{"id":192,"date":"2021-01-15T13:29:26","date_gmt":"2021-01-15T19:29:26","guid":{"rendered":"https:\/\/www.axigent.net\/blog\/?p=192"},"modified":"2024-04-19T08:38:47","modified_gmt":"2024-04-19T14:38:47","slug":"the-3-2-1-backup-strategy","status":"publish","type":"post","link":"https:\/\/www.axigent.net\/blog\/the-3-2-1-backup-strategy\/","title":{"rendered":"The 3-2-1 Backup Strategy"},"content":{"rendered":"\n<p>The 3-2-1 backup strategy is well-known across\nthe IT industry. Despite drastic changes to the technology powering backups and\ncalls for different configurations, the 3-2-1 backup strategy provides a\nbaseline rule by which companies can protect the data on which they rely.<\/p>\n\n\n\n<p>The 3-2-1 backup strategy states that you\nshould keep:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>THREE copies of your data<\/li>\n\n\n\n<li>Backed-up data on TWO different storage types<\/li>\n\n\n\n<li>At least ONE copy of the data offsite<\/li>\n<\/ol>\n\n\n\n<p>Why Does 3-2-1 Backup Strategy Work?<\/p>\n\n\n\n<p>Backup is central to any disaster recovery\nstrategy. Businesses that fail to backup their data are unable to recover from\na disaster event. In fact, <a href=\"https:\/\/www.bostoncomputing.net\/consultation\/databackup\/statistics\/\">60% of businesses<\/a> who experience data loss\nshut down within 6 months of the event.<\/p>\n\n\n\n<p>The 3-2-1 backup strategy provides a basic\nframework for complete backup and disaster recovery planning. By ensuring you\nhave multiple data copies on different storage types in different places, you\naccount for the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>corrupted data<\/li>\n\n\n\n<li>data loss<\/li>\n\n\n\n<li>data theft<\/li>\n\n\n\n<li>hardware failure<\/li>\n\n\n\n<li>geographic-based disaster<\/li>\n<\/ul>\n\n\n\n<p>Is The Cloud a Viable Off-Site Solution?<\/p>\n\n\n\n<p>The uptick in cloud computing means many\nbackup experts have shifted their definition of off-site to equal cloud. And\nwhile the cloud is a viable off-site solution, it probably shouldn\u2019t be the <em>only<\/em> off-site solution.<\/p>\n\n\n\n<p>Off-site should also include an addendum:\noffline. The off-site backup should be always accessible. Since the cloud\noperates via network connectivity, if the cloud isn\u2019t accessible, neither will\nthe off-site backup. Using the cloud as an off-site backup is ideal only when\ndone in consort with a physically accessible off-site \u2013 offline \u2013 backup.<\/p>\n\n\n\n<p>With managed IT services from Axigent, you have the support and expertise you need to take the next step in your backup journey. Our team can provide the right backup solution for your business.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The 3-2-1 backup strategy is well-known across the IT industry. Despite drastic changes to the technology powering backups and calls for different configurations, the 3-2-1 backup strategy provides a baseline rule by which companies can protect the data on which they rely. The 3-2-1 backup strategy states that you should keep: Why Does 3-2-1 Backup [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":193,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[6,5,7,8,11,10],"class_list":["post-192","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-amarillo-computer-company","tag-computer-company","tag-computer-company-near-me","tag-managed-it","tag-managed-it-company","tag-managed-it-services"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The 3-2-1 Backup Strategy - Blog<\/title>\n<meta name=\"description\" content=\"The 3-2-1 backup strategy provides a baseline rule by which companies can protect the data on which they rely.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.axigent.net\/blog\/the-3-2-1-backup-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The 3-2-1 Backup Strategy - Blog\" \/>\n<meta property=\"og:description\" content=\"The 3-2-1 backup strategy provides a baseline rule by which companies can protect the data on which they rely.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.axigent.net\/blog\/the-3-2-1-backup-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Axigent\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-15T19:29:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-19T14:38:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2021\/01\/The-3-2-1-Backup-Strategy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"717\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tenai Hensley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Axigent\" \/>\n<meta name=\"twitter:site\" content=\"@Axigent\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tenai Hensley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/the-3-2-1-backup-strategy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/the-3-2-1-backup-strategy\\\/\"},\"author\":{\"name\":\"Tenai Hensley\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#\\\/schema\\\/person\\\/1a99c801de40e2363ab56c2827a88c85\"},\"headline\":\"The 3-2-1 Backup Strategy\",\"datePublished\":\"2021-01-15T19:29:26+00:00\",\"dateModified\":\"2024-04-19T14:38:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/the-3-2-1-backup-strategy\\\/\"},\"wordCount\":299,\"publisher\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/the-3-2-1-backup-strategy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/The-3-2-1-Backup-Strategy.jpg\",\"keywords\":[\"Amarillo Computer Company\",\"Computer Company\",\"Computer Company Near Me\",\"Managed IT\",\"Managed IT Company\",\"Managed IT Services\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/the-3-2-1-backup-strategy\\\/\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/the-3-2-1-backup-strategy\\\/\",\"name\":\"The 3-2-1 Backup Strategy - Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/the-3-2-1-backup-strategy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/the-3-2-1-backup-strategy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/The-3-2-1-Backup-Strategy.jpg\",\"datePublished\":\"2021-01-15T19:29:26+00:00\",\"dateModified\":\"2024-04-19T14:38:47+00:00\",\"description\":\"The 3-2-1 backup strategy provides a baseline rule by which companies can protect the data on which they rely.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/the-3-2-1-backup-strategy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.axigent.net\\\/blog\\\/the-3-2-1-backup-strategy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/the-3-2-1-backup-strategy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/The-3-2-1-Backup-Strategy.jpg\",\"contentUrl\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/The-3-2-1-Backup-Strategy.jpg\",\"width\":1000,\"height\":717},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/the-3-2-1-backup-strategy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The 3-2-1 Backup Strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/\",\"name\":\"Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#organization\",\"name\":\"Blog\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/atglogo.png\",\"contentUrl\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/atglogo.png\",\"width\":269,\"height\":78,\"caption\":\"Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Axigent\",\"https:\\\/\\\/x.com\\\/Axigent\",\"https:\\\/\\\/instagram.com\\\/Axigent\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#\\\/schema\\\/person\\\/1a99c801de40e2363ab56c2827a88c85\",\"name\":\"Tenai Hensley\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/author\\\/tenai\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The 3-2-1 Backup Strategy - Blog","description":"The 3-2-1 backup strategy provides a baseline rule by which companies can protect the data on which they rely.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.axigent.net\/blog\/the-3-2-1-backup-strategy\/","og_locale":"en_US","og_type":"article","og_title":"The 3-2-1 Backup Strategy - Blog","og_description":"The 3-2-1 backup strategy provides a baseline rule by which companies can protect the data on which they rely.","og_url":"https:\/\/www.axigent.net\/blog\/the-3-2-1-backup-strategy\/","og_site_name":"Blog","article_publisher":"https:\/\/www.facebook.com\/Axigent","article_published_time":"2021-01-15T19:29:26+00:00","article_modified_time":"2024-04-19T14:38:47+00:00","og_image":[{"width":1000,"height":717,"url":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2021\/01\/The-3-2-1-Backup-Strategy.jpg","type":"image\/jpeg"}],"author":"Tenai Hensley","twitter_card":"summary_large_image","twitter_creator":"@Axigent","twitter_site":"@Axigent","twitter_misc":{"Written by":"Tenai Hensley","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.axigent.net\/blog\/the-3-2-1-backup-strategy\/#article","isPartOf":{"@id":"https:\/\/www.axigent.net\/blog\/the-3-2-1-backup-strategy\/"},"author":{"name":"Tenai Hensley","@id":"https:\/\/www.axigent.net\/blog\/#\/schema\/person\/1a99c801de40e2363ab56c2827a88c85"},"headline":"The 3-2-1 Backup Strategy","datePublished":"2021-01-15T19:29:26+00:00","dateModified":"2024-04-19T14:38:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.axigent.net\/blog\/the-3-2-1-backup-strategy\/"},"wordCount":299,"publisher":{"@id":"https:\/\/www.axigent.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.axigent.net\/blog\/the-3-2-1-backup-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2021\/01\/The-3-2-1-Backup-Strategy.jpg","keywords":["Amarillo Computer Company","Computer Company","Computer Company Near Me","Managed IT","Managed IT Company","Managed IT Services"],"articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.axigent.net\/blog\/the-3-2-1-backup-strategy\/","url":"https:\/\/www.axigent.net\/blog\/the-3-2-1-backup-strategy\/","name":"The 3-2-1 Backup Strategy - Blog","isPartOf":{"@id":"https:\/\/www.axigent.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.axigent.net\/blog\/the-3-2-1-backup-strategy\/#primaryimage"},"image":{"@id":"https:\/\/www.axigent.net\/blog\/the-3-2-1-backup-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2021\/01\/The-3-2-1-Backup-Strategy.jpg","datePublished":"2021-01-15T19:29:26+00:00","dateModified":"2024-04-19T14:38:47+00:00","description":"The 3-2-1 backup strategy provides a baseline rule by which companies can protect the data on which they rely.","breadcrumb":{"@id":"https:\/\/www.axigent.net\/blog\/the-3-2-1-backup-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.axigent.net\/blog\/the-3-2-1-backup-strategy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.axigent.net\/blog\/the-3-2-1-backup-strategy\/#primaryimage","url":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2021\/01\/The-3-2-1-Backup-Strategy.jpg","contentUrl":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2021\/01\/The-3-2-1-Backup-Strategy.jpg","width":1000,"height":717},{"@type":"BreadcrumbList","@id":"https:\/\/www.axigent.net\/blog\/the-3-2-1-backup-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.axigent.net\/blog\/"},{"@type":"ListItem","position":2,"name":"The 3-2-1 Backup Strategy"}]},{"@type":"WebSite","@id":"https:\/\/www.axigent.net\/blog\/#website","url":"https:\/\/www.axigent.net\/blog\/","name":"Blog","description":"","publisher":{"@id":"https:\/\/www.axigent.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.axigent.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.axigent.net\/blog\/#organization","name":"Blog","url":"https:\/\/www.axigent.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.axigent.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2020\/02\/atglogo.png","contentUrl":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2020\/02\/atglogo.png","width":269,"height":78,"caption":"Blog"},"image":{"@id":"https:\/\/www.axigent.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Axigent","https:\/\/x.com\/Axigent","https:\/\/instagram.com\/Axigent"]},{"@type":"Person","@id":"https:\/\/www.axigent.net\/blog\/#\/schema\/person\/1a99c801de40e2363ab56c2827a88c85","name":"Tenai Hensley","url":"https:\/\/www.axigent.net\/blog\/author\/tenai\/"}]}},"_links":{"self":[{"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/posts\/192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/comments?post=192"}],"version-history":[{"count":2,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/posts\/192\/revisions"}],"predecessor-version":[{"id":346,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/posts\/192\/revisions\/346"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/media\/193"}],"wp:attachment":[{"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/media?parent=192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/categories?post=192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/tags?post=192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}