A reliable back-up solution for your website is crucial for various reasons. It might be as simple as making changes to your website, and then you, later on, decide that you would like to revert to a previous version. It might be that for whatever reason your website gets hacked or compromised (also read: Keeping Your Website Secure). It is always good to put your mind at ease and to be able to roll back to a previous state of your website. Data = information = money.
We at F1RST take back-ups for our Coffs Harbour & Coffs Coast website clients very seriously.
Here an overview of our back-up solutions for our Professional & Ultimate Website Management Plan clients:
Scheduled daily, weekly & monthly back-ups on our web server
These are the most vital back-ups that enable us to roll back your website to previous days, weeks & months.
Back-up to our local server
We keep a copy of your website on our local server installed on our workstations. The local server and our testing server on our web host are the places where we test website updates and the addition of new features for our client’s website to make sure they are fully functional before going live.
Back-up of our local server to secondary local storage
All of the files of our local server are continuously synchronised with a file-based back-up to secondary local storage. This ensures that if a hard drive on our local workstations fails it can be easily recovered.
Back-up of our local server to the cloud
The copy of your website that resides on our local server is continuously synchronised with a file-based back-up in the cloud through Microsoft OneDrive. If the worst case scenario occurs and our local workstations get compromised, eg. by fire, flood or theft we can easily recover all files through our off-site cloud storage solution.
Having these reliable safeguards against data loss in place provides great peace of mind for our clients and also for us. But it also comes with the responsibility to ensure that the various copies of files are protected from unauthorised access. This is where password protection and files encryption come into play which render all files inaccessible or useless for anyone who is not authorised to use them.