{"id":13250,"date":"2020-08-26T10:28:06","date_gmt":"2020-08-26T13:28:06","guid":{"rendered":"https:\/\/ostec.blog\/?p=13250"},"modified":"2020-08-26T10:28:06","modified_gmt":"2020-08-26T13:28:06","slug":"data-backup-types","status":"publish","type":"post","link":"https:\/\/ostec.blog\/en\/general\/data-backup-types\/","title":{"rendered":"Data backup: understand the types and characteristics"},"content":{"rendered":"<p>In recent years, a series of data hijacking has scared people and businesses from every corner of the world. One of the most devastating attacks, WannaCry, has infected about 300,000 computers in approximately 150 countries. The threat has shaken and disrupted several companies, which did not follow basic protection principles, referenced in the manuals of good practices in information security.<\/p>\n<p>When it comes to security, prevention is always the best way and perimeter security solutions such as\u00a0<a href=\"https:\/\/ostec.blog\/seguranca-perimetro\/firewall-corporativo-importancia-negocio\">UTM firewall<\/a>, antivirus,\u00a0<a href=\"https:\/\/ostec.blog\/seguranca-perimetro\/dlp-o-que-e-e-como-funciona\">DLPs<\/a>, are some examples of solutions to prevent occurrences associated with data loss or leakage. However, companies should also be prepared for claims that exceed existing safety barriers on the corporate network perimeter. In this sense, data backup are vital procedures for the day to day business, regardless of the size or industry.<\/p>\n<p>To learn more about backup, its types and main features, continue reading this blog post.<\/p>\n<h2>Backup Platforms<\/h2>\n<p>Before we talk about the most conventional types of backup, we need to base the main ways of performing the procedure. Backups can be done locally and\/or in the cloud.<\/p>\n<h3>Local\/home backup<\/h3>\n<p>This type of backup is often performed on physical devices (hardware) within the organization. Although it is a potential option, it is an old method &#8211; rarely used by companies that have critical data in their structure.<\/p>\n<p>The possibilities vary in CD\/DVD, for an extremely (and exclusively) minimum volume of data; External HD which, although a homelier alternative, has relatively larger storage space; and LTO tapes, a highly resilient and capable technology widely used to maintain business data.<\/p>\n<p>It is important to note, however, that this backup format is not always the most efficient. This is because, in cases of natural disasters &#8211; or security incidents, technical failures and human errors &#8211; data can be easily lost. One possibility to circumvent these challenges, however, is to replicate the data to another server in a different physical location. In this way, data will be isolated in a different environment, giving a greater guarantee to the backup structure and consequently to the corporate data.<\/p>\n<h3>Cloud\/External Backup<\/h3>\n<p>Another form of backup &#8211; this one heavily used these days &#8211; is hiring cloud services. They are very efficient, including to work around the problems mentioned in the previous topic. It is also a widely used method because it presents a high degree of safety. For this, however, the company needs to select vital data for the business, not to make the project unfeasible, having the necessary resources for the implementation of the service.<\/p>\n<p>In a nutshell, cloud backup is a common backup procedure, transferred through an efficient internet link, to a remote server supported by the hired organization. It is a much more flexible and easy process, especially by establishing a periodic routine of data copies, which will ensure more security than local backups do.<\/p>\n<h2>Types of Data Backup<\/h2>\n<p>Now that you know the two main platforms for backing up, you can know the three existent types of backup. They vary according to the size of the company and its need, as well as the amount of information maintained by each corporation. Next, check out the main types of backups and their features.<\/p>\n<h3>Complete\/full<\/h3>\n<p>As the name itself says, it is the most complete and efficient data storage procedure. In this process, a complete copy of all corporate data is performed. For this reason, the duration of the backup is longer, especially in the case of more representative data.<\/p>\n<h3>Incremental<\/h3>\n<p>This backup only produces incremental copies. That is, it scans the last full backup and proceeds with the backup of new data only. It is recommended for larger companies with a high number of data stored and that need a lot of agility in the backup procedure. Thus, instead of performing a daily complete copy, only the data increment is backed up in a given period. This ensures not only safety to the business, but also agility.<\/p>\n<p>A good choice for companies with large amounts of strategic data, for example, is the weekly use of full backups, followed by a daily incremental routine. After all, involves a high level of prevention and care with the data, fully elaborated in a double quick and effective procedure.<\/p>\n<h3>Diferential<\/h3>\n<p>Unlike<em>incremental backup<\/em>, which performs full and incremental backup data copies, the Differential one stores the data created at full backup &#8211; and only from it. It is recommended for small and medium businesses that, while possessing large amounts of valuable data, do not produce enough to perform constant backups.<\/p>\n<p>Nevertheless, we emphasize that incremental and differential backup are versions that can <strong>complement<\/strong>the complete backup &#8211; so it is interesting to use them in parallel.<\/p>\n<p>If you have any further questions on this topic, feel free to contact one of our experts. It is totally free and you will be able to know more specifications on the subject discussed and, even, to solve doubts if you are interested in investing in this security procedure.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In recent years, a series of data hijacking has scared people and businesses from every corner of the world. One of the most devastating attacks, WannaCry, has infected about 300,000 computers in approximately 150 countries. The threat has shaken and disrupted several companies, which did not follow basic protection principles, referenced in the manuals of [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":12771,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[984,992],"tags":[1481],"class_list":["post-13250","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-learning-and-discovery","tag-backup-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data backup: understand the types and characteristics - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"description\" content=\"Data backup is very important regardless of the size or segment of the company. But do you know the types and characteristics of these backups?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/en\/general\/data-backup-types\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data backup: understand the types and characteristics - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"Data backup is very important regardless of the size or segment of the company. But do you know the types and characteristics of these backups?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/en\/general\/data-backup-types\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-26T13:28:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/03\/hd-conectado-em-notebook.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thais Souza\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/en\/general\/data-backup-types\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/data-backup-types\/\"},\"author\":{\"name\":\"Thais Souza\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33\"},\"headline\":\"Data backup: understand the types and characteristics\",\"datePublished\":\"2020-08-26T13:28:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/data-backup-types\/\"},\"wordCount\":838,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/data-backup-types\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/03\/hd-conectado-em-notebook.jpg\",\"keywords\":[\"backup\"],\"articleSection\":[\"General\",\"Learning and discovery\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/en\/general\/data-backup-types\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/en\/general\/data-backup-types\/\",\"url\":\"https:\/\/ostec.blog\/en\/general\/data-backup-types\/\",\"name\":\"Data backup: understand the types and characteristics - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/data-backup-types\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/data-backup-types\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/03\/hd-conectado-em-notebook.jpg\",\"datePublished\":\"2020-08-26T13:28:06+00:00\",\"description\":\"Data backup is very important regardless of the size or segment of the company. But do you know the types and characteristics of these backups?\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/data-backup-types\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/en\/general\/data-backup-types\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/en\/general\/data-backup-types\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/03\/hd-conectado-em-notebook.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/03\/hd-conectado-em-notebook.jpg\",\"width\":928,\"height\":534,\"caption\":\"HD externo conectado em um notebook preto. Realizando o backup de dados\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/en\/general\/data-backup-types\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data backup: understand the types and characteristics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33\",\"name\":\"Thais Souza\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g\",\"caption\":\"Thais Souza\"},\"url\":\"https:\/\/ostec.blog\/en\/author\/thais-souza\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data backup: understand the types and characteristics - OSTEC | Seguran\u00e7a digital de resultados","description":"Data backup is very important regardless of the size or segment of the company. But do you know the types and characteristics of these backups?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/en\/general\/data-backup-types\/","og_locale":"en_US","og_type":"article","og_title":"Data backup: understand the types and characteristics - OSTEC | Seguran\u00e7a digital de resultados","og_description":"Data backup is very important regardless of the size or segment of the company. But do you know the types and characteristics of these backups?","og_url":"https:\/\/ostec.blog\/en\/general\/data-backup-types\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2020-08-26T13:28:06+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/03\/hd-conectado-em-notebook.jpg","type":"image\/jpeg"}],"author":"Thais Souza","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/en\/general\/data-backup-types\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/en\/general\/data-backup-types\/"},"author":{"name":"Thais Souza","@id":"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33"},"headline":"Data backup: understand the types and characteristics","datePublished":"2020-08-26T13:28:06+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/en\/general\/data-backup-types\/"},"wordCount":838,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/en\/general\/data-backup-types\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/03\/hd-conectado-em-notebook.jpg","keywords":["backup"],"articleSection":["General","Learning and discovery"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/en\/general\/data-backup-types\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/en\/general\/data-backup-types\/","url":"https:\/\/ostec.blog\/en\/general\/data-backup-types\/","name":"Data backup: understand the types and characteristics - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/en\/general\/data-backup-types\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/en\/general\/data-backup-types\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/03\/hd-conectado-em-notebook.jpg","datePublished":"2020-08-26T13:28:06+00:00","description":"Data backup is very important regardless of the size or segment of the company. But do you know the types and characteristics of these backups?","breadcrumb":{"@id":"https:\/\/ostec.blog\/en\/general\/data-backup-types\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/en\/general\/data-backup-types\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/en\/general\/data-backup-types\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/03\/hd-conectado-em-notebook.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/03\/hd-conectado-em-notebook.jpg","width":928,"height":534,"caption":"HD externo conectado em um notebook preto. Realizando o backup de dados"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/en\/general\/data-backup-types\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/en\/"},{"@type":"ListItem","position":2,"name":"Data backup: understand the types and characteristics"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33","name":"Thais Souza","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g","caption":"Thais Souza"},"url":"https:\/\/ostec.blog\/en\/author\/thais-souza\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/13250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/comments?post=13250"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/13250\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media\/12771"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media?parent=13250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/categories?post=13250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/tags?post=13250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}