1. Think about which devices you need to protect. What and where are these devices? How many of each kind? For example, 8 laptops, 5 desktop computers, 2 servers.
2. How much data is on these computers?
3. Where would you like to store your data – locally, in the cloud, remote location or maybe a building next door?
4. Define which devices are critical – that is, those without which your company is unable to function. For such devices besides traditional backup, the disaster recovery (DR) function is necessary, which in the event of a failure will allow to run the damaged equipment and all data that were on it in a shortest possible time (it usually includes the operating system in full working state).
5. Define which data is critical. Decide which elements of IT infrastructure are priority and think about where the key data is located: whether physical and virtual servers should be secured, on which databases the company works, mail server and e-mail boxes. In addition, it is the laptops and desktops that are particularly vulnerable to external attacks, including ransomware.
6. Specify your Recovery Point Objective and Recovery Time Objective (RPO / RTO), answer yourself two fundamental questions:
– how much time can recovery take?
– and how long can you be without full access to data and applications?
7. Be honest with yourself, if you are not sure it is better to include something in backups. Loss of access to data, lack of business availability brings financial losses. Therefore, remember to systematically test whether your data protection solution is working properly and is within the values specified as RPO and RTO.
contact us now