Attend IT Blog

Attend IT Limited has been serving the Brentford area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What is a BDR and Why Does Your Organization Need One?

What is a BDR and Why Does Your Organization Need One?

Data backup always sounds like a simple process, but if you truly want to rely on your backup, it needs to be absolutely infallible. That is the objective behind an IT appliance known as the BDR, which stands for Backup and Disaster Recovery.

Good Backups vs Bad Backups

When you were in college, working on a big paper or presentation, you may have had the hindsight to drag the files over to a thumb drive or external drive, or email them to yourself, just to make sure you had a spare copy in case something went wrong.

That’s a backup, sure, but you needed to have the foresight to do it. You needed to manually stick a copy of the data somewhere, remember where it was, keep track of it, and hope you remembered to keep it updated as the original file changed.

That is a bad backup. Sure, it accomplishes the goal of having redundancy for a particular piece of information, but it’s only as reliable as a person is.

On top of that, thumb drives can be lost or stolen, and they break easily. They aren’t really designed for long-term storage. Your email inbox isn’t exactly the world’s best data repository either.

This was kind of an extreme case, but it highlights the factors that make a bad backup. If you have to think about it, act on it, or it relies on a single point of fallible data storage, it’s a bad backup.

A good backup has its own redundancies in place, and it doesn’t rely on human interaction to work—it simply does. There’s more to making a good backup, and that’s what we’ll be going over for the rest of this article.

A Backup Isn’t Just a Copy of Files

First of all, it’s important to understand just what your company data is. This will be different for just about any organization, but it’s likely you have a combination of standard files and data in directories and subdirectories on a centralized server. These will be things like Word documents, PDFs, Excel spreadsheets, PowerPoint presentations, signed and scanned documents, proposal templates, images, video, CAD files, and that sort of thing. 

Then you might have certain applications that your organization uses that store data in one or more databases, or they have some proprietary way to store information that isn’t quite as cut and dry as a “folder full of files.” Essentially, a database is just a big file or series of files, but to a typical user, it might not be inherently clear how that data gets stored and where it is located. 

Let’s take a look at our own helpdesk ticketing system.

When you submit a support request to us, whether it be via email, or through our portal, or you call us at 020 8626 4485 and have a technician generate it, it goes into our ticketing system. This ticketing system holds a full historical record of everything we’ve ever done to support you and your network. Thorough documentation is absolutely essential for us to effectively do our jobs and provide good support, so when a technician is looking into an issue, it’s important that they can read through everything else we’ve ever done for you to determine if the current issue is related to something that happened or was changed in the past.

We also track each individual piece of hardware and software we manage, so we can look back and see how much time and effort goes into supporting everything—to help make informed decisions on hardware that might need to be replaced to save you money, etc.

That’s a lot of data—it also tracks our technician's time, our account managers can run reports on the data, our accounting team can keep track of agreements and the financials, etc. Essentially, a sizable chunk of our operations is wrapped around this one particular set of tools.

All that data is stored throughout a complex, secured database that is then pulled into a more user-friendly application that organizes the data and lets us run reports and stuff. We don’t interface directly with the database very often, but it’s vital to what we do every day.

So, if we didn’t back up that database and keep it absolutely safe, our investment in data backup would essentially be pointless.

It’s likely that your organization has multiple instances of this sort of thing going on.

What Makes a Great Backup

What have we determined so far?

A good backup consists of the following:

  • It doesn’t require a human to remember to run it.
  • It doesn’t just back up some of your data, it backs up ALL of it.
  • The backup itself has redundancies (your backup is backed up).
  • The backup itself is extremely secure (not something that can be lost or stolen).
  • The backup securely stores another copy of your data offsite just in case.

And finally, this is another huge factor:

  • The backup is fast and easy to restore from.

That last point is critical because when you are suffering from a disaster that requires you to restore from your backup, you want the process to be as quick and painless as possible. Older tape backup methods can take days or even weeks to restore from, and it’s nearly impossible to prioritize what gets restored. Backup solutions that just backup files are better, but if you experienced a catastrophic hardware failure, you still have to wait on parts to get replaced, operating systems and software to get installed and configured, and THEN you can finally get your data back.

And then there’s the BDR. This uses a method to back up data that most people aren’t aware of, because it’s not something you generally see on the consumer side of things.

The BDR doesn’t just duplicate your company data—it can fully back up an entire system at an extremely detailed, granular level. How is this beneficial?

Let’s say your entire server suffers from a failure. A capacitor on the motherboard bursts and the shock damages the processor and causes it to crash. The server doesn’t boot back up. Your entire staff is kicked out of everything and can’t access any data.

If you have a BDR in place, a technician can pull up the most recent backup (which in most cases, is as recent as 15 minutes old). From there, they can virtualize the backup onto the BDR’s hardware, essentially allowing your backup device to become a temporary replacement server. It might not be as fast and powerful as your current server, but it’s definitely enough to get people back to work while your server is repaired or replaced.

Are You Confident in Your Data Backup?

If you aren’t sure what kind of backup your organization has, it’s not worth risking your data. You should have your data backup solution reviewed and audited at least once a year (if not more) so it’s not a bad idea to have a fresh set of eyes take a look for you.

There’s no risk or obligation—just give us a call at 020 8626 4485 and ask us to audit your data backup for your business.

What You Need to Know About Setting Up an Effectiv...
A Brief Overview on Business Compliance
 

Mobile? Grab this Article!

Qr Code

Tag Cloud

Technology Security Business Computing Productivity Network Security Cloud Best Practices Tip of the Week Business Managed IT Services Data Data Backup Data Recovery IT Services Hackers IT Support Software Hosted Solutions Innovation communications Disaster Recovery Backup Privacy VoIP Cybersecurity Malware Mobile Devices Small Business Efficiency Internet Saving Money Email Hardware Business Continuity Computer Cloud Computing Business Management Phishing Collaboration Outsourced IT Microsoft BDR Automation Information Technology User Tips Ransomware Productivity Smartphones IT Support Compliance Internet of Things Users Workplace Tips Workplace Strategy Quick Tips Smartphone Server Artificial Intelligence Communication Upgrade Risk Management Wi-Fi Employee-Employer Relationship Mobile Device Management Managed Service Provider Network Managed IT Mobility Managed IT services Budget Training Spam Meetings Covid-19 Gadgets Passwords BYOD Google Save Money Wireless Password Mobile Device Networking Human Resources Remote Avoiding Downtime Document Management Android Printing Information Windows 7 Remote Workers Social Media Microsoft Office VPN Remote Computing Chrome History Hosted Solution Router Instant Messaging Encryption Firewall Content Filtering Computers Data Management Cost Management Windows 10 Project Management MSP Monitoring Managed Service Virtual Private Network Help Desk Time Management Remote Work Video Conferencing Laptop Marketing Recovery Telephone Systems Government End of Support Hacker Personal Information Hard Drives Solid State Drive Current Events Virtualization Battery Automobile Telephony Big Data Two-factor Authentication Audit Office Employer-Employee Relationship Value Saving Time Data Breach Data Storage Data Security Mobile Software as a Service Conferencing Redundancy Maintenance Devices Tech Term Proactive Computing Wireless Internet Hybrid Cloud Business Technology Printers IT Service Machine Learning Paperless Office Backup and Disaster Recovery Voice over Internet Protocol Mobile Office Manufacturing Customer Relationship Management AI Printer Managed Services Mobile Computing Proactive IT Social Engineering Transportation Going Green Browser Applications Private Cloud Operating System iPhone Health Windows Money Facebook Administration Colocation Windows 10 Advertising PDF Apps Legal Wireless Technology Flexibility Update Cybercrime Black Market Shadow IT Disaster Education Application Save Time Work/Life Balance Office 365 Antivirus Holiday Entertainment HIPAA Phone System Analytics Electronic Medical Records Cleaning Hacking Smart Technology Vendor Management Samsung Company Culture App SaaS Upgrades Vulnerability The Internet of Things Dark Web Nanotechnology OneNote Business Intelligence Managed IT Service Data Protection Commerce Regulation Professional Services Travel Word Apple User Error Data Loss File Sharing Storage Lifestyle Evernote Workers Spyware intranet Blockchain IoT Analysis Chromebook Smart Tech Connectivity Streaming Media Content Filter Management Financial Technology Gamification Students Unified Communications Remote Monitoring Wasting Money Amazon Virtual Assistant Alexa for Business WPA3 File Storage Bandwidth Vendor Telephone Utility Computing Payroll SMB Downtime E-Commerce Payment Cards Break/Fix e-waste Employees Smartwatch Development Azure Active Directory Windows Server Cybersecurty Window 10 Online Storage Fiber Optics Windows Server 2008 Copiers Voiceover Internet Protocol Business Telephone Computer Repair Troubleshooting CRM Workstations Outsource IT PCI DSS Regulations Compliance Cost Remote Working Leadership Bitcoin Finance Infrastructure Videoconferencing Streaming Customer Service Copier Authentication Hiring/Firing RMM Windows 11 Cabling Going Paperless Inventory Management Employer/Employee Relationships Outsourcing How To Microsoft Outlook Files Regulations Paperless Solutions Microsoft 365 Strategy Consulting Decision Making Ergonomics Signage Customer Experience Robot Google Drive Miscellaneous Alert Law Enforcement Reputation Social Relocation Search Internet Exlporer Text Messaging Office Tips HaaS Video Games Scalability Humor How To Best Practice USB Virtual Reality Managing Stress Point of Sale Identity Theft Worker Commute Politics Experience Music Books Safety Emergency Worker Scam Computer Accessories Charger Computer Care Unsupported Software Television Business Strategy WiFi Unified Threat Management Consultant Touchscreen Emails Webinar IT solutions Windows 10s Hard Disk Drive iOS Computer Fan Root Cause Analysis Augmented Reality CrashOverride Settings Screen Mirroring Cast HBO IT Management IT Solutions WIndows Server 2008 Patch Management Outlook Shortcut Excel Sync Adobe Licensing Tablets NFL Windows Ink Google Maps Google Docs Microsoft Excel Sports Cortana Legislation Comparison Specifications Sales Retail Gifts Credit Cards FAQ Wireless Charging WannaCry Updates Microsoft Word eWaste Device Security Tech Support Fraud Edge Ciminal IT budget Identities Language Virus Websites Data Theft App store Mobile Security Identity Data Privacy Hard Drive Google Assistant Twitter Computer Forensics Gmail PowerPoint Memory Financial Bring Your Own Device Testing Camera Projects Display Co-Managed Services Hyperlink Wasting Time Accessory Peripheral Access Control Admin Keyboard Shortcuts Security Cameras Employee 5G Medical IT YouTube OneDrive Sabotage PC Server Maintenance Investment ROI Windows Server 2008 R2 Micrsosoft Digital Signage Processor Benchmarks Myths Threats Scams Managed Services Provider Facebook Privacy eCommerce Holidays Inventory Communitications Hosted Desktop Smart Devices Keyboard Net Neutrality Internet Service Provider Workstation Telework Audits Solutions Policy Procedure Organization Innovations Reviews Biometrics Computer Tips Work Windows 8.1 Voice Supply Chain Environment Workplace Strategies Print Management Healthcare SSD Remote Management Telephone System Print Database 2FA Virtual Desktop Proactive Management eSignature Cyberattack Cameras Digital Cameras Mixed Reality Displays