Coming Soon: GET-IT: Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET-IT: Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET
Backup & Storage

Adding a 0 to the 3-2-1 Rule

When it comes to disaster hitting your environment, it’s not a matter of if, but when. We all like to think that we are prepared and practice is always important but when an outage does occur, having a playbook ready will help you not only recover faster but will help to turn the chaos into a little bit of sanity.

Over the years, the 3-2-1 rule has become a bit of a guiding light for the industry as it helps to create a foundation for solid backup and recovery. If you aren’t familiar with the rule, let me break it down for you.

The first digit, three, means that you should be keeping at least three copies of your data. This may sound excessive but when it comes to a disaster, they can range from a simple switch failure to an entire loss of a data center; the more copies you have of your data, the better off you will be when it comes to a recovery scenario.

Sponsored Content

Say Goodbye to Traditional PC Lifecycle Management

Traditional IT tools, including Microsoft SCCM, Ghost Solution Suite, and KACE, often require considerable custom configurations by T3 technicians (an expensive and often elusive IT resource) to enable management of a hybrid onsite + remote workforce. In many cases, even with the best resources, organizations are finding that these on-premise tools simply cannot support remote endpoints consistently and reliably due to infrastructure limitations.

The second digit, two, means that of your three copies of your data, you need to store them on two different mediums. This is self-explanatory, if you keep your data on tapes, make sure you have another copy stored on internal disks; simply put, don’t solely depend on having tapes as your only means of backup.

And the last digit,1, means that you need to store one of your copies of your data offsite. With the explosive growth in cloud-storage services, every company can easily have an off-site replication of their data. Many years ago, it was common for an employee to take a copy of the data home with them to store it in a safe but with cloud storage becoming quite cheap and easily accessible, there is no need to expose your data in this fashion.

But it’s time to think more critically about your data and how you store it. This is where the zero comes into play.

To have backups of your data available is one thing but you need to be able to recover it with zero errors. If your tapes are ruined or your hard drives are damaged, those backups are not going to help you.

Practice makes perfect and you need to make sure that all that data you have stored can easily be recovered without any errors in its continuity. If your data is corrupted, you might as well not have any data at all.

The best way to know if you can recover without any errors is to practice, practice, practice. The better you are prepared, the better your results will be as you don’t get to pick the time and place a disaster occurs but you did get to chose how and where you can recover your content.

Even with the 3-2-1-0 rule, there is far more you should consider when preparing for a disaster including who to contact first, how to notify customers, and locations for emergency off-site meetings as well.

No one has ever said that they are over-prepared for a disaster to happen, only that they wished that they had more practice to deal with the chaos that erupts when data is no longer available.

Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

Brad Sams has more than a decade of writing and publishing experience under his belt including helping to establish new and seasoned publications From breaking news about upcoming Microsoft products to telling the story of how a billion dollar brand was birthed in his book, Beneath a Surface, Brad is a well-rounded journalist who has established himself as a trusted name in the industry.
Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: