Close this search box.

3-2-1 Backup Strategy: The Rule of Three

Table of Contents

[fusion_builder_container type=”flex” hundred_percent=”no” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_color=”” video_preview_image=”” border_color=”” border_style=”solid” padding_top=”” padding_bottom=”” padding_left=”” padding_right=””][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ background_position=”left top” background_color=”” border_color=”” border_style=”solid” border_position=”all” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding_top=”” padding_right=”” padding_bottom=”” padding_left=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” center_content=”no” last=”true” min_height=”” hover_type=”none” link=”” border_sizes_top=”” border_sizes_bottom=”” border_sizes_left=”” border_sizes_right=”” first=”true”][fusion_text columns=”” column_min_width=”” column_spacing=”” rule_style=”default” rule_size=”” rule_color=”” content_alignment_medium=”” content_alignment_small=”” content_alignment=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” sticky_display=”normal,sticky” class=”” id=”” margin_top=”” margin_right=”” margin_bottom=”” margin_left=”” font_size=”” fusion_font_family_text_font=”” fusion_font_variant_text_font=”” line_height=”” letter_spacing=”” text_transform=”none” text_color=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=””]3-2-1 backup strategy is a staple of any BCDR plan.

The principle behind this backup strategy is that by layering different versions of your data in multiple places, you’re ultimately able to weather any disaster.

But what is the 3-2-1 Backup Strategy?

The 3-2-1 backup strategy means keeping 3 versions of your data, with 2 versions stored in at least two types of local storage, and 1 version maintained in the cloud.The reasons for three versions are as follows:

  • Your primary version is the data that your businesses uses daily. This is likely your server, or your main PC or laptop.
  • A 2nd copy, stored locally, is highly recommended. This means that you have immediate access to an on-site version, should you need a system restore.
  • Your 3rd version is situated in the cloud. This is your key insurance measure, should you suffer an on-site disaster.
    • Without a layered approach to backup, your business continuity & disaster recovery plan is not fit for purpose.

    And to forego backing up your business data at all is a reckless gamble on the future of your business. Without this procedure in place, your primary device is the sole copy of your business data.

    Lose that? You’re going out of business.

    Backup in Action!

    The principle behind the 3-2-1 backup strategy is that your data is secure and easily available, no matter the disaster. Let’s look at some scenarios.

    Natural Disaster

    If you’re unfortunate enough to lose access to your premises due to an office fire or flood, then a cloud copy of your business data will allow your business to continue trading as normal in an alternative location.

    Hardware Failure

    Sometimes technology fails, whether it’s your server or your PC or laptop devices. When this happens, you risk losing all your data stored on those particular devices.

    If this happens, all you need to do is use your high-performance virtual machine to retrieve the latest copy of your backed up data. You’re even able to connect it to a display monitor and continue working locally through the virtual machine until a replacement server or device has been actioned!

    Cyber Attack

    By using a 3-2-1 backup strategy, you’re protected against permanent data loss – even in the event of a cyber attack.

    Imagine if your business was struck by a ransomware attack like WannaCry – this would mean that your business data would be locked behind a paywall by cyber criminals, preventing you from doing anything on your device other than paying the ransom.

    Our solution contains ransomware detection, identifying which of your previous versions are infected and which are not. This means that if your business network and devices are infected, you can simply return to the latest version of your data before the attack occurred. No ransom, no problem!

    Historically, backup has been a manual process, requiring an individual to back business data up to tapes or external drives, transport them off-site, and repeat the same process the next day.

    This is no longer the case.

    Our solution is automatic and can be configured to back up as frequently as you require. It also gives you screenshot verification, delivering peace of mind and keeping you safe in the knowledge that your business continuity & disaster recovery plan is functioning as intended.

    Neuways now offers Disaster Recovery as a Service (DRaaS). To speak to us about this,
    or any queries about your backup strategy, call us on 01283 753 333 or email


Want to keep up with our blog?

Get our most valuable tips right inside your inbox, once per month!

Latest IT News & Insights
Phishing Awareness Training
How To React To The Rise In Quality of Phishing Attacks
Be Cybersafe, stay informed, stay vigilant, and let Neuways help you build a strong and secure defence...
Read More
IT Support issues can be resolved by working with companies like Neuways
IT Support issue caused Cornwall Hospital Disruption - Not Cyber Attack
IT Support issues - It's all about backup protocols. These Issues caused disruption in Cornwall. but...
Read More
Neuways explain how to help move IT offices seamlessly.
How to seamlessly move offices without your IT being affected
Moving offices as a business does not have to be complicated. Make life easier for your team by enlisting...
Read More
Choose Neuways for your IT Support, Cyber Security and Business Central needs.
Become Cybersafe: Listen to our Cybersafe Digest Podcast
As leaders of businesses and companies, the weight of safeguarding your company’s assets, reputation,...
Read More
Use a password manager tool like the ones recommended from Neuways
Best thing about using a Password Manager tool
When using a password manager tool, you can store all your login details in one accessible place. It's...
Read More
Cyber Security Representation
The Critical Need for Businesses to Strengthen Cyber Security in the Age of AI
Businesses must take note of the dangers of AI and Cyber Security. In our latest blog we explain the...
Read More
IT Support in Derby from Neuways
What Questions should you be asking your IT Support Provider?
Choosing the right managed IT service provider (MSP) is crucial for your business’s success, and...
Read More
Microsoft Dynamics 365 Business Central Main Product Mockup Showcase ERP
Why Business Central enhances and streamlines solutions
See how Microsoft Dynamics 365 Business Central enhances business solutions and streamlines the processes...
Read More

Frequently Asked Questions

As a leading IT and technology provider, we offer three core services, all of which have additional add-ons. We offer Managed IT Support, Business Central implementation and consultation, as well as Managed Cyber Security. Call us on 01283 753333 if you are interested in any of our services.

Contact us

Support: 01283 753300

Business Development: 01283 753333

Purchasing: 01283 753322

Admin and Accounts: 01283 753311


Managed IT support is a comprehensive solution where an expert IT provider, like Neuways, handles your technology infrastructure. This includes proactive monitoring, maintenance, cyber security, and support.

Yes we do. Your business needs Cyber Security due to the increasing number of cyber threats that are affecting businesses in all industries. If your business has data and technology systems implemented, you will need Managed Cyber Security.

Yes we can. We have our own dedicated Microsoft Dynamics 365 Business Central teams who work to ensure that we can implement the right systems and solutions into your website that are absolute right for you. 

Exclaimer Pro is a dynamic email signature that helps clients to switch and change around email signatures so that clients are able to advertise different offers and brands to a variety of email recipients. Administrators can also manage user emails internally, meaning the user does not have to touch their own email signature.

We offer Managed Security Training to help employees spot email phishing attacks, spear phishing attacks and vishing attacks. We also help train clients on how to use the various pieces of software we provide to clients, like Exclaimer Pro, Business Central and Cybersafe software.

We are a Managed IT Support provider based in Derby, East Midlands. However, we cover so many areas including the whole of the UK, Europe, and America. We are always willing to travel and send our expert technicians to ensure you have the best experience. 

Got a question?

Reach out
& Connect

Please enable JavaScript in your browser to complete this form.