Off-site & On-site Backup
Data can be primarily backed up by two different methods. Initially On-site and Off-site backups work in much the same way : you choose which files you need backed up and how often and you send them to the appropriate storage area.
In an On-site backup this will be a suitable storage unit connected to the server.
In the case of Off-site backup it is first encrypted and then sent securely across the internet to our backup servers.
There are many advantages to an Off-site backup arrangement over the On-site backup arrangement though, including the following:
- Simple, quick and DIY recovery of lost files and data
- Off-site storage offering full protection against theft, natural disasters or malicious damage
- Multiple copies kept to ensure continuous availability
- Military standard encryption before leaving your premises for storage
EC IT provide hard drive repair and data recovery services on all manner of storage devices from USB Memory and Flash storage through to hard disk drives and RAID storage arrays.
EC IT can advise you in every step of the process, from preparing for data loss situations through to handling your failed media and the resulting recovery process.
Advice, support and help with your data loss is available at the end of a telephone. If you have experienced data loss and are looking for a company to help you, you want to ensure that your data is in safe hands.
Anti-Virus & Security Products
Security is given a high priority by larger organisations but many smaller companies fail to realise the importance until it’s too late.
The most common problem within Enterprises is a false sense of security. Do you know if your system is secure or do you just think it is? We are able to survey, recommend, implement and maintain suitable hardware and/or software security systems that will help protect your business from potential threats.
We regularly implement a full range of security solutions:
- Anti-SPAM Software
- Anti-Spyware Software
- Anti-Virus Software Software
- Hardware Audits for Hidden Vulnerabilities