The 3-2-1 rule reduces your risk of losing all your data

March 31st is World Computer Backup Day. This is an opportunity to remember a few basic computer hygiene rules to minimize the risk of data loss.

March 31 is World Computer Backup Day. An initiative that hundreds of Internet users should probably have followed, to avoid certain disappointments. Indeed, it happens that hackers empty storage spaces or more simply, steal passwords and take control of cloud accounts, often linked to an email address.

Infostealers – malware that digs into password managers – are all the rage, and more and more individuals and businesses are permanently losing access to all of their files in a matter of seconds. minutes To avoid a similar problem, let’s remember some useful computer hygiene rules to protect your data.

For further

The 3-2-1 rule

In IT, there is a fairly simple method to remember to best protect your data: the rule of “3-2-1“.

For all your sensitive data, you should have 3 prints on 2 different supportsof which 1 is kept in another location.

Multiplying backups avoids unpleasant surprises // Source: Acronis
Multiplying backups avoids unpleasant surprises // Source: Acronis

Let’s illustrate the principle concretely: if I want at all costs to keep the photos of my Breton weekend in 2004, I have to make two copies of these files in addition to the “original” photo folder. I would have three backups. Then, to further reduce the risks, it is advisable to make these copies on at least two different media. One can for example be on an internal hard drive, and the other on an SD card. The remaining copy that should be stored away from home, for example in the cloud. So even in the event of a fire or burglary, you won’t lose your data.

Widely used in the professional world, this rule is more difficult to apply by the general public. Making copies of several hundred gigabytes of data is not always easy. But if you have files of the utmost importance (the beginning of your novel, your almost finished thesis, a particularly precious photo), then it is worth investing some time and money to protect at least these files. -there.

Keep your devices up to date

For a machine connected to the Internet, not following the “updates” constitutes a real risk. Having an up-to-date device is the best way to guard against possible attacks since the manufacturer itself conducts security audits on its devices (ideally).

This advice also applies to your smartphones, your computer, your connected bulbs or your smart TV. Any device connected to the Internet is a potential access point in your network.

What if I have already lost my data?

If you have already lost your files, there are specialized data recovery software. Some like Recuva are free, but the most advanced solutions are often chargeable and unfortunately none can guarantee complete recovery of your data.

Companies specializing in data recovery can also help you in your task and dissect your hard drive with professional tools. Here again, it will be necessary to get your hands on the wallet, without guarantee of results.

If you were a victim of the My Book Live attack, Western Digital has announced that a data recovery program will be launched starting in July.

Do you want to know everything about the mobility of tomorrow, from electric cars to pedelecs? Subscribe now to our Watt Else newsletter!

Source link -100