AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Veeam backup schedule best practices8/5/2023 ![]() ![]() With this base rule outline, now we can upgrade it to work with modern critical data. With so much of our life and livelihood stored in digital form, and with the threats of malware increasing, it’s important for everyone to have a framework for assessing vulnerabilities.“ It started in an era of 30GB hard drives and CD backups and has scaled nicely to a world of 18TB drives and ubiquitous cloud storage. Over nearly 20 years, 3-2-1 has been a great tool to evaluate data risk exposure. In fact, the “rule” itself was simply a synopsis of the practices that I found among IT professionals, as I was writing my first book. “ While my focus has been primarily on digital media, the 3-2-1 principles are pretty universal. Even though this rule is flexible and timeless, I reached out to Peter for a quote on the 3-2-1 Rule nowadays and he offered this: This was a rather important innovation for the photography world and has deep implications into other technology disciplines and stays timeless to this day. The 3-2-1 Rule was first concepted by U.S. ![]() The 3-2-1 Rule, as I like to explain it, states the following: In this blog post I’m going to explain the 3-2-1 Rule and show you the way to upgrade it to a more modern and resilient way of thinking! What is the 3-2-1 Rule? Here at Veeam, we have been advocating this rule for many years to help organizations ensure recoverability when it is needed most. ![]()
0 Comments
Read More
Leave a Reply. |