My data management plan

It seems that my small business clients face a perfect storm of unimaginable and varied types of losses on a regular basis. I’ve personally suffered floods, thefts, head injury with amnesia, extended power outages, problems with fluctuating voltages, many hard disk failures, two unexplained SSD drive failures, Microsoft unannounced account cancellation, hacking attacks, human error, etc. that have all threatened my data over the years. Part of this risk is directly related to my rural location. Other risks appears to be random but at a higher rate than would normally be expected in a random environment. As a result, I try to consider every possible threat to my digital data.

The current setup

I am a one-person business with one primary notebook PC running Windows 10 with built-in security features at default settings including “Find my Device”. I use a power conditioner to minimize voltage fluctuations. Data is duplicated offsite on OneDrive. Data is occasionally manually saved to a Google drive as a second offline storage.

I’ve stored a Windows 10 System Image on several separate USB drives. One travels with me for ‘on-the-road’ recovery from hard disk disk issues. Other copies are stored two waterproof/fireproof safes is two different locations.

I use Eset SmartSuite with default scanning settings for common PC security measures.

I use other devices (smartphone, tablets, PCs at other locations) to access the files on OneDrive through various programs and apps. I keep a second notebook PC and several desktop PCs as an up-to-date spares but use them rarely.

Internet access is through two of primary providers in my region: Comcast and Verizon Wireless. When one goes out, the other is typically working.

I use LastPass to set, store and occasionally replace passwords for all programs as well as access to the remote storage drive. All passwords are distinct for each account, randomly generated with 8 to 12 characters. I manually download, print and store a copy of the LastPass vault data annually in two fireproof/waterproof  safes.

Only my spouse and executor have access to one of the safes. Nobody but me has access to the other safe but access instructions are included in the first safe.

The built-in Windows 10 File History program running in the background on automatic default settings is the primary system used to make ongoing backup copies of all current and historical data files. It appears to be working flawlessly but it will only work with a physically attached expansion drive on the primary PC. File History won’t run using cloud-based storage. File History consumes a lot of storage (>1 TB) .

I have two gasoline-powered electric generators in two different locations that are tested occasionally. Gasoline is stored and refreshed regularly.

Retired hard drives are either stored in a safe or physically destroyed with a hammer before disposal.

The current problem

I’ve run out of space on my 1TB USB drive attached to a USB 2.0 hub due to the demands of the File History program. I could erase and write over the older files but I don’t want to ‘just in case’.

The proposed solution

I plan to purchase a 4TB with an upgraded 3.0 hub for about $150. I see no benefit of a NAS drive with only one PC.

The older 1 TB USB drive will be retired and kept in a fireproof safe.

I still see no added benefit of using Acronic Backup (that I’ve purchased but abandoned) or Carbonite (which I loved and was flawless but don’t use anymore).

Known weaknesses

  1. My system is only as good as the security of Microsoft, Google, Eset and LastPass corporations.
  2. My data access is dependent on being able to access my LastPass account password OR one of my physical safes.
  3. My data access is dependent on being able to access electricity AND either: a) have internet access, OR b) have physical access to a hard drive. (I am working on adding a solar power generation and storage system for 2016 or 2017).
  4. Internet access is dependent on Verizon Wireless and Comcast cable. If both Verizon Wireless AND Comcast are out of service at the same time then I have no Internet access at my current locations.
  5. Only one physical drive has the most current data. If I lose access to the online data AND the physical drive then I will lose several weeks or months of current data.
  6. This plan does not consider online data transfer security issues that I consider to be a separate topic. I do offer a secure portal but will also utilize non-secure transmissions at a client’s request.
  7. I am aware that simply by positing this level of information online I increase some risks but I also know that constructive criticism on the data management plan by others is a good bit more valuable and outweighs the risk.

Can anyone comment if you see any other weakness in my data storage and backup plan?

security 2


Comments

4 responses to “My data management plan”

  1. Tony Novak,

    How would you like to have your back up problem solved once and for all. Guess who is going to do it….Yep. I am building a the solution out now and will share it in an hour or so. PROBLEM SOLVED

  2. Let’s start with a little checklist:

    The Ultimate Disaster
    Recovery Checklist
    STAY ONE STEP AHEAD OF POTENTIAL DISASTERS
    Prepare yourself before disaster strikes. When it comes to
    data backup and disaster recovery (BDR), being prepared for
    potential disasters is key to keep your business running.
    It’s not only important to have a disaster recovery solution
    you trust, but to make sure you test it as well.
    Keep this DR checklist on hand.
    Prior to a disaster ever occurring (and unfortunately it’s a matter of when
    and not if) ask yourself the following:
    • Do you have a disaster recovery solution in place?
    • Do you trust it?
    • When was the last time your backup was tested?
    • How long does it take to recover from your current backup solution?
    • How long can you realistically be down? 1 hour? 1 day?
    • What is the financial cost of downtime to your business?
    • When a disaster occurs, is there an offsite copy?
    The disaster moment has occurred—time to walk through the following steps:
    o 1. Assess the problem and its impact on your business
    Every disaster is different. Before doing anything, understand the underlying issue
    and how it may affect you.
    • Is the issue local to one machine, or does it affect your entire system?
    • Have files been deleted or are servers/workstations down?
    o 2. Establish recovery goals
    Recovery is what makes a BDR solution different from a simple backup product.
    Plan out your road to recovery.
    • Restore the system, the data, or both? Should time be spent recovering files and
    folders before system recovery?
    • Identify critical systems and prioritize recovery tasks.
    • What date/time should you recover from?
    • How long can your recovery take?
    2
    o 3. Select the appropriate recovery type(s)
    To get to your “road to recovery”, the appropriate recovery procedure must be
    followed. Think about which approach will best get you to your end goal.
    • File restore. OR
    • Local virtualization. OR
    • Off-site virtualization.
    o 4. Verify the recovery and confirm functionality with users
    Once a recovery is verified, confirm that it interacts positively with users.
    • Test network connectivity.
    • Ensure all users can access resources and applications in the virtual
    environment.
    o 5. Restore the original system(s), if needed
    If the original system(s) needs to be restored, decide which restoration process
    will work best.
    • Bare metal restore. OR
    • Virtual machine restore.
    o 6. Self-assess afterwards
    After it’s all said and done, take a step back and think about it: How well did your
    team do? What could you have done differently?
    • What precipitated the failure?
    • What ongoing issues need to addressed?
    • What can be done better in future DR scenario

  3. […] web site with over 10,000 blocked log-in attempts. This caused me to question and re-evaluate my data management and security protocols. This review is for my own satisfaction only, these is no indication that […]

Leave a Reply

Your email address will not be published. Required fields are marked *