{"id":15572,"date":"2020-05-17T07:59:28","date_gmt":"2020-05-17T07:59:28","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=15572"},"modified":"2020-05-19T13:36:34","modified_gmt":"2020-05-19T13:36:34","slug":"backup-remote-work-from-home-machine-wfh","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh","title":{"rendered":"When do you need to back up a remote work-from-home machine, and when is it a waste of time?"},"content":{"rendered":"\n<p>Now that millions of people are working from home, the way we manage cyber-resilience has changed. In our previous article, we covered why work-from-home (WFH) environments are more vulnerable than office environments. Now we explore the next question \u2013 does it matter, and should I back up?<\/p>\n\n\n\n<p>In many situations, it\u2019s now important to back up employee work-from-home machines when previously \u2013 sometimes even more so than backing up desktops in the office! But at other times, backing up a work-from-home machine is unnecessary.<\/p>\n\n\n\n<p>It\u2019s easy to determine whether to back up the work-from-home machines of your remote workers. This article explains how best to decide.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The two <strong>key questions<\/strong><\/h2>\n\n\n\n<p>As with the choice of backing up <em>anything<\/em>, the key decision comes down to what the consequences are if a machine or device is permanently destroyed.<\/p>\n\n\n\n<p>In a business environment, it usually comes down to:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>System downtime<\/strong> that causes loss of worker productivity \u2013 by not having a computer to work on, and <\/li><li><strong>Data loss<\/strong> that causes business problems \u2013 wasted time, loss of reputation or legal non-compliance.<\/li><\/ol>\n\n\n\n<p>Ask yourself these two key questions, and you\u2019ll know if you need to back up your WFH computers.<\/p>\n\n\n\n<p style=\"background-color:#2a3439\" class=\"has-text-color has-background has-very-light-gray-color\"><strong>Question 1: if a WFH worker\u2019s machine gets destroyed, how long will it take to get the worker running again with a new machine?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Answer 1: it\u2019s quick \u2013 pick up a new machine, and get running again in under an hour<\/li><li>Answer 2: it will take hours or days \u2013 downloading and installing software, reconfiguring the system<\/li><\/ul>\n\n\n\n<p style=\"background-color:#2a3439\" class=\"has-text-color has-background has-very-light-gray-color\"><strong>Question 2: if a WFH worker\u2019s machine gets destroyed, will any important data be lost?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Answer 1: no important data is lost, because data is never solely stored on the machine in the first place<\/li><li>Answer 2: data is lost \u2013 which then has to be recreated (costing time or money), or causes business problems like loss of reputation or breach of legal compliance with data handling laws<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Common <strong>scenarios<\/strong> where these happen<\/h2>\n\n\n\n<p>Now it\u2019s time to dig deeper. Let\u2019s look at the 4 combinations of answers to these questions, and the usage scenarios that you typically see.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>What would happen if a WFH computer is destroyed?<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\">\n <table style=\"font-size:11pt;line-height:14pt;border:none;\">\n  <tbody>\n   <tr>\n    <td style=\"width:16%;border:none;\"><\/td>\n    <td style=\"width:42%;text-align:center;background:#008ECE;color:white;border:none;\"><b>System downtime is low<\/b><\/td>\n    <td style=\"width:42%;text-align:center;background:#EA0043;border:none;color:white;\"><b>System downtime is high<\/b><\/td>\n   <\/tr>\n   <tr>\n    <td style=\"border:none;background:#008ECE;color:white;\"><b>No data is lost<\/b><\/td>\n    <td style=\"vertical-align:top;border:none;background:#D0EDF7;\">\n     The machine is only a thin client, used to access other machines.<br>&nbsp;<br>Common when machines are used to remote desktop into actual workstations, and all work is done on those machines. Or when the machine is used only as a web browser, and all work is done online (such as SharePoint, Google Docs, online CRM, etc.)<br>&nbsp;<br>In these situations, the worker should be able to pick up a spare computer and get running again in under an hour.<br>&nbsp;<br><strong>No backup needed.<\/strong>\n    <\/td>\n    <td style=\"vertical-align:top;border:none;background:#F9F0EF;\">The machine has custom applications and configurations, so a rebuild would take hours. But data is stored directly in the cloud or is replicated via a cloud sync.<br>&nbsp;<br>The data needs to be redownloaded.<br>&nbsp;<br>Common if all user data is synced to the cloud \u2013 for example, the user\u2019s documents are synced using the OneDrive app.<br><br><strong>Backup is recommended.<\/strong>\n    <\/td>\n   <\/tr>\n   <tr>\n    <td style=\"border:none;background:#EA0043;color:white;\"><b>Data is lost<\/b><\/td>\n    <td style=\"border:none;background:#F9F0EF;\">The machine has only standard applications and few configurations. However, data is stored locally and can be lost if the machine is destroyed.<br>&nbsp;<br>Alternatively, if a cloud sync app is used, data can be lost if there is a cyber crime breach \u2013 for example, ransomware on the local machine (so corrupted data gets synced to the cloud), or hacking the cloud account (so corrupted data gets synced back to the WFH machine).<br>&nbsp;<br><strong>Backup is recommended.<\/strong>\n    <\/td>\n    <td style=\"vertical-align:top;border:none;background:#F4E6E6;\">The machine has custom applications and configurations, so a rebuild would take hours. Additionally, data is stored locally and can be irretrievable if the machine is destroyed.<br>&nbsp;<br>Alternatively, if a cloud sync app is used, data can be lost if there is a cyber crime breach (see explanation on the left).<br>&nbsp;<br><strong>Backup is recommended.<\/strong>\n    <\/td>\n   <\/tr>\n  <\/tbody>\n <\/table>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">The hidden <strong>gotchas<\/strong><\/h2>\n\n\n\n<p>So far, you\u2019re probably following this article and thinking that everything makes sense. Now it\u2019s time for the hidden gotchas.<\/p>\n\n\n\n<p>When deciding whether you need a WFH backup strategy, there are three commonly overlooked factors that can affect your decision:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Cloud sync will sync corruptions and deletions<\/li><li>Factor in the time for ordering new hardware<\/li><li>Recordkeeping requirements<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Gotcha 1<\/strong>: cloud sync will sync corruptions and deletions, including ransomware and hacking attacks<\/h3>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-2-gotcha-1.png\" alt=\"\" class=\"wp-image-15626\" width=\"626\" height=\"236\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-2-gotcha-1.png 1007w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-2-gotcha-1-300x113.png 300w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-2-gotcha-1-768x290.png 768w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/figure><\/div>\n\n\n\n<p>If you are relying on cloud sync to take local work offsite,&nbsp; it\u2019s important to understand the potential problems with cloud sync.<\/p>\n\n\n\n<p>Although features can vary depending on the specific sync program, in general, a sync is a near real-time copy of data between two points \u2013 such as between a WFH computer and the cloud. This can cause problems if there is a security breach:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li><strong>Ransomware breach<\/strong> \u2013 if ransomware hits a WFH computer, and encrypts files, then these encrypted files will be synced to the cloud. Worse still, if other workers sync to the same cloud (like a shared drive or site), then the ransomwared files will be synced to other peoples\u2019 computers too! It only takes one breach to potentially corrupt everyone\u2019s copies of data.<\/li><li><strong>Hacking breach<\/strong> \u2013 along similar lines, if the cloud account is compromised by hacking, data can be corrupted or deleted \u2013 with these actions propagating to all synced WFH computers.<\/li><\/ol>\n\n\n\n<p>This can be mitigated by backing up the WFH computers, or the cloud service.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Gotcha 2<\/strong>: factor in the time to order new hardware<\/h3>\n\n\n\n<p>Should an employee need a new machine to work on, and doesn\u2019t have a spare machine, then a machine will need to be shipped to that employee.<\/p>\n\n\n\n<p>This takes time and costs money. The policy and procedure for this should be thought out in advance, so when this happens, a plan is ready to be executed.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Gotcha 3<\/strong>: recordkeeping requirements<\/h3>\n\n\n\n<p>You may be in an industry where legally, records of data must be kept to comply with governing regulations. Or, it might be a business decision to keep all generated data \u2013 such as to prove ownership of Intellectual Property.<\/p>\n\n\n\n<p>In these situations, backup is not just for recovery and cyber-resilience; it\u2019s for recordkeeping as well.<\/p>\n\n\n\n<p>We recommend that file backups be done to the cloud for this purpose, enabling the company to have a record of data stored on a company account.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The next steps in a Work From Home (WFH) <strong>backup strategy<\/strong><\/h2>\n\n\n\n<p>If you\u2019ve decided that your business will benefit from a work-from-home backup strategy, then the next step is to understand the issues with WFH backup \u2013 the subject of my next blog \u201cthe technological and legal implications of WFH and backups\u201d.<\/p>\n\n\n\n<p>And BackupAssist offers a WFH backup product \u2013 predictably called BackupAssist WFH.<\/p>\n\n\n\n<p>You can learn more about BackupAssist WFH by visiting the BackupAssist WFH home page, or by contacting our Client Success team using the buttons below.<\/p>\n\n\n\n<p>In the meantime, I wish you and your loved ones good health and resilience during these challenging times. And don\u2019t forget to share this article if you liked it!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Now that millions of people are working from home, the way we manage cyber-resilience has changed. In our previous article, we covered why work-from-home (WFH) environments are more vulnerable than office environments. Now we explore the next question \u2013 does it matter, and should I back up?<\/p>\n","protected":false},"author":17,"featured_media":15940,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[766,757],"tags":[],"class_list":["post-15572","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-backupassist-wfh","category-cyber-resilience"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>When do you need to back up a remote work-from-home machine, and when is it a waste of time? - Cyber Resilience Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When do you need to back up a remote work-from-home machine, and when is it a waste of time? - Cyber Resilience Blog\" \/>\n<meta property=\"og:description\" content=\"Now that millions of people are working from home, the way we manage cyber-resilience has changed. In our previous article, we covered why work-from-home (WFH) environments are more vulnerable than office environments. Now we explore the next question \u2013 does it matter, and should I back up?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-17T07:59:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-19T13:36:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"844\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Linus Chang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linus Chang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh\"},\"author\":{\"name\":\"Linus Chang\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be\"},\"headline\":\"When do you need to back up a remote work-from-home machine, and when is it a waste of time?\",\"datePublished\":\"2020-05-17T07:59:28+00:00\",\"dateModified\":\"2020-05-19T13:36:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh\"},\"wordCount\":1183,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-2.jpg\",\"articleSection\":[\"BackupAssist WFH\",\"Cyber Resilience\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh\",\"url\":\"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh\",\"name\":\"When do you need to back up a remote work-from-home machine, and when is it a waste of time? - Cyber Resilience Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-2.jpg\",\"datePublished\":\"2020-05-17T07:59:28+00:00\",\"dateModified\":\"2020-05-19T13:36:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-2.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-2.jpg\",\"width\":1500,\"height\":844},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"When do you need to back up a remote work-from-home machine, and when is it a waste of time?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be\",\"name\":\"Linus Chang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g\",\"caption\":\"Linus Chang\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/nithiyananda-soosai\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"When do you need to back up a remote work-from-home machine, and when is it a waste of time? - Cyber Resilience Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh","og_locale":"en_US","og_type":"article","og_title":"When do you need to back up a remote work-from-home machine, and when is it a waste of time? - Cyber Resilience Blog","og_description":"Now that millions of people are working from home, the way we manage cyber-resilience has changed. In our previous article, we covered why work-from-home (WFH) environments are more vulnerable than office environments. Now we explore the next question \u2013 does it matter, and should I back up?","og_url":"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh","og_site_name":"Cyber Resilience Blog","article_published_time":"2020-05-17T07:59:28+00:00","article_modified_time":"2020-05-19T13:36:34+00:00","og_image":[{"width":1500,"height":844,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-2.jpg","type":"image\/jpeg"}],"author":"Linus Chang","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Linus Chang","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh"},"author":{"name":"Linus Chang","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be"},"headline":"When do you need to back up a remote work-from-home machine, and when is it a waste of time?","datePublished":"2020-05-17T07:59:28+00:00","dateModified":"2020-05-19T13:36:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh"},"wordCount":1183,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-2.jpg","articleSection":["BackupAssist WFH","Cyber Resilience"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh","url":"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh","name":"When do you need to back up a remote work-from-home machine, and when is it a waste of time? - Cyber Resilience Blog","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-2.jpg","datePublished":"2020-05-17T07:59:28+00:00","dateModified":"2020-05-19T13:36:34+00:00","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-2.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2020\/05\/wfh-2.jpg","width":1500,"height":844},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/backup-remote-work-from-home-machine-wfh#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"When do you need to back up a remote work-from-home machine, and when is it a waste of time?"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be","name":"Linus Chang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g","caption":"Linus Chang"},"url":"https:\/\/www.backupassist.com\/blog\/author\/nithiyananda-soosai"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/15572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=15572"}],"version-history":[{"count":54,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/15572\/revisions"}],"predecessor-version":[{"id":15629,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/15572\/revisions\/15629"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/15940"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=15572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=15572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=15572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}