Tip

Week 3: Restore a backup tape and recover usable data

What
Backup data recovery

When
On a low-traffic day, 3-4 times per year, depending on the criticality of data.

Why
Running a tape to back up data doesn't ensure usable data. Every administrator has a horror story of the "tape backup with no data on it." Variations on this theme include: "we recorded it, but then it was erased when stored in a cabinet along side a magnet," the ever-popular "it was stored in a different building, which was destroyed/moved/sold, along with the contents" and the occasional "we recorded the backup to tape, then changed our primary storage mechanism, so that when we needed to restore the tapes we had no equipment to run them on." It's better to know now than halfway through the year that your data can't be retrieved.

Strategy
What are your most critical files? Try to recover e-mails from six months ago, as well as last quarter's data. Place the data back on the system to see if you can use it with the software and hardware you have in place today. This information may have to be produced for legal purposes if, for example, you are audited or need the information to trace illegal employee activity or fraud. If you use a service, choose a time period and ask them to restore those files for you on the system you are currently using.

More information
If you have a problem that you can't troubleshoot, your equipment rep and/or service agreement support personnel

    Requires Free Membership to View

should be able to assist you. If you want to feel better about your technical abilities, visit http://www.techtales.com. These are stories from help desk personnel -- you'll be laughing and feeling better in no time!

Last week: Passwords -- Updating, selecting and recording user and administrative passwords
Next week: Disaster recovery/business continuity for hardware

About the author
Shelley Bard, CISSP, is a senior security network engineer with Verizon Federal Network Systems (FNS). An infosecurity professional for 17 years, Bard has briefed and written infosecurity assessments and technical reports for the White House and Department of Defense, special interest groups, industry and academia. Please e-mail any comments to securityplanner@infosecuritymag.com.

Opinions expressed in this column are those of Shelley Bard and don't necessarily reflect those of Verizon FNS.


This was first published in December 2003

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.