Backups, do I really need them? Or do I?

In the past, before everyone was connected to the internet, making backups was mainly important for businesses. After all, mistakes happen and hardware doesn’t last forever. At some point, digitization accelerated, and a new kind of network was built on a massive scale. Initially, it was only available to governments, businesses, and campuses, but later it was also made available to individuals. This network is better known as the internet.Nowadays, we share everything with each other. Computers, tablets, and phones are constantly connected to the internet, which also brings a new danger lurking around the corner, namely hackers. Whereas in the past, malicious individuals had to physically go to a company to gain access to systems, they now do it from the other side of the world behind their computer or laptop.It is frequently reported in the news that companies have been hacked, resulting in stolen or ransomware-encrypted data. Unfortunately, it is also common for companies to have inadequate backup systems, rendering them unable to restore hacked computers and ultimately forcing them to pay in the hope of recovering the data.In general, companies are much more often targeted than individuals, but it does happen.Imagine visiting your favorite website, unaware that it was hacked yesterday and malicious code has been added. Suddenly, the antivirus scanner gives warnings that a virus has been detected, and you notice strange events occurring. Before you can quickly secure your photo archive, the computer stops responding, and you have to reinstall it. Then the realization hits you, “If only I had made a backup, I wouldn’t have lost everything.”

What is a good backup method?

Perhaps you have heard of the 3-2-1 backup method. This means ensuring that there are 3 copies of your data, on two different devices, with one stored off-site.I secure my most important data, including my photo archive, using this method, but how do I apply it in practice?
  • 3 copies of my data
    • NAS
    • External hard drive
    • Microsoft OneDrive
  • 2 different devices
    • NAS
    • External hard drive
  • 1 outside of the house
    • Microsoft OneDrive (cloud)
In this way, my data is protected in case something happens at home, such as theft, fire, or lightning strikes.But how do I protect my data from ransomware, which I mentioned earlier in this article? I ensure that the latest security updates are installed on my computers and NAS, use antivirus software, legitimate software, and regularly create backups.

What is good backup software?

There are many backup software packages available, some of which are paid and some are free. Personally, I use the paid software Acronis True Image. The major advantage of this package is that you can create a bootable USB stick to restore your files or operating system without having to reinstall it first. In short, it saves a lot of time.

Tips

With just a good backup strategy, you won’t keep your data safe. With the tips below, you can go a long way.
  1. Make sure you are using the latest version of the operating system and software. This makes it more difficult for malicious actors to exploit existing vulnerabilities.
  2. Use legitimate software. Illegal software is often manipulated by malicious actors, making it easy for them to gain access to your system.
  3. Always download software from the manufacturer’s website. The chances of software being manipulated by malicious actors are much higher if you download it from an unknown website.
  4. Use an antivirus software package, and yes, even on a Mac. More and more people are using Macs, which makes it more interesting for malicious actors to create malicious software.
  5. Regularly make backups. I recommend doing it at least once a month and before making any major changes.
  6. Test your backups. Creating backups often goes smoothly, but regularly test if you can also restore your backup. This prevents unexpected surprises.
  7. Backup in the cloud. The advantage of the cloud is that you can access your data at any time, but if you don’t secure it properly, malicious individuals can also access it. Ensure a strong password, and if possible, use 2FA (Two-Factor Authentication)*. This is an additional security measure to keep your account safe. You will need a code to log in. Password alone is not enough.
  8. Use different and strong passwords for each website. This ensures that if one website is hacked, a malicious individual cannot log in to other websites with the same password.
  9. Utilize a NAS. A NAS server is a fantastic way to safely back up your data. I recommend a NAS with at least two hard drives. In the NAS management software, you have the option to enable data mirroring. This means that if one hard drive fails, you still retain all of your data. Of course, you should replace the faulty hard drive as soon as possible. I personally use a Synology DS216+II.
  10. Use an ad blocker in your browser. Advertising networks are often hacked by malicious individuals to display malicious ads on websites. Use an ad blocker. This ensures that you no longer see advertisements and are not tempted to click on them.
This article is also available in the Nikon Club Nederland magazine (volume 35 | issue 3 | September 2022).
Picture of Stanley

Stanley

Stanley Siousias has a deep passion for nature and macro photography. With his camera in hand, he immerses himself in the beautiful world of nature. He finds satisfaction in capturing the smallest details and discovering the hidden beauty around us.

Share this post

Email
WhatsApp
Facebook
X
Threads
LinkedIn

Discover other posts​

Picture of Sony Alpha 1 II

Sony introduces the Alpha 1 II

The Sony Alpha 1 II is Sony’s latest flagship model, officially unveiled on November 19, 2024. This camera is designed to deliver uncompromising performance for

Lees meer

Nikon introduces the Z50II

The Nikon Z50II was recently announced as an update to Nikon’s popular APS-C mirrorless camera aimed at both beginner and enthusiast photographers, as well as

Lees meer

Leave a Reply

Your email address will not be published. Required fields are marked *

We place various cookies to ensure that this website functions properly and to measure its usage. The analytical data is completely anonymized and cannot be traced back to IP addresses or individuals.