Our File and folder Backup

TecSec’s file and folder backup is designed to enable recovery of data whilst providing a sound level of protection, so in the event of a disaster we can recovery your files.

Key Features of our File and Folder Backup:

Backup Scheduling – Each client’s requirements vary for backup. Our backup scheduling lets you specify which data you want and how regularly you wish the designated backups to take place.

Retention scheduling – Allows you to specify the period of time after a document was created, deleted or changed  from which you can recover old versions of files, files that have been deleted accidentally etc.

Email Notifications – We can provide you with progress updates on the status of your backup.

Seed Loading of Your First Backup – This secures your data onto an external storage medium. From thereon, we will provide safe and efficient backup to a UK data centre.

Benefits of File and Folder backup:

You can schedule what day(s)and time(s) you wish to backup your data

You can backup SQL (Structured Query Language) databases

On-demand file restore

You can recieve daily notifications of the status of your backup

You can choose what specific files and amount of data you wish to backup

If you are looking for a more complete and advanced level of recovery than just your files, then we advise clients that TecSec’s advanced system imaging and disaster recovery services would probably be more appropriate.

Speak to us for an honest assessment and recommendation as to whether file and folder backup is sufficient for your business, or whether a more advanced option is needed.

This decision will be influenced by:

  • Recovery Point Objective (RPO) – How recent a backup does your business need to have available for a sufficient recovery, following a cyber attack or natural disaster?
  • Recovery Time Objective (RTO) – How long can you afford for your business to be down as a result of a disaster event?
  • Your server requirements, user permissions and quantity of data.
  • The number of users reliant on the data that is being protected.