{"id":5621,"date":"2015-09-23T14:05:52","date_gmt":"2015-09-23T14:05:52","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=5621"},"modified":"2019-11-07T05:23:16","modified_gmt":"2019-11-07T05:23:16","slug":"how-to-plan-a-watertight-backup-strategy","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy","title":{"rendered":"How to plan a watertight backup strategy"},"content":{"rendered":"<p><a href=\"https:\/\/www.backupassist.com\/blog\/guides\/how-to-plan-a-watertight-backup-strategy\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5622 size-full\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/backup-strategy.jpg\" alt=\"how to plan a watertight backup strategy\" width=\"640\" height=\"250\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/backup-strategy.jpg 640w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/backup-strategy-300x117.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/www.backupassist.com\/backupassist.html\">Server backup and recovery<\/a>&nbsp;isn&#8217;t something you can just wing. Sorry to be the bearer of bad news. A solid backup strategy&nbsp;requires&nbsp;<em>a lot<\/em>&nbsp;of foresight and planning &#8211; after all,&nbsp;there&#8217;s a serious potential that if disaster strikes, it could&nbsp;cripple&nbsp;your&nbsp;business if&nbsp;vital systems and data aren&#8217;t recoverable.<\/p>\n<p>If you&#8217;re just starting out planning your company&#8217;s server&nbsp;<a href=\"https:\/\/www.backupassist.com\/blog\/support\/six-best-practice-backup-tips\/\">backup strategy<\/a>, you may feel a little overwhelmed. So in this article, we&#8217;re going to take a look at some core considerations you need to take into account. We won&#8217;t cover everything, because every environment will be different and to do so would require a full-length text book, but we&#8217;ll give you a good starting point.<\/p>\n<p><!--more-->And don&#8217;t forget, our&nbsp;<a href=\"https:\/\/www.backupassist.com\/education\/resources\/backup_scenarios_guide.html\">backup scenarios<\/a>&nbsp;guide is a great resource for further considerations we may not get to cover&nbsp;in this article.<\/p>\n<h2 style=\"text-align: left\">Determine Recovery Time and Recovery Point Objectives<\/h2>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5623\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/darts-856367_640.jpg\" alt=\"backup strategy - determine rto\/rpo\" width=\"450\" height=\"250\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/darts-856367_640.jpg 450w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/darts-856367_640-300x167.jpg 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/p>\n<p>Before you start planning a backup strategy, you&#8217;re going to want to know what your goals are. Think of it this way: would you start planning a vacation before knowing where you&#8217;re going?<\/p>\n<p>When it comes to backup and&nbsp;<a href=\"https:\/\/www.backupassist.com\/backupassist\/features\/disasterrecovery.html\">disaster recovery<\/a>, knowing your goals means knowing Recovery Time Objectives and Recovery Point Objectives (RTO\/RPO). In the shortest possible terms, this basically means: how quickly do you need systems and data back online, and how much can you afford to lose?<\/p>\n<p>Figuring out your company&#8217;s RTO\/RPO requirements&nbsp;is no simple task. It&#8217;s going to differ for each and every business, and there are a lot of different variables you&#8217;ll need to&nbsp;factor in. As a good starting point, we would recommend reading this previous article we published on&nbsp;<a href=\"https:\/\/www.backupassist.com\/blog\/guides\/calculating-rto-rpo-make-bulletproof-business\/\">how to calculate RTO and RPO<\/a>.<\/p>\n<h2 style=\"text-align: left\">Choose your storage destination\/s<\/h2>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5624\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/hard-drive-592204_640.jpg\" alt=\"backup strategy - choose your storage destination\" width=\"450\" height=\"250\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/hard-drive-592204_640.jpg 450w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/hard-drive-592204_640-300x167.jpg 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/p>\n<p>Once you&#8217;ve worked out our RTOs and RPOs, another important element of your strategy is to decide your&nbsp;<a href=\"https:\/\/www.backupassist.com\/backupassist\/features\/supportedhardware.html\">storage devices&nbsp;for backups<\/a>. The storage destination that will best suit your business is going to depend on a lot of different factors. &nbsp;There are a multitude of different options for storage destinations &#8211; HDD, SSD, RDX, cloud, tape, Blu-Ray&#8230; the list goes on.<\/p>\n<p>When weighing up storage destinations, it essentially boils down to looking at 3 core criteria, and weighing the pros and cons of each against what your business needs to meet its RTOs and RPOs. &nbsp;These 3 criteria are:<\/p>\n<ul>\n<li>Cost-effectiveness per GB of data<\/li>\n<li>Durability and required maintenance of the device<\/li>\n<li>Speed and ease of recovery when using each device.<\/li>\n<\/ul>\n<p>As an example, we&#8217;ll look at hard drives, which are one of the more common devices used for backup storage.&nbsp;Hard drives are fairly cost-effective for smaller data sets and allow for fast recovery times; however, they become less cost-effective if you have large amounts of data, they tend to wear out within a few years, and they&#8217;re vulnerable to becoming damaged through jostling when moving them offsite.<\/p>\n<p>It&#8217;s also worth noting that when covering the 3-2-1 rule of backups&nbsp;(we&#8217;ll discuss that some more in the next section), you&#8217;ll want to ensure you have at least 2 different types of backup destination included in your strategy, with 1&nbsp;being offsite.<\/p>\n<h2 style=\"text-align: left\">Plan your backup schedule\/rotation<\/h2>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5625\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/memory-870713_640.jpg\" alt=\"backup strategy - decide your rotation\" width=\"450\" height=\"250\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/memory-870713_640.jpg 450w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/memory-870713_640-300x167.jpg 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/p>\n<p>This is where we get into some serious&nbsp;strategizing, because the&nbsp;<a href=\"https:\/\/www.backupassist.com\/blog\/support\/scheduling-backups-part-2\/\">backup schedule<\/a>&nbsp;(also known as your rotation) is the serious nuts and bolts of your overall backup strategy.<\/p>\n<p>As with most elements of backup strategy, an effective schedule for your business is going to be influenced by a number of different variables that are unique to each and every organization. &nbsp;However, the broad rule of thumb is always going to come back to the&nbsp;<a href=\"https:\/\/www.backupassist.com\/blog\/news\/3-2-1-rule-of-backup-happy-world-backup-day\/\">3-2-1 rule of backups<\/a>:&nbsp;3 backups of all important data, stored on at least 2 different storage destinations, with at least 1 of those destinations offsite.<\/p>\n<p>One example of how you can achieve this is with a Grandfather-Father-Son schedule, explained in the below graphic:<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/backup-scheme1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5631 size-full\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/backup-scheme1.png\" alt=\"Grandfather Father Son Backup Schedule - backup strategy\" width=\"691\" height=\"675\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/backup-scheme1.png 691w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/backup-scheme1-300x293.png 300w\" sizes=\"auto, (max-width: 691px) 100vw, 691px\" \/><\/a><\/p>\n<p>Grandfather refers to your monthly backups, father is your weeklies, and the son is your daily backup. &nbsp;As you can see from the diagram, it&#8217;s very easy to make this type of schedule compliant with the 3-2-1 rule simply by ensuring that you have at least 2 different media in the rotation and that your weekly and\/or monthly backups are stored offsite.<\/p>\n<p>Of course, this is only one of many different schedules that it&#8217;s possible to incorporate into your backup strategy. &nbsp;For more information on scheduling,&nbsp;<a href=\"https:\/\/www.backupassist.com\/blog\/support\/scheduling-backups-the-long-and-the-short-of-it\/\">check out this article<\/a>.<\/p>\n<h2 style=\"text-align: left\">A backup strategy is only as&nbsp;good as its recoverability<\/h2>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5627\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/server-514641_640.jpg\" alt=\"backup strategy - recoverability\" width=\"450\" height=\"250\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/server-514641_640.jpg 450w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/server-514641_640-300x167.jpg 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/p>\n<p style=\"text-align: left\">At the end of the day, a backup is useless if it can&#8217;t be recovered. That&#8217;s why no best-practice strategy is complete if it hasn&#8217;t considered&nbsp;how the systems and data will be recovered. It&#8217;s also important to test your backups regularly to ensure they are recoverable, and to be sure that your first time running through your recovery procedures won&#8217;t be with the added stress of a real-life disaster scenario.<\/p>\n<p>Here are just some of the key questions you&#8217;ll need to ask yourself when <a href=\"https:\/\/www.backupassist.com\/blog\/news\/creating-a-disaster-recovery-plan\/\" target=\"_blank\" rel=\"noopener noreferrer\">planning a recovery<\/a>:<\/p>\n<ul>\n<li>What will I need to do to meet my RTOs and RPOs?<\/li>\n<li>What happens if my primary backup fails, or if my onsite backups are lost along with my infrastructure?<\/li>\n<li>How quickly can I get the offsites back onsite?<\/li>\n<li>Who will be responsible for performing the recovery, and what if that person is unavailable?<\/li>\n<\/ul>\n<p>Properly planning for a recovery is simply too big a topic to fit into this article. Luckily, we&#8217;ve spoken numerous times before on the subject! Here&#8217;s some further reading:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.backupassist.com\/blog\/support\/planning-for-a-recovery\/\" target=\"_blank\" rel=\"noopener noreferrer\">Recovery planning the basics<\/a><\/li>\n<li><a href=\"https:\/\/www.backupassist.com\/blog\/guides\/4-simple-steps-for-disaster-recovery-planning\/\" target=\"_blank\" rel=\"noopener noreferrer\">4 simple steps for disaster recovery planning<\/a><\/li>\n<li><a href=\"https:\/\/www.backupassist.com\/blog\/news\/backup-and-disaster-recovery-planning-trying-and-testing-your-backups\/\" target=\"_blank\" rel=\"noopener noreferrer\">Trying and testing your backups<\/a><\/li>\n<li><a href=\"https:\/\/www.backupassist.com\/blog\/news\/backup-and-disaster-recovery-planning-making-sure-your-files-restore\/\" target=\"_blank\" rel=\"noopener noreferrer\">Making sure files restore<\/a><\/li>\n<\/ul>\n<p style=\"text-align: center\"><i>What do you think is the most important element of backup strategy?<br \/>\nLeave your thoughts in the comments, tweet <a href=\"https:\/\/twitter.com\/BackupAssist\" target=\"_blank\" rel=\"noopener noreferrer\">@BackupAssist<\/a> or <a href=\"https:\/\/facebook.com\/BackupAssist\" target=\"_blank\" rel=\"noopener noreferrer\">post to facebook<\/a>.<br \/>\nShare this article for better backup best practices everywhere.<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Server backup and recovery&nbsp;isn&#8217;t something you can just wing. Sorry to be the bearer of bad news. A solid backup strategy&nbsp;requires&nbsp;a lot&nbsp;of foresight and planning &#8211; after all,&nbsp;there&#8217;s a serious potential that if disaster strikes, it could&nbsp;cripple&nbsp;your&nbsp;business if&nbsp;vital systems and data aren&#8217;t recoverable. If you&#8217;re just starting out planning your company&#8217;s server&nbsp;backup strategy, you may &#8230; <a title=\"How to plan a watertight backup strategy\" class=\"read-more\" href=\"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy\">Read more <span class=\"screen-reader-text\">How to plan a watertight backup strategy<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":5622,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[95,22,760],"tags":[],"class_list":["post-5621","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guides","category-interest","category-legacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to plan a watertight backup strategy | BackupAssist<\/title>\n<meta name=\"description\" content=\"The key to ensuring your mission-critical systems and data are recoverable is a solid backup strategy. Let&#039;s take a look at some best practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to plan a watertight backup strategy | BackupAssist\" \/>\n<meta property=\"og:description\" content=\"The key to ensuring your mission-critical systems and data are recoverable is a solid backup strategy. Let&#039;s take a look at some best practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-09-23T14:05:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-07T05:23:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/backup-strategy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Luke Parsons\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Luke Parsons\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy\"},\"author\":{\"name\":\"Luke Parsons\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/11c97915d32eff768b2f8739e7d37297\"},\"headline\":\"How to plan a watertight backup strategy\",\"datePublished\":\"2015-09-23T14:05:52+00:00\",\"dateModified\":\"2019-11-07T05:23:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy\"},\"wordCount\":1004,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/backup-strategy.jpg\",\"articleSection\":[\"Guides\",\"Interest\",\"Z-Legacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy\",\"url\":\"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy\",\"name\":\"How to plan a watertight backup strategy | BackupAssist\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/backup-strategy.jpg\",\"datePublished\":\"2015-09-23T14:05:52+00:00\",\"dateModified\":\"2019-11-07T05:23:16+00:00\",\"description\":\"The key to ensuring your mission-critical systems and data are recoverable is a solid backup strategy. Let's take a look at some best practices.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/backup-strategy.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/backup-strategy.jpg\",\"width\":640,\"height\":250,\"caption\":\"how to plan a watertight backup strategy\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to plan a watertight backup strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/11c97915d32eff768b2f8739e7d37297\",\"name\":\"Luke Parsons\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2c6eec44e45e95d0501fd5b72357cc1d12b2b1208d93f8a4e0766c387aee0e2f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2c6eec44e45e95d0501fd5b72357cc1d12b2b1208d93f8a4e0766c387aee0e2f?s=96&d=mm&r=g\",\"caption\":\"Luke Parsons\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/luke-parsons\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to plan a watertight backup strategy | BackupAssist","description":"The key to ensuring your mission-critical systems and data are recoverable is a solid backup strategy. Let's take a look at some best practices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy","og_locale":"en_US","og_type":"article","og_title":"How to plan a watertight backup strategy | BackupAssist","og_description":"The key to ensuring your mission-critical systems and data are recoverable is a solid backup strategy. Let's take a look at some best practices.","og_url":"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy","og_site_name":"Cyber Resilience Blog","article_published_time":"2015-09-23T14:05:52+00:00","article_modified_time":"2019-11-07T05:23:16+00:00","og_image":[{"width":640,"height":250,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/backup-strategy.jpg","type":"image\/jpeg"}],"author":"Luke Parsons","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Luke Parsons","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy"},"author":{"name":"Luke Parsons","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/11c97915d32eff768b2f8739e7d37297"},"headline":"How to plan a watertight backup strategy","datePublished":"2015-09-23T14:05:52+00:00","dateModified":"2019-11-07T05:23:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy"},"wordCount":1004,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/backup-strategy.jpg","articleSection":["Guides","Interest","Z-Legacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy","url":"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy","name":"How to plan a watertight backup strategy | BackupAssist","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/backup-strategy.jpg","datePublished":"2015-09-23T14:05:52+00:00","dateModified":"2019-11-07T05:23:16+00:00","description":"The key to ensuring your mission-critical systems and data are recoverable is a solid backup strategy. Let's take a look at some best practices.","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/backup-strategy.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/09\/backup-strategy.jpg","width":640,"height":250,"caption":"how to plan a watertight backup strategy"},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/how-to-plan-a-watertight-backup-strategy#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"How to plan a watertight backup strategy"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/11c97915d32eff768b2f8739e7d37297","name":"Luke Parsons","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2c6eec44e45e95d0501fd5b72357cc1d12b2b1208d93f8a4e0766c387aee0e2f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2c6eec44e45e95d0501fd5b72357cc1d12b2b1208d93f8a4e0766c387aee0e2f?s=96&d=mm&r=g","caption":"Luke Parsons"},"url":"https:\/\/www.backupassist.com\/blog\/author\/luke-parsons"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/5621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=5621"}],"version-history":[{"count":2,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/5621\/revisions"}],"predecessor-version":[{"id":13250,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/5621\/revisions\/13250"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/5622"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=5621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=5621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=5621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}