{"id":1375019,"date":"2023-07-04T14:06:53","date_gmt":"2023-07-04T14:06:53","guid":{"rendered":"https:\/\/www.collaboris.com\/?p=1375019"},"modified":"2023-08-03T12:42:05","modified_gmt":"2023-08-03T12:42:05","slug":"cybersecurity-best-practices-data-protection-backup","status":"publish","type":"post","link":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/","title":{"rendered":"Cybersecurity best practices : Data protection and back up"},"content":{"rendered":"<h1>Cybersecurity best practices : Data protection and backup<\/h1>\n<p><span><img decoding=\"async\" alt=\"image showing data back up and storage\" data-id=\"1375026\" width=\"799\" data-init-width=\"2560\" height=\"321\" data-init-height=\"1029\" title=\"Data Backup Storage\" loading=\"lazy\" src=\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/07\/data-backup-narrow-scaled.jpg?_t=1688479304\" data-link-wrap=\"true\" data-width=\"799\" data-height=\"321\" style=\"aspect-ratio: auto 2560 \/ 1029;\"><\/span><\/p>\n<p data-block-id=\"block-8152086b-1cf9-4402-a7ed-1fec69acbdbf\" style=\"\">Regularly backing up important data and storing it securely is of utmost importance for data protection. There are several backup methods available, each with its own advantages and considerations. Two popular options are cloud storage and external hard drives.<\/p>\n<h2 data-block-id=\"block-af938df5-1e7a-4c25-aad6-70d49818d027\" style=\"\">Cloud storage<\/h2>\n<p>Cloud storage is a convenient and widely used method for backing up data. It involves storing your files on remote servers maintained by a third-party provider. One of the main benefits of cloud storage is accessibility. You can access your files from anywhere with an internet connection, making it ideal for individuals who need to work on multiple devices or collaborate with others. Additionally, cloud storage providers often offer automatic backups, ensuring that your data is continuously protected without requiring manual intervention.<\/p>\n<p>However, when using cloud storage, it is crucial to prioritize security. Strong encryption and password protection are essential to safeguard your data from unauthorized access. Encryption ensures that your files are encoded and can only be deciphered with the correct decryption key. This adds an extra layer of protection, especially when your data is being transmitted over the internet. Password protection, on the other hand, prevents unauthorized individuals from accessing your cloud storage account. It is advisable to use a strong, unique password and enable two-factor authentication whenever possible.<\/p>\n<h2 data-block-id=\"block-ab95bc22-fca3-4802-8ab1-09cbc0aebe6a\" style=\"\">External hard drives<\/h2>\n<p>Another backup method is using external hard drives. These are physical devices that connect to your computer via USB or other interfaces. External hard drives offer the advantage of offline storage, meaning your data is not reliant on an internet connection. This can be particularly useful in areas with limited or unreliable internet access. Additionally, external hard drives provide complete control over your data, as you physically possess the device.<\/p>\n<p>Similar to cloud storage, encryption and password protection should be implemented when using external hard drives. Encrypting the data stored on the drive ensures that even if the device is lost or stolen, the information remains secure. Password protection adds an extra layer of defense against unauthorized access.<\/p>\n<p>It is worth noting that combining different backup methods can provide an additional level of redundancy and protection. For example, you can use cloud storage as your primary backup method and supplement it with periodic backups to an external hard drive. This approach ensures that even if one method fails or is compromised, you still have a backup available.<\/p>\n<p>In conclusion, regularly backing up important data is crucial, and there are various methods available to accomplish this. Whether you choose cloud storage, external hard drives, or a combination of both, it is essential to prioritize strong encryption and password protection to ensure the security of your valuable information. By taking these precautions, you can have peace of mind knowing that your data is safe and accessible when you need it.<\/p>\n<p>  <span style=\"\"><img decoding=\"async\" alt=\"\" data-id=\"1375149\" width=\"196\" data-init-width=\"847\" height=\"276\" data-init-height=\"1196\" title=\"essential guide to cybersecurity ebook cropped\" loading=\"lazy\" src=\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/08\/essential-guide-to-cybersecurity-ebook-cropped.png?_t=1690979525\" data-link-wrap=\"true\" data-width=\"196\" data-height=\"276\" style=\"aspect-ratio: auto 847 \/ 1196;\" ml-d=\"0\" mt-d=\"0\" center-h-d=\"true\" ml-m=\"0\" mt-m=\"0\" ml-t=\"0\" mt-t=\"0\"><\/span><\/p>\n<h3 style=\"color: rgb(52, 52, 52) !important; --tcb-applied-color:#343434 !important;\">Get your free cybersecurity best practices guide<\/h3>\n<p style=\"\">This eBook contains all 10 posts in our cybersecurity series in one handy downloadable guide so you can read it at your leisure.<\/p>\n<p>__CONFIG_colors_palette__{&#8220;active_palette&#8221;:0,&#8221;config&#8221;:{&#8220;colors&#8221;:{&#8220;8eb49&#8221;:{&#8220;name&#8221;:&#8221;Main Accent&#8221;,&#8221;parent&#8221;:-1}},&#8221;gradients&#8221;:[]},&#8221;palettes&#8221;:[{&#8220;name&#8221;:&#8221;Default Palette&#8221;,&#8221;value&#8221;:{&#8220;colors&#8221;:{&#8220;8eb49&#8221;:{&#8220;val&#8221;:&#8221;rgb(0, 47, 64)&#8221;}},&#8221;gradients&#8221;:[]},&#8221;original&#8221;:{&#8220;colors&#8221;:{&#8220;8eb49&#8221;:{&#8220;val&#8221;:&#8221;rgb(19, 114, 211)&#8221;,&#8221;hsl&#8221;:{&#8220;h&#8221;:210,&#8221;s&#8221;:0.83,&#8221;l&#8221;:0.45,&#8221;a&#8221;:1}}},&#8221;gradients&#8221;:[]}}]}__CONFIG_colors_palette__ <a href=\"https:\/\/www.collaboris.com\/cybersecurity-guide\/\" target=\"_blank\" rel=\"noopener\"><span style=\"\">    <\/span> <span style=\"\"><span data-tcb_hover_state_parent=\"\" style=\"\">Get y<span style=\"background-color: transparent;\"><\/span>our free eBook<\/span><\/span> <\/a>  <\/p>\n<h2 style=\"\">Other posts in this series:<\/h2>\n<p><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/essential-cybersecurity-guide\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Introduction to cyber security<\/a><\/p>\n<ol>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-password-management\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Password management<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-malware\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Malware<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Social engineering<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Phishing scams<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Social media security<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-wifi-network-security\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Wi-Fi and network security<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-mobile-device-security\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Mobile device security<\/a><\/li>\n<li>Data protection and backup (this post)<\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Safe web browsing<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Incident reporting<\/a><\/li>\n<\/ol>\n<h2 style=\"\">You may also like:<\/h2>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/\" title=\"Cybersecurity best practices : Incident reporting\" data-css=\"\">Cybersecurity best practices : Incident reporting<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Incident reportingThe security of systems and data is of utmost <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/#more-1375042\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/\" title=\"Cybersecurity best practices : Safe web browsing\" data-css=\"\">Cybersecurity best practices : Safe web browsing<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Safe Web BrowsingIn today&#8217;s digital age, it is crucial to <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/#more-1375032\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/\" title=\"Cybersecurity best practices : Data protection and back up\" data-css=\"\">Cybersecurity best practices : Data protection and back up<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Data protection and backupRegularly backing up important data and storing <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/#more-1375019\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-mobile-device-security\/\" title=\"Cybersecurity best practices : Mobile device security\" data-css=\"\">Cybersecurity best practices : Mobile device security<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Mobile device securityMobile devices pose various security risks that can <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-mobile-device-security\/#more-1375003\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-mobile-device-security\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-wifi-network-security\/\" title=\"Cybersecurity best practices : Wi-Fi and Network security\" data-css=\"\">Cybersecurity best practices : Wi-Fi and Network security<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Wi-Fi and Network securityThe Risks of Unsecured Wi-Fi NetworksConnecting to <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-wifi-network-security\/#more-1374983\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-wifi-network-security\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/\" title=\"Cybersecurity best practices : Social media security\" data-css=\"\">Cybersecurity best practices : Social media security<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Social media securitySocial media security refers to the measures taken <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/#more-1374967\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity best practices : Data protection and backup Regularly backing up important data and storing it securely is of utmost importance for data protection. There are several backup methods available, each with its own advantages and considerations. Two popular options are cloud storage and external hard drives. Cloud storage Cloud storage is a convenient and [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":2109,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[6],"tags":[],"class_list":["post-1375019","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-policy-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity best practices : Data protection and back up<\/title>\n<meta name=\"description\" content=\"Regularly backing up and securely storing important data is of utmost importance. This post discusses cloud storage and external hard drives.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity best practices : Data protection and back up\" \/>\n<meta property=\"og:description\" content=\"Regularly backing up important data and storing it securely is of utmost importance. There are several backup methods available, each with its own advantages and considerations. Two popular options are cloud storage and external hard drives.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/\" \/>\n<meta property=\"og:site_name\" content=\"Collaboris\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Collaboris\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-04T14:06:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-03T12:42:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/07\/mobile-device-security-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1051\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Helen Jones\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@helen.jones@collaboris.co.uk\" \/>\n<meta name=\"twitter:site\" content=\"@Collaboris\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Helen Jones\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/\"},\"author\":{\"name\":\"Helen Jones\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef\"},\"headline\":\"Cybersecurity best practices : Data protection and back up\",\"datePublished\":\"2023-07-04T14:06:53+00:00\",\"dateModified\":\"2023-08-03T12:42:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/\"},\"wordCount\":726,\"publisher\":{\"@id\":\"https:\/\/www.collaboris.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"articleSection\":[\"Policy Management\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/\",\"url\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/\",\"name\":\"Cybersecurity best practices : Data protection and back up\",\"isPartOf\":{\"@id\":\"https:\/\/www.collaboris.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"datePublished\":\"2023-07-04T14:06:53+00:00\",\"dateModified\":\"2023-08-03T12:42:05+00:00\",\"description\":\"Regularly backing up and securely storing important data is of utmost importance. This post discusses cloud storage and external hard drives.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/#primaryimage\",\"url\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"contentUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"width\":820,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.collaboris.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity best practices : Data protection and back up\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.collaboris.com\/#website\",\"url\":\"https:\/\/www.collaboris.com\/\",\"name\":\"Collaboris\",\"description\":\"We make compliance simple\",\"publisher\":{\"@id\":\"https:\/\/www.collaboris.com\/#organization\"},\"alternateName\":\"DocRead\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.collaboris.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.collaboris.com\/#organization\",\"name\":\"Collaboris\",\"alternateName\":\"DocRead\",\"url\":\"https:\/\/www.collaboris.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png\",\"contentUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png\",\"width\":150,\"height\":40,\"caption\":\"Collaboris\"},\"image\":{\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Collaboris\/\",\"https:\/\/x.com\/Collaboris\",\"https:\/\/www.linkedin.com\/company\/collaboris\"],\"description\":\"Collaboris is a Software company that created a policy management tool called DocRead.\",\"email\":\"info@collaboris.com\",\"telephone\":\"02079935140\",\"legalName\":\"Collaboris Ltd\",\"foundingDate\":\"2007-12-03\",\"vatID\":\"GB928895360\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef\",\"name\":\"Helen Jones\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g\",\"caption\":\"Helen Jones\"},\"sameAs\":[\"https:\/\/x.com\/helen.jones@collaboris.co.uk\"],\"url\":\"https:\/\/www.collaboris.com\/author\/helen-jones\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity best practices : Data protection and back up","description":"Regularly backing up and securely storing important data is of utmost importance. This post discusses cloud storage and external hard drives.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/","og_locale":"en_GB","og_type":"article","og_title":"Cybersecurity best practices : Data protection and back up","og_description":"Regularly backing up important data and storing it securely is of utmost importance. There are several backup methods available, each with its own advantages and considerations. Two popular options are cloud storage and external hard drives.","og_url":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/","og_site_name":"Collaboris","article_publisher":"https:\/\/www.facebook.com\/Collaboris\/","article_published_time":"2023-07-04T14:06:53+00:00","article_modified_time":"2023-08-03T12:42:05+00:00","og_image":[{"width":2560,"height":1051,"url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/07\/mobile-device-security-scaled.jpg","type":"image\/jpeg"}],"author":"Helen Jones","twitter_card":"summary_large_image","twitter_creator":"@helen.jones@collaboris.co.uk","twitter_site":"@Collaboris","twitter_misc":{"Written by":"Helen Jones","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/#article","isPartOf":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/"},"author":{"name":"Helen Jones","@id":"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef"},"headline":"Cybersecurity best practices : Data protection and back up","datePublished":"2023-07-04T14:06:53+00:00","dateModified":"2023-08-03T12:42:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/"},"wordCount":726,"publisher":{"@id":"https:\/\/www.collaboris.com\/#organization"},"image":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/#primaryimage"},"thumbnailUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","articleSection":["Policy Management"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/","url":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/","name":"Cybersecurity best practices : Data protection and back up","isPartOf":{"@id":"https:\/\/www.collaboris.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/#primaryimage"},"image":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/#primaryimage"},"thumbnailUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","datePublished":"2023-07-04T14:06:53+00:00","dateModified":"2023-08-03T12:42:05+00:00","description":"Regularly backing up and securely storing important data is of utmost importance. This post discusses cloud storage and external hard drives.","breadcrumb":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/#primaryimage","url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","contentUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","width":820,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.collaboris.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity best practices : Data protection and back up"}]},{"@type":"WebSite","@id":"https:\/\/www.collaboris.com\/#website","url":"https:\/\/www.collaboris.com\/","name":"Collaboris","description":"We make compliance simple","publisher":{"@id":"https:\/\/www.collaboris.com\/#organization"},"alternateName":"DocRead","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.collaboris.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.collaboris.com\/#organization","name":"Collaboris","alternateName":"DocRead","url":"https:\/\/www.collaboris.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png","contentUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png","width":150,"height":40,"caption":"Collaboris"},"image":{"@id":"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Collaboris\/","https:\/\/x.com\/Collaboris","https:\/\/www.linkedin.com\/company\/collaboris"],"description":"Collaboris is a Software company that created a policy management tool called DocRead.","email":"info@collaboris.com","telephone":"02079935140","legalName":"Collaboris Ltd","foundingDate":"2007-12-03","vatID":"GB928895360","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"}},{"@type":"Person","@id":"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef","name":"Helen Jones","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.collaboris.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g","caption":"Helen Jones"},"sameAs":["https:\/\/x.com\/helen.jones@collaboris.co.uk"],"url":"https:\/\/www.collaboris.com\/author\/helen-jones\/"}]}},"modified_by":"Helen Jones","_links":{"self":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts\/1375019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/comments?post=1375019"}],"version-history":[{"count":16,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts\/1375019\/revisions"}],"predecessor-version":[{"id":1375211,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts\/1375019\/revisions\/1375211"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/media\/2109"}],"wp:attachment":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/media?parent=1375019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/categories?post=1375019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/tags?post=1375019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}