Your data is a core part of your business.

Protecting this data from loss or theft, whether hardware failure, human error, natural disaster or security breach, has never been more important. There are measures that you can put in place to protect your data and your business.

Developing an effective backup, disaster recovery and business continuity plan is key. At PCR Connected, we work with select backup and disaster recovery providers to deliver a range of secure data storage solutions for individual budgets and requirements.

How PCR Connected can help

We work with you to identify the most appropriate backup and disaster recovery solution for your business. We consider the size of your data files, backup frequency, ease of data recovery and cost implications.

Our customers appreciate our agnostic approach and benefit from the peace of mind that their data is safe, secure, and retrievable whenever they require.

We deliver backup and disaster recovery services from the following providers:

  • Hornet VM Backup (formerly Altaro)


    Virtual backup for small and mid-sized businesses, Hornet VM Backup provides a fast, affordable and high performing backup solution for Hyper-V and VMware, enabling a business to backup data to local, removable or cloud storage. Hornet VM backup can also be configured with your immuntable backup strategies.

  • ConnectWise Saas Backup (formerly Skykick)


    ConnectWise Saas backup offers unlimited backup for Exchange, SharePoint, Teams, Planned and OneDrive for Business with up to six snapshots daily, protecting your 365 data from malicious, deliberate or accidental loss.  Admins can quickly find lost data and restore it to its original location with a single click.  The solution automatically discovers user 365 accounts and data, making ongoing protection seamless.  ConnectWise Sass Backup provides unlimited retention for a fixed price.

  • Ontrack


    For those scenarios when your backup has not been successful, Ontrack specialise in recovering and restoring your data from failed hardware.

Frequently Asked Questions

You can avoid downtime by monitoring your network, implementing regular backups, ensuring your systems are kept secure and up to date, not using end of life software and having a disaster recovery plan in place. Working with a trusted IT support partner to manage and secure your systems can be a proactive way to avoid downtime. Read about this in more depth in our article How To Avoid Downtime.

The terms backup, disaster recovery and business continuity are often used interchangeably. Whilst the practises are closely related, their scope differs. Backup refers to copying data for recovery should the original become lost or damaged. The frequency and nature of backups depends on a businesses’ individual requirements, budgets, data volumes and bandwidth. Disaster recovery refers to the process of replicating your computing environment – data, systems, networks, and applications, allowing your business to operate as usual. A backup strategy is the first part of a disaster recovery plan that ensures your data can be recovered in an alternate environment. Learn more about the differences here.

The most common sources of data loss are:

• Hardware failure
• Viruses and malware
• Ransomware
• Accidental or malicious deletion
• Software malfunction
• Theft and natural disaster

Read our checklist for disaster recovery after data loss so you can minimise the likelihood of it happening to your business.

Whether you are looking for remote or onsite IT support, network design, IT security services or a specific software solution, we can help!

Having regularly scheduled backups and storing them safely is paramount to protecting your business against data loss. We recommend encrypting your data backed up at rest, plus regular testing of backups via simulated data loss scenarios to prove they are fully restorable. Setting up alerts and regular monitoring of your systems will help ensure any potential issues are identified and resolved before they become a problem. Reviewing your IT security processes and procedures is equally important. Read our Ultimate Guide to your IT Security for more information.