How Do You Avoid Bad Backups?

Every backup process is fraught with risks. The cloud is no exception. However, unlike in tape and other kinds of backup, bad backups or backup failures in the cloud can be instantly tracked and corrected.

Backup failures in the cloud can occur at source. If the backup software manager is not resilient, power failures can disrupt a backup schedule and cause a backup failure. Most cloud vendors are conscious of this problem. The software comes with log files which immediately record the failure of the backup or backup reports can be set to automatically popup on restoration of power or manually called up by the system administrator monitoring the status of the backup.

Where the client based cloud software provisions for continuous backup, the backup failure is registered in the log and the backup will resume automatically on the restoration of power. In either case, proactive cloud vendors handle bad backups and backup failures by constantly monitoring the status of customer backups from their end of the chain and notifying the customer of a backup failure via email or telephone in addition to any alerting mechanisms that may be triggered at the client end.

Poor compression, de-duplication and encryption algorithms can generate bad backups. The data being encrypted, compressed and deduplicated may become corrupted by poorly constructed algorithms, making the data unrecoverable. A similar problem can arise at destination if the data is encrypted, compressed or deduplicated at the cloud vendor’s server with poorly structured algorithms. Mid process power failures may be blamed for other types of data corruption that can occur at the client or server side of the backup process.

Unauthorised listeners on the network, employees with malafide intent or even ignorant personnel can cause a good backup to go bad. While most cloud vendors attempt to prevent hijack of data during transmission and make an all out effort to safeguard customer data from malicious attackers, no system is absolutely hacker proof. Wise users will insist on maintaining multiple copies of their backup as insurance against possible corruption of any one copy.

Data replication, data mirroring are done at the server end of the chain by cloud vendors to ensure high availability and security of customer data. Many cloud vendors encourage their customers to maintain a local copy of their data in addition to the offsite copies that they create. Many vendors offer local backup devices as part of their package. The client based software creates a local copy of the data on the onsite device even as a cloud based copy is being created on the remote server.

We, at Backup Technology, understand the security needs of our customers. Our software logs every activity that is performed and backup failures are instantly reported. The continuous backup option enables the backup to automatically resume after power is restored, while a failed schedule can be completed by manually invoking the backup process. Our encryption, decryption and compression algorithms are well tested and proven. We replicate, mirror and maintain customer information in multiple servers that are geographically disbursed to ensure high availability and disaster recovery.

Our Customers

  • ATOS
  • Age UK
  • Alliance Pharma
  • Liverpool Football Club
  • CSC
  • Centrica
  • Citizens Advice
  • City of London
  • Fujitsu
  • Government Offices
  • HCL
  • LK Bennett
  • Lambretta Clothing
  • Leicester City
  • Lloyds Register
  • Logica
  • Meadowvale
  • National Farmers Union
  • Network Rail
  • PKR

Sales question? Need support? Start a chat session with one of our experts!

For support, call the 24-hour hotline:

UK: 0800 999 3600
US: 800-220-7013

Or, if you've been given a screen sharing code:

Existing customer?

Click below to login to our secure enterprise Portal and view the real-time status of your data protection.

Login to Portal