upload on mobile devices
- Organize into albums/collections
- Use a dedicated photo backup service with original quality
- Maintain local master archive on external drive/NAS
- Consider archival-grade storage for heirloom photos
Critical Business Data
- Recommended Strategy: Hybrid (local + cloud + offsite)
- Backup Frequency: Continuous or hourly for working files, daily full backups
- Retention Policy: Daily backups for 1 month, weekly for 3 months, monthly for 1 year
- Key Tools:
- Business backup solution (Veeam, Acronis, Datto)
- NAS or server for local storage
- Enterprise cloud backup
- Offsite rotation
Implementation Steps:
- Identify all business-critical data sources
- Implement automated backup schedule
- Set up monitoring and alerting for backup failures
- Document and test disaster recovery procedures quarterly
- Maintain encrypted offsite copies
Database Backups
- Recommended Strategy: Transaction log + scheduled dumps + offsite
- Backup Frequency: Transaction logs (continuous), full dumps (daily)
- Retention Policy: Transaction logs for 7-14 days, full dumps for 30+ days
- Key Tools:
- Native database backup tools (MySQL, PostgreSQL, SQL Server)
- Database-aware backup solutions
- Storage with fast restore capability
Implementation Steps:
- Configure transaction log backups
- Schedule full database dumps
- Test restore process regularly
- Validate backup integrity
- Secure backups with encryption
- Document specific recovery procedures
Email Backups
- Recommended Strategy: Service-level + local archives
- Backup Frequency: Monthly local archives, rely on service provider for daily
- Retention Policy: Based on compliance requirements and business needs
- Key Tools:
- Email client export tools
- Email backup services (Backupify, MailStore)
- Archive storage
Implementation Steps:
- Check provider’s backup policy
- Export regular local archives
- Consider dedicated email archiving service for compliance
- Test restore procedures
Code & Development Projects
- Recommended Strategy: Version control + cloud backup
- Backup Frequency: Continuous (commit frequently)
- Retention Policy: Keep full history
- Key Tools:
- Git repositories (GitHub, GitLab, Bitbucket)
- Secondary backup of repositories
Implementation Steps:
- Use distributed version control
- Maintain local and remote repositories
- Implement automated backup of repositories
- Document development environment setup
Backup Implementation Guide
Setting Up Automated Backups
Windows
Windows Backup (Built-in)
1. Open Settings > Update & Security > Backup
2. Connect external drive
3. Click "Add a drive" to select your backup drive
4. Click "More options" to configure folders, schedule, and retention
Third-Party Tools
- Macrium Reflect: Full system image backup
- EaseUS Todo Backup: User-friendly interface with scheduling
- Veeam Agent for Windows: Enterprise-grade for free personal use
macOS
Time Machine (Built-in)
1. Connect external drive
2. When prompted, select "Use as Backup Disk"
3. Or: Open System Preferences > Time Machine
4. Click "Select Backup Disk"
5. Choose your drive and "Use Disk"
Third-Party Tools
- Carbon Copy Cloner: Bootable backups and scheduling
- ChronoSync: Advanced sync and backup
- SuperDuper: Simple cloning utility
Linux
Rsync (Command Line)
# Basic backup of home directory to external drive
rsync -av --delete ~/Documents /media/external/backup/
# Automated with cron (add to crontab with crontab -e)
0 2 * * * rsync -av --delete ~/Documents /media/external/backup/
Third-Party Tools
- Déjà Dup: Simple GUI with encryption and scheduling
- Timeshift: System restore functionality
- Borg Backup: Deduplicating backup program
Backup Verification & Testing
- Regular Verification: Schedule monthly verification of backup integrity
- Test Restores: Quarterly test restore of random files to verify recoverability
- Disaster Recovery Test: Bi-annual simulation of complete system recovery
- Documentation: Maintain written recovery procedures
Verification Checklist:
- Can you access your backup media/service?
- Are the expected files present?
- Can you successfully restore files?
- Is your automated backup running on schedule?
- Are you receiving notifications of backup success/failure?
Special Backup Scenarios
Mobile Device Backup
Device Type | Built-in Option | Third-Party Options | Best Practices |
---|---|---|---|
iOS | iCloud Backup | Google Photos, Dropbox | Enable automatic iCloud backup, export important data periodically |
Android | Google Backup | Samsung Cloud, Third-party apps | Check manufacturer backup options, use Google Photos for media |
Both | – | 3-2-1 Strategy for important mobile data | Regularly export contacts, messages, and important data |
Implementation Steps:
- Enable automatic cloud backup
- Verify what’s included in default backup
- Use specialized apps for data not covered
- Periodically check backup status
Virtual Machine Backups
- Full VM Backup: Capture entire VM image
- Agent-Based: Install backup software within guest OS
- Snapshot-Based: Use hypervisor snapshots plus replication
- Recommended Tools:
- VMware: vSphere Data Protection
- Hyper-V: Windows Server Backup
- Cross-platform: Veeam Backup & Replication
- Lightweight: XSIBackup, Proxmox Backup Server
Best Practices:
- Ensure application consistency
- Consider RPO (Recovery Point Objective) and RTO (Recovery Time Objective)
- Test VM restore regularly
- Document specific recovery procedures
Ransomware Protection
- Air-Gapped Backup: Physically disconnected from network
- Immutable Storage: Write-once-read-many protection
- Version History: Multiple versions to roll back to pre-attack state
- Recommended Tools:
- Backups with versioning (Veeam, Acronis)
- Offline storage rotation
- Cloud services with ransomware protection
Implementation Steps:
- Maintain offline backup copies
- Use backup systems with immutable storage
- Implement least-privilege access to backups
- Test recovery from simulated ransomware scenario
Remote/Distributed Team Backups
- Centralized Strategy: Cloud-based backup infrastructure
- Endpoint Protection: Backup software on all devices
- Policy Enforcement: Automated compliance monitoring
- Recommended Tools:
- CrashPlan for Small Business
- Backblaze Business
- Druva inSync
- Code42
Implementation Steps:
- Create clear backup policies
- Deploy endpoint backup agents
- Set up centralized monitoring
- Train team members on backup procedures
- Implement verification and auditing
Backup Security & Best Practices
Security Considerations
Encryption: Always encrypt sensitive backups
- In-transit: TLS/SSL connections
- At-rest: AES-256 encryption
- Consider: Hardware-based encryption
Access Control:
- Least privilege principle
- Multi-factor authentication for backup systems
- Regular access review
Physical Security:
- Secure storage of physical media
- Environmental controls (temperature, humidity)
- Offsite storage in secure facility
Backup Performance Optimization
Backup Window Management:
- Schedule during off-hours
- Use incremental/differential approaches
- Consider backup impact on production systems
Network Considerations:
- Dedicated backup network when possible
- Bandwidth throttling options
- WAN acceleration for remote backups
Storage Efficiency:
- Deduplication: Eliminate redundant data
- Compression: Reduce storage requirements
- Synthetic fulls: Rebuild full backups from incrementals
Disaster Recovery Planning
Recovery Time Objectives (RTO)
Define maximum acceptable downtime for different systems:
Criticality | Example System | Target RTO | Strategy |
---|---|---|---|
Critical | E-commerce website | < 1 hour | Hot standby, automated failover |
High | CRM system | < 4 hours | Warm standby, rapid restore |
Medium | Internal tools | < 24 hours | Standard backup restoration |
Low | Historical records | < 1 week | Archive retrieval, manual restore |
Recovery Point Objectives (RPO)
Define acceptable data loss in terms of time:
Criticality | Example System | Target RPO | Strategy |
---|---|---|---|
Critical | Financial database | < 15 minutes | Transaction log shipping, continuous backup |
High | Order processing | < 1 hour | Frequent incremental backups |
Medium | < 24 hours | Daily backups | |
Low | Reference documents | < 1 week | Weekly backups |
Disaster Recovery Documentation
Create and maintain:
- System Inventory: Complete list of all systems and dependencies
- Recovery Procedures: Step-by-step instructions for each system
- Contact Information: Team members, vendors, service providers
- Recovery Priorities: Order of system restoration
- Testing Schedule: Regular DR tests and results
Common Backup Challenges and Solutions
Challenge | Symptoms | Solutions |
---|---|---|
Backup Failure | Failed jobs, error messages | Monitor backup jobs, set up alerts, test restoration periodically |
Growing Data Volume | Increasing backup times, storage costs | Implement deduplication, adjust retention policies, consider tiered storage |
Bandwidth Limitations | Slow backups, network congestion | Schedule during off-hours, use incremental backups, implement WAN optimization |
Restoration Complexity | Difficult or slow recoveries | Document recovery procedures, regular testing, simplified recovery tools |
Legacy System Backup | Incompatibility with modern tools | Use system-specific tools, consider P2V conversion, specialized vendors |
Cloud Cost Management | Unpredictable or high costs | Implement lifecycle policies, use appropriate storage tiers, monitor usage |
Security Concerns | Unauthorized access risk | Implement encryption, access controls, and audit trails |
Backup Maintenance Schedule
Timeframe | Task | Description |
---|---|---|
Daily | Review backup reports | Check for failures or warnings in automated backups |
Weekly | Verify recent backups | Spot-check accessibility of recent backup files |
Monthly | Test file restoration | Restore sample files from backups to verify integrity |
Quarterly | Full restoration test | Complete restore test of critical systems |
Bi-annually | Review backup strategy | Assess if current approach meets business needs |
Annually | Disaster recovery drill | Simulate major outage and perform recovery |
As needed | Update documentation | Keep procedures current with system changes |
Resources for Further Learning
Books and Publications
- “Backup & Recovery: Inexpensive Backup Solutions for Open Systems” by W. Curtis Preston
- “Data Protection: Ensuring Data Availability” by Preston de Guise
- “IT Disaster Recovery Planning For Dummies” by Peter Gregory
Online Resources
- Backblaze Blog – Extensive articles on backup best practices
- r/DataHoarder – Community of data preservation enthusiasts
- StorageReview – Storage technology reviews and best practices
- Veeam Resource Library – Whitepapers and guides
Training and Certification
- CompTIA Storage+
- Certified Information Systems Security Professional (CISSP)
- Vendor-specific certifications (Veeam, Veritas, Commvault)
Tools and Utilities
- Duplicati – Free backup software with encryption
- Rclone – Command line program to sync files with cloud storage
- Restic – Fast, secure, efficient backup program
- BorgBackup – Deduplicating archiver with compression and encryption