We only offer B2B services, our prices do not include VAT
Prevent data loss

Data backups

A regular data backup is essential to prevent data loss caused by hardware defects or user error, as well as to ensure access to business-critical data in case of a ransomware attack.

However, for a data backup to be useful, the recovery process must also be tested regularly, checking recoverability and completeness of the data.

Safe & reliable

Strategic backups

In order to have a backup that is as reliable as possible, it can be useful to follow the “3-2-1 rule”: This involves storing at least 3 copies of the data on at least 2 different types of media (such as hard drives, tape drives or cloud storage solutions), and at least one backup should be stored in a remote location.

Backups should not be overwritable if possible to prevent a ransomware attack on the backup. It is possible to operate a backup solution to which only new backups can be written, but old backups cannot be edited.

All-inclusive package

Our services

  • Cloud backups (AWS, Azure, Backblaze, etc.)
  • Local backups on server hardware
  • External backups
  • Backup recovery
  • Hardened Linux repositories for backup servers
  • Immutable (read-only) backups
  • Integrity checks of your data
  • Malware checking of backups

You are interested?

We're happy to help you

phone Call us email Write us an email

Send us a message

Contact form

Make your infrastructure less vulnerable

IT security

Firewalls

security

With a well-configured firewall, you can detect and prevent unwanted communication attempts within your network.

Data backups

save

With an appropriate backup strategy, you are protected against data loss caused by hardware defects, user error or ransomware attacks.

Email security

mail_lock

Ensure trustworthy and secure communication over email using encryption, signature and malware scanning.

Password management

password

Password managers with the option of sharing paswords within your team offer a great mix of security and convenience.

Authentication

key

We will happily implement enterprise authentication solutions using single sign-on (SSO) and multi-factor authentication (MFA).

Penetration tests

bomb

Our systematic pentests using both technical attacks and social engineering can uncover weak spots in your IT security.