How does granular recovery work and what do you need to know about it

In the modern office environment, every person working on projects generates huge amounts of data. Emails, datasheets, presentations, databases, documents, and many many more. Protecting this information is very important from the business standpoint, so usually, organizations tend to use backups as the mean of protecting their data. But backup is only one part of the equation. What would you do if somehow you lose that data? Well, you probably want to quickly and easily recover it. Then you should think about setting up a granular recovery (alt. granular restore) plan which is also the main topic of this article. 

Read more

Backup vs. data archive – what’s the difference?

Data backup and data archive are two terms that come with the topic of protection of business data. On the surface, it might seem that they are similar, but in fact, nothing could be further from the truth. They are used for very different purposes, and you must understand the differences between them. In this article, we will take a closer look at where the data archive shines, when is a time for backup, and what are the differences between them.

Read more

Microsoft Office 365 backup best practices

Microsoft is a global software giant. It provides the software many companies use daily. Their main priority is to keep the continuity of the provided services. But despite that, there is still a possibility of data loss, due to countless reasons. That’s one of the causes you might consider protecting your data in Office 365, and one of the best ways to make sure your data is secure is to perform an Office 365 backup. In this article, we will talk about a few of the best practices when it comes to it.

Read more

AES encryption 101 – why you should use encrypted backup

For many, encryption is a golden standard in data protection and the best way to ensure a high level of security in professional backup solutions. Could encryption be used as a mitigation mechanism against data breach events too? Yes. AES encryption is truly one of the most effective tools in the security professional’s arsenal. In this article, we will touch upon a variety of fundamental topics in data encryption. And if you prefer a more practical approach there is also an in-depth presentation of how Xopero ONE allows to encrypt [and protect] backed up data.

Read more

Data compression – why should you compress your backups?

With the growing number of data created by the Business every day (week or month) some easy ways to shrink the size of backups would help to improve data storage management. If only… But there is a quite smart solution for this problem. And in this article, we will talk about it. As you probably guessed our today’s topic is backup compression, and how it helps create a better backup strategy.

Read more

Grandfather-Father-Son backup – how does the GFS backup scheme work?

In the world of cybersecurity, we have a few problems that need to be solved. One of them is consistent data protection, where the backup has/plays a special role. There is this unattainable dream to keep all of your backup copies forever. Unfortunately for many organizations, such a task would be simply impossible to execute. Keeping backups requires storage space, which runs out quite quickly. 

Read more