ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Backup solutions and disaster recovery strategies for small business

Updated on June 11, 2012


In the event of data loss or a catastrophic event such as a natural disaster or terrorist action, in order for the company to return to a state where business can be conducted as quickly as possible, a backup plan and a disaster recovery strategy must be in place. Not having such strategies in place and regularly tested could result in a significant monetary loss or even result in the closure of the company in the event of a significant disaster.


Backing up data and ensuring that the backups are securely stored is critical to ensure that in the event of a catastrophe or a file / folder restoration request, data can be restored. It is a critical part of any company’s IT strategy and small businesses are no different in that respect. A backup strategy should cover any data without which a company could not function either in the short or long term or the loss of which could cost the business money. Some important considerations include:

  • Backups should be held in secure location such as a safe
  • Backups should not be stored onsite
  • A restoration of backup data should be occur regularly to ensure backups are fully functional
  • Servers should have their System State backed up (please refer to the below link for further details

Within a small business, it may not be necessary to use backup tapes or backup software, it may be sufficient to backup to DVD or other removable media. The most important aspect of a backup schedule is that they are performed regularly, validated and securely stored off-site.

Cloud Computing

Cloud computing is an alternative to traditional backup options. It has several advantages including that the data is readily available in any location that has internet connectivity, as well as its cost effectiveness. There have been concerns expressed regarding cloud computing with respect to security breaches and a perceived loss of privacy. Serious consideration should nevertheless be given to the advantages of cloud computing for small businesses especially when coupled with Software as a Service (applications are installed and accessed remotely, eliminating the need to install, configure and maintain applications) due to its cost effectiveness and flexibility.

Shadow Copy

In firms with servers running Windows Server 2003 or later, Shadow Copy can be implemented on shared folders. Once implemented and configured, Shadow Copy will allow users to restore their own files in the event of file loss, corruption or if the file is accidentally overwritten. Although it requires some configuration to set up, it is significantly easier and more cost effective for users to immediately retrieve old versions of a file compared to restoring them from backups or having the employee recreate the lost work. When a user wants a file or folder restored using shadow copy, they simply right click and select Previous Versions as shown below. The user can then open files to find the one they would like to restore and then restore it simply and quickly.

Please click on the link to my Introduction to setting up Shadow Copy

Disaster Recovery

In the event of a catastrophe or disaster the ability of your business to trade may be severely impaired or even halted. To ensure that this does not happen or that any impacts are significantly reduced, a disaster recovery plan is essential. To better understand the connotations of disasters or catastrophes, an impact assessment should be completed outlining the risk and the likelihood of all possible scenarios no matter how unlikely ranging from localized power outages to widespread terrorism. Once the risks are better understood, a disaster recovery solution for your business can be outlined. There are a number of key aspects to any disaster recovery solution

  1. Creating the solution: all aspects of the business must be involved in the creation of the disaster recovery plan and must communicate their needs in the event of a disaster so that these can be covered in the plan itself.
  2. The solution must be regularly revisited by all aspects of the business to ensure that the solution continues to meet the needs of the business. Specific people should be assigned the responsibility of ensuring that the solution remains current and that regular testing takes place.
  3. Regular testing should occur at least twice a year and any shortcomings or failures must be immediately addressed. A disaster recovery plan that does not work is as bad as not having a plan in place at all.
  4. When a disaster occurs, a number of staff must be specified as being responsible for invoking the disaster recovery solution including initiating calling trees to ensure that all staff are notified.

There are many ways of running disaster recovery for a small business quite cheaply and successfully in the event that a disaster should occur.

  • Arrangements could be made with hotel(s) that a small conference room be made available at short notice as an office. This could be done with more than one hotel in a different location to provide additional redundancy. The hotel would cover the networking, telephony and office space, leaving the business to provide any computer equipment required (this could also be stored on site).
  • Another method is to rent space at a datacenter. This can include a set number of PC’s available at very short notice, configured and ready to be used. This is typically more costly depending on the number of spaces required, but the space is dedicated and manned typically 24 by 7 by 365.
  • Software as a service (SaaS) can also form the basis of a disaster recovery strategy. Using SaaS, applications are accessed remotely, enabling the applications to be available from anywhere with a stable internet connection. If the ability to access applications from anywhere with an internet connection is also allied with the storage of the company’s data in the cloud, then this gives a company a great deal of flexibility in a disaster. There is a typically a monthly fee for SaaS, but this frees the business from installing, configuring and supporting the software hosted.


A “battle box” can be compiled and stored in a secure location(s) to ensure that the business can continue in the event of a disaster. This can be used in conjunction with the solutions above, especially in a disaster that runs longer than a few days. The “battle box” should contain:

  • A full backup of your companies data
  • Copies of any documentation or paperwork your company relies on
  • Each department should provide all its essential procedures and policies
  • Enough stationary and equipment to run a small “version” of the office
  • Enough laptops to run the business in the short term
  • Mobile phones with SIM cards
  • Any software required by the business


With an educated staff and an effective and regularly tested and updated disaster recovery plan, a company should be able also to cope with anything thrown at them and to continue to prosper in any situation. If you have any suggestions or comments, please feel free to leave them in my comments section.

Alongside a backup and disaster strategy a comprehensive IT security policy should be implemented to ensure that your companies IT infrastructure is as secure as possible. Setting up such policies is covered in my hub

Good luck with your business, thanks for reading. Please feel free to leave comments!


    0 of 8192 characters used
    Post Comment

    No comments yet.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)