3-2-1 Backup Method

14th January 2020 | Cybrary 3-2-1 Backup Method
3-2-1 backup method

The 3-2-1 Backup Method refers to the “3-2-1 Rule” when backing up information from your computer. This is how security professionals recommend you backup your data:

  • 3 copies of our data should be kept (one primary, two backups)
  • The files are saved on 2 types of media
  • 1 copy is stored off-site (this can be online)

It may seem excessive to store three copies of data, but it is very plausible that hardware or software fails you, leaving your data and information lost in cyberspace. 

What Does This Mean For My SMB?

SMBs are most certainly are at risk to everyday hackers. Hackers breach Small to Medium Sized businesses 15x more often than larger firms. Hackers know this and target you because of it. SMB’s generally lack resources to properly secure systems, fail to train employees on cybersecurity hygiene, and sometimes lack proper security tools.

For these reasons, CyberHoot recommends all SMB’s take these actions in addition to the 3-2-1 method:

Train employees on how to spot and delete phishing emails. Here’s a free video to help with this: How to Protect Yourself from Phishing Attacks.

  • Train employees on how to use strong passphrases instead of passwords.
  • Test employees with Phishing tests. CyberHoot includes this in our services.
  • Implement basic cybersecurity technical best practices including:
  • Update/patch all devices and software whenever possible to ensure vulnerabilities are fixed.
  • Establish risk management at your SMB by having a risk assessment performed at least once on your business.

Taking these proactive measures can reduce your risk of a costly breach, downtime, brand damage, and a cyber insurance claim (or all four).

To learn more about the 3-2-1 Backup Method, watch this short video:

https://www.youtube.com/watch?v=rFO6NyLIP7M&feature=emb_logo
Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...

Read more
Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more
Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Ever had your phone suddenly lose service for no reason, followed by a flood of “reset your password”...

Read more