104 1/2 W 9th Ave Suite 500

Winfield, KS 67156

Mon - Thurs 8 am - 5 pm CT

Fri 8 am - 4 pm CT

Stay Up-To-Date On Cybersecurity And Website Information. Join Our Newsletter Today!

Logo for Custom Internet Services LLC

104 1/2 W 9th Ave Suite 500

Winfield, KS 67156

Mon - Thurs 8 am - 5 pm CT

Fri 8 am - 4 pm CT

104 1/2 W 9th Ave Suite 500

Winfield, KS 67156

Mon - Thurs 8 am - 5 pm CT

Fri 8 am - 4 pm CT

Stay Up-To-Date On Cybersecurity And Website Information. Join Our Newsletter Today!

Multiple Devices

What Needs Protected And Why?

  • Don't loose valuable information
  • Know what you have
  • Keep your data safe
  • Know why you need to protect your data
  • Make a plan and stick to it

What do you need to protect?

People are often amazed at the variety of data that needs protected. While not an exhaustive list, you will likely find that you need to protect these types of data –

  • Email archives or Exchange data stores
  • Laptop/Desktop files
  • Network device configuration files
  • Tablet/Mobile device documents
  • Documents stored in cloud services
  • Databases
  • SharePoint files.
  • Virtual Machines
  • Server/Laptop system images
  • Photos

Why you should protect your data

So let’s begin with the ‘Why’ part of the question. Why do I need to worry about data protection? The simple answer is that you need to worry about protecting your data because your data is – in almost every situation – the most valuable component of your system. It represents thousands of man hours of work, and most of it is probably irreplaceable from paper records alone. Protecting your data is a form of insurance that is very inexpensive compared to the potential risk cost.

There are lots of potential causes of data loss.  Some of the most common that we’ve seen are —

  • Accidental deletion by a user
  • Failure of a hard drive
  • Malware or cyber attack
  • Intentional deletion by an unhappy (ex)employee

make your plan and stick to it

Good training doesn’t cost – it actually pays off big for your organization. Custom Internet Services has developed a class to help your business develop a plan to protect your data.  This  class can be presented in person or as a webinar. For more information on this class click here.

Magnifying Glass for looking closely

What do i look for in a provider?

  • Certified Data Centers
  • Encryption
  • Competitive costs
  • Handles different types of data
  • Easily recovery data

top 5 things to look for in a provider

Certified Data Centers that are dispersed geographically

 You want to be sure that your data is stored in top quality data centers that have met industry standard qualifications.  Too often cheap backup providers use substandard environments.

If you’re in a regulated business that requires SOX or HIPPA compliance, be sure that your backup provider also meets these requirements.  And even if you’re not in a regulated business, it’s still good to know your backup provider meets high levels of compliance.

Earthquakes, hurricanes, tsunamis are all part of life on this planet.  Look for a backup provider that stores your data in at least two geographically dispersed locations so there is less chance a natural disaster will destroy your information.

data is encrypted & system is easy to use while competitive in cost

 Look for your backup solution to encrypt data in at least three locations

    • Any temporary files created by the backup software on your computer or device;
    • While in transit over the internet between your computer and the backup location;
    • While stored at the provider’s data center.

 Comparing apples to apples can be difficult. Yet you don’t want to spend an exorbitant amount for backups.

Is the backup software easy for your users? Can it run automatically in a ‘hands off’ configuration?

backups managed from a central location

 You will likely have information across multiple computers and devices.  Look for a system that allows backup on all these devices to be managed from a central control console.

needs to handle multiple devices and types of data

All backup providers handle windows machines.  Look for a system that also handles the other device types (IOS, Android, MAC, Linux file shares, etc) in your environment.

You probably have lots of things besides just files – sql databases, exchange mailboxes, photos. Maybe even virtual machines. Will your backup provider handle all these data types?

keep multiple versions of data and easily recover data

 Lots of backup providers advertise that they keep versions, but what may be harder to find out is how many versions they keep.  A provider that keeps 30 days of versions for a particular file may not be sufficient if you discover your computer was infected by malware 45 days ago. That means all the versions that are backed up may also be infected.

 If you need to recover, how easily can you do it?

need help making a decision

With all there is to consider, it can get overwhelming. We believe the LockYourData.com backup system that is offered by Custom Internet Services meets and exceeds all the requirements. Check out what it can do for you and contact us if you have any questions.

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
  • Windows XP, Vista, 7 and 8 Pro
  • Windows Server 2003, 2008, 2012 and Small Business Server
  • Mac OS X 10.6 and up
  • iOS 6.0 and up (must be performed manually)
  • Linux volumes supported by network-mapping to a PC or Mac
  • External Storage Devices (USB, FireWire, Thunderbolt, eSATA)
  • 24-Hour manned security and video surveillance
  • Proximity security badge access
  • State-of-the-art smoke and fire suppression
  • Temperature controlled environment systems
  • Seismically-braced construction
  • Redundant backup power systems
  • United States (Dallas, Houston, Louisville, and Los Angeles)
  • Canada (Toronto)
  • Australia (Melbourne)
  • United Kingdom (London)
  • South Africa (Johannesburg)
  • HIPAA (Health Insurance Portability and Accountability Act)
  • Sarbanes-Oxley (SOX)
  • US EU Safe Harbor
  • PCI
Logo for Custom Internet Services LLC

backup your data while you can

Subscribe

* indicates required
Custom Internet E-mail Groups

Custom Internet Services LLC will use the information you provide on this form to be in touch with you and to provide updates and marketing. Please let us know all the ways you would like to hear from us:

You can change your mind at any time by clicking the unsubscribe link in the footer of any email you receive from us, or by contacting us at steve@custominternet.biz. We will treat your information with respect. For more information about our privacy practices please visit our website. By clicking below, you agree that we may process your information in accordance with these terms.

We use Mailchimp as our marketing platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp's privacy practices here.