Your data is a core part of your business.

Protecting this data from loss or theft, whether hardware failure, human error, natural disaster or security breach, has never been more important. There are measures that you can put in place to protect your data and your business.

Developing an effective backup, disaster recovery and business continuity plan is key. At PCR Connected, we work with select backup and disaster recovery providers to deliver a range of secure data storage solutions for individual budgets and requirements.

How PCR Connected can help

We work with you to identify the most appropriate backup and disaster recovery solution for your business. We consider the size of your data files, backup frequency, ease of data recovery and cost implications.

Our customers appreciate our agnostic approach and benefit from the peace of mind that their data is safe, secure, and retrievable whenever they require.

We deliver backup and disaster recovery services from the following providers:

  • Acronis Backup

    Complete backup and data protection, whether your data is stored on-premise or remotely in private and public clouds. Acronis Cyber Backup offers an affordable on-premise and cloud solution.

  • Veritas Backup Exec

    Similar to Acronis, Veritas Backup Exec is a sophisticated backup and recovery solution which allows you to easily backup physical or virtual machines on or off-site.

  • Altaro

    Virtual backup for small and mid-sized businesses, Altaro VM Backup provides a fast, affordable and high performing backup solution for Hyper-V and VMware.

  • iomart

    Cloud backup delivering a secure and cost-effective solution which eliminates the need to store magnetic discs or drives on site. iomart provides granular and full backups, with the ability to restore either individual files or entire systems.

  • Ontrack

    For those scenarios when your backup has not been successful, Ontrack specialise in recovering and restoring your data from failed hardware.

Frequently Asked Questions

You can avoid downtime by monitoring your network, implementing regular backups, ensuring your systems are kept secure and up to date, not using end of life software and having a disaster recovery plan in place. Working with a trusted IT support partner to manage and secure your systems can be a proactive way to avoid downtime. Read about this in more depth in our article How To Avoid Downtime.

The terms backup, disaster recovery and business continuity are often used interchangeably. Whilst the practises are closely related, their scope differs. Backup refers to copying data for recovery should the original become lost or damaged. The frequency and nature of backups depends on a businesses’ individual requirements, budgets, data volumes and bandwidth. Disaster recovery refers to the process of replicating your computing environment – data, systems, networks, and applications, allowing your business to operate as usual. A backup strategy is the first part of a disaster recovery plan that ensures your data can be recovered in an alternate environment. Learn more about the differences here.

The most common sources of data loss are:

• Hardware failure
• Viruses and malware
• Ransomware
• Accidental or malicious deletion
• Software malfunction
• Theft and natural disaster

Read our checklist for disaster recovery after data loss so you can minimise the likelihood of it happening to your business.

Whether you are looking for remote or onsite IT support, network design, IT security services or a specific software solution, we can help!

Having regularly scheduled backups and storing them safely is paramount to protecting your business against data loss. We recommend encrypting your data backed up at rest, plus regular testing of backups via simulated data loss scenarios to prove they are fully restorable. Setting up alerts and regular monitoring of your systems will help ensure any potential issues are identified and resolved before they become a problem. Reviewing your IT security processes and procedures is equally important. Read our Ultimate Guide to your IT Security for more information.