Tag: backup

Data BackupFor Business

Full and Incremental Backup with GoodSync

There are three basic backup types: full, differential, and incremental.

Full Backup creates a copy of all files as they were at the time of the backup.

Differential Backup creates a copy that contains only those files that have been altered since the last full backup.

Incremental Backup creates a copy that contains only those files that have been altered since the last backup, incremental or full.

This article will describe how to implement a daily Incremental Backup with a periodic weekly Full Backup using GoodSync. You can easily implement backups with different frequencies, using information found within this article.

If you do not currently own a GoodSync license,  download the free 30-day fully-functional trial.

We will use four GoodSync features:

  • on-file-change automatic synchronization option
  • periodic automatic synchronization option
  • time-based parametrization in folder paths
  • ability to create destination folders that do not exist

You can read more about these subjects in the GoodSync Manual:

https://www.goodsync.com/manual#auto_tab

https://www.goodsync.com/manual#environment_variables

Step 1: Setting up paths

Source folder: set your left path to be the source folder you want to back up. This approach only works when your source folder is local. This requirement is needed due to the fact that file monitoring only reliably works on a computer’s local drives.

Destination folder: add time-based parameters to the right path to set up the destination folder.

GoodSync supports the following variables:

%YYYY% — current year.

%MM% — current month, from 01 to 12.

%DD% — current day of the month, from 01 to 31.

%DOW% — current day of the week, from 0 to 6.

%WOM% — current week of the month, from 1 to 4.

%HH% — current hour, from 00 to 23.

%II% — current minute, from 00 to 59.

For example, a destination path can be set to:

C:\Backup Destination Directory\Backup %YYYY%-%MM%-%DD%\

Each time GoodSync runs on a new day, it will create a new directory (ensure the “Create Folder if Does Not Exist” option is ON) with the full date. For example, on February 7, 2018 full back will be performed to this directory:

C:\Backup Destination Directory\Full Backup 2018-02-07\

The destination folder can exist on any of the file systems supported by GoodSync:

https://www.goodsync.com/manual#file-systems

Step 2: Setting up automation

Right click on the job you are editing, select the “Options” menu item.

In the Options window, select the “Auto” menu item.

In the auto section, check “On File Change“ and “On Schedule” checkboxes.

GSbackup1

Click the “Configure…” button to select the scheduling details:

GSbackup2

Click the “Configure…” button and select the desired schedule, e.g., on Sundays:

GSbackup3

This particular setting will force GoodSync to perform a full backup once a week on Sundays

What to expect

After you enter all these settings and save the Auto settings, the following will happen:

GoodSync will create a subfolder at a destination folder with today’s date.

GoodSync will perform a full back of the source folder into the destination folder.

After the full backup is finished, GoodSync will start monitoring the source folder for changes and sending copies of all changed / newly created files to the destination folder.

The following day, GoodSync will create a new folder with the new day’s date and will send all changed / newly created file on that date to that new folder.

When Sunday comes, GoodSync will continue monitoring and propagating changes, but at some point will also make a full copy of the source folder to the destination folder.

This process will continue daily.

A data purging process can be performed via scripting. Scripts can either be run on schedule independently or executed as a post-synchronization script for GoodSync.

You can read more about GoodSync built-in scripting here: https://www.goodsync.com/manual#scripts_tab

 

 

 

Data BackupFor BusinessGeneral

The 411 on Ransomware

In light of last month’s cyberattack that originated in and quickly spread ransomware across several countries including the United States, you may be wondering – what exactly is ransomware, what’s the likelihood you’ll be affected, and how can it be prevented?

What is Ransomware?

Ransomware is an increasingly popular form of malicious cryptography that infiltrates computer systems, encrypts as much data as possible, and keeps it as a hostage until the victim pays the demanded ransom for the decryption password. The ransom is most often demanded in the form of a digital currency known as “Bitcoin.”

How does it spread?

The attack typically manifests through email phishing campaigns. Once the victim clicks on the link or opens the attachment, the computer becomes infected, encrypting or “locking” the victim out of their files. According to Malwarebytes, roughly 60% of malware payloads in Q1 2017 were ransomware. Other forms of ransomware, however, can travel between computers without user interaction. The “WannaCry” attack being a prime example.

NotPetya, the name given to the ransomware strain first detected in Ukraine, affected computers by using vulnerabilities in the NSA hacking tool known as EternalBlue. By entering Windows-operated machines with unpatched security, the malicious software stole passwords in an attempt to gain administrator access over the entire network. Forced updates then led to mass infection and the encryption of hard drives. It’s worthwhile to note, however, that researchers and academics are now saying the attack was most likely engineered to damage IT systems rather than extort funds.

Who does it affect?

Ransomware affects individuals, as well as companies and organizations – big and small. According to Cybersecurity Ventures, they predict the cost of ransomware damage this year to exceed $5 billion, up from $325 million in 2015.

Since the majority of ransomware occurs through phishing email attacks, perpetrators count on three things:

  1. Action – you’ll click on the link or download the attachment (either out of curiosity or unintentionally). One wrong click is all it takes
  2. Poor cyber hygiene – lack of measures including email authentication, intrusion prevention software, and web browser protection.
  3. Lack of backups – failure to regularly and routinely backup data, especially business-critical data or highly sensitive personal/customer oriented data.

What can I do?

  1. Backup, backup, backup. Ensure you don’t lose valuable data (and potentially customers) by having to choose between satisfying the demands of your attackers or losing your data forever…or in some cases – both. You can back up critical data using a service such as GoodSync Connect File Transfer Protocol (GSTP) which allows for your backup to go over an encrypted secure channel that ransomware attacks cannot infect, ensuring your backups are secure from even the most advanced ransomware of today. Remember to make sure your mission-critical data is always backed up outside of the ransomware proven infection range. Do not rely on the system security to prevent these attacks; we all seen those fail time and time again. Modern data backup strategy must be flexible enough to mitigate all risks listed below. Such a strategy must include multiple copies of mission-critical data made on geographically dispersed storage mediums, as well as a variety of automation options to match the specifics of each given destination. Below is a table which summarizes suggested backup strategies based on the most likely causes of data loss in today’s dynamic environment.GS_ransomware
  2. Establish a business continuity plan in an effort to successfully recognize, advert, and minimize risks.
  3. Ensure your security software is up-to-date. Click here to see PC Magazine’s top 2017 recommendations.
  4. Educate yourself, your employees, and your colleagues on safe online practices. With the increase of BYOD work environments, it’s important to mitigate risk through clear policies and protocols, particularly when it comes to the creation and use of passwords. Password Managers such as RoboForm help remove the burden and greatly increase security for both individuals and businesses.

Regardless of motive, ransomware is a real and active threat and it does not discriminate. As 2017 progresses, ransomware will undoubtedly evolve, presenting new variants and tactics.  Whether as an individual, business, or organization, ensure you’re taking the proper precautions, removing the incentive for cybercriminals and mitigating losses. And remember, GoodSync allows businesses to completely customize a backup strategy for each given environment by combining the world’s most advanced data backup options with the variety of backup destinations in an easy to use interface. By combining multiple data backup destination options with flexible automation modes, GoodSync can mitigate the entire spectrum of data loss threats, including ransomware.

 

new release

GoodSync 10 updates: official Mac release and new unified licensing

Today we have two exciting announcements:

  1. The official release of GoodSync 10 for Mac has arrived. Similar to its Windows counterpart, the software features an updated interface, additional storage options, end-to-end data encryption, faster backups, and improved organization for Jobs.
  1. For increased convenience and flexibility, we have unified our personal desktop licensing and created a single GoodSync 10 for Windows/Mac license. Previously, the Windows and Mac versions were licensed separately.This single license now allows you to activate on either a Windows or Mac operating system.

Download GoodSync 10 for Mac | Upgrade from GoodSync 5 for Mac

Data BackupData Synchronization

Creating a Comprehensive File Strategy

The older we get, the more complicated our lives become; with that complication comes the responsibility of managing an array of sensitive information. While simply “jotting it down,” saving to an external drive, or attaching to an email may have worked in the past, today’s online ecosystem calls for a more secure and efficient manner of storing and sharing information. With a multitude of cloud services, as well as an increase in highly publicized hacks and breaches, navigating the world of online backup and synchronization can be overwhelming – but it doesn’t have to be. Both security and practicality can be achieved by adopting a file strategy that offers online and offline capabilities under one umbrella.

“The Cloud” – For the most part, we’ve all used it or at least heard of it. And, while its invisibility boggles the minds of many, cloud computing has become ubiquitous. The cloud can be an efficient and effective way to save and share information, while allowing users to avoid upfront hardware costs. As with any public service though, security risks are present.  Here’s where GoodSync comes in. GoodSync software allows you to easily and effectively backup and restore your files without compromising your security. This can be done between a computer and another storage device (e.g. another computer, a removable disc, a flash drive or a smartphone), a computer and a remote computer or server, or on a single computer (backup only).

Because GoodSync also offers the capability of utilizing cloud services, you may wonder which options you should utilize when. The short answer is – it all depends on your specific need. If you’re producing something that you’d like to easily share with others, syncing to a cloud server such as Dropbox, Google Drive, or OneDrive is most likely you’re best option as it will be easily accessible to all involved. If, however, you’re trying to store personal information such as your tax returns, rather than utilizing your cloud storage, especially since additional storage comes at a cost, it would be most beneficial to backup this information to another storage device such as an external drive.

In terms of security, regardless of whether you’re backing up and syncing to the cloud or a private device, GoodSync’s optional encryption feature allows you to safely save and sync both the name and the contents of the file. And, while the cloud does come with a level of security risk, if it were hacked, your information would be encrypted, creating a significantly more difficult time for the hacker.

In addition, programs such as GoodSync afford their users with certain conveniences that the cloud does not offer. Among them: Parallel Threads, propagated and unpropagated deletions, and automatic synchronization scheduling. With the former, GoodSync allows the user to run syncs parallel to one another, resulting in faster file transfer speed. The ability to turn on and off deletion propagation increases storage space and minimizes accidents, and with automatic synchronization you can set when you’d like your files synced (ie: Every X minutes, a recurring day and time of the week, when GoodSync Starts, when Windows logs off, or when any file in the sync folder changes. Another added benefit – no disruptions. Cloud services can experience outages, but when utilizing an offline backup option, this inconvenience disappears.

As you look to create a file strategy, we urge you to neither limit nor overwhelm yourself with options. Prioritize your objectives and list out any constraints you may have, whether that be time, cost, storage space, or security requirements. From there you’ll be able to determine what strategy (online, offline, or both) is best suited for individual tasks. And, by selecting software such as GoodSync, you’re leaving your options open, while maximizing speed and security and minimizing upkeep. After all, if you can have everything you need in one tool, why wouldn’t you?