An important security measure for those who work with computers is making copies of the information. Each March 31st recommend computer security experts backup information that we have on PC, tablets and smartphones.
The date was set at the end of March with the aim of raising awareness about the importance of backups.
There are several factors that can cause information to be lost, which is why having a backup allows you to safely and quickly restore files, systems or applications, advises the Chilean government’s cybersecurity account.
Him too World Backup Day website remember it should be a preventative practice.
Information can be lost due to:
Simply put, using backup makes it possible to undo any problem and with the associated recovery tasks, an operating system, applications and all kinds of files can be easily, quickly and safely restored.
The means of backing up are varied, both internally and externally physically, as well as virtually using cloud storage services, such as Amazon or Google Drive services. The simplest is to keep backups on second internal storage units where we have not installed the operating system or on external storage media such as flash drives, USB drives or optical discs. Another preferred route is external storage units.
Personal
To make a backup, the following steps are usually followed:
On a company level
“Ransomware attackers not only want your data, but now they’re after your backup repositories as well,” said Rick Vanover, Senior Director of Product Strategy, Veeam.
The expert points out that employees are often the weakest link that initiates the attack. Everyone in an organization should be able to recognize common infiltration methods, such as phishing emails or social engineering tactics. As ransomware evolves, your backup strategy becomes especially critical.
Good data management strategies, according to Veeam, They can be summarized with the numbers 3-2-1-1-0. This means keeping three copies of important datain at least two different types of environments, with at least one of these copies off-site, including a data backup that is air-gapped, offline, or immutable: hackers can’t compromise what they can’t touch.
The combination of one strong basic cyber hygiene, employee training and a well thought out backup and data management strategy it is the best defense against dynamic cyber-attacks.
Source: Eluniverso

Mabel is a talented author and journalist with a passion for all things technology. As an experienced writer for the 247 News Agency, she has established a reputation for her in-depth reporting and expert analysis on the latest developments in the tech industry.