Blog Layout

You Still Need to Back Up Your Microsoft 365 Data

 

Multiple organisations have settled on cloud-based Software-as-a-service (SaaS) solutions from the Microsoft 365 (M365) family of products.

This is understandable as M365 provides rich applications and services that are easy to commission and onboard users without any on-premise infrastructure management. 

 

Do you need to back up Microsoft 365 data, such as the emails in Office 365? It’s a question that’s often asked. And it’s a question that’s frequently answered in contradictory ways. Let’s not bury the lede — the answer, as far as we are concerned, is an emphatic yes. It’s your data in M365, and you are responsible for it. Microsoft delivers some protections via SLAs, site mirroring, and retention policies. But these are not backups in the traditional sense, and if you have to produce data for regulators at some point or for any other reason, you may discover they’re not good enough. 

 

One aspect of M365 and other cloud services from Microsoft that often surprises people is that having your data in M365 does not remove your responsibility for backing it up. Microsoft operates its cloud-based services on a shared responsibility model, and for data stored in its SaaS solutions like M365, the responsibility for data backup and integrity resides with the organisations using M365. Image 1 shows a table of responsibilities taken from Microsoft’s Shared responsibility in the cloud document on the Microsoft Learn site.

 

Figure 1: Microsoft and Customer Responsibilities in the Microsoft Cloud. (Retrieved on May 1st 2024, from https://learn.microsoft.com/en-us/azure/security/fundamentals/shared-responsibility.)

 


In this blog, we outline why storing your data in M365 doesn’t mean you can forget about backups. Thankfully, many options are available to deliver backups for Microsoft 365 data. We encourage you to contact your current account manager in Infinity IT to discuss backing up your M365 data. You can also use our Contact Form to start a conversation.

 

 

M365 Data Is Still Vulnerable to Loss

 

Microsoft provides replication and retention policies to deliver service availability SLAs in M365. You can even specify that data in M365 should not get deleted. However, just because the data is flagged to be retained in M365 and replicated across multiple cloud data centres does not mean it’s safe from accidental damage, cyberattacks, or malicious insider activity. Issues that can cause data loss include:

 

⁃        Human Error - Data is at risk of being lost if it is deleted or overwritten, and this does not get discovered within the M365 retention period.

 

⁃        Malicious damage - Sometimes, staff intentionally destroy or corrupt data, which can result in permanent data loss if not discovered quickly and no backups are available.

 

⁃        Synchronisation errors - When using M365, data is regularly exchanged between the platform and end-user devices. Due to the high number of devices and frequency of data exchanges, some errors are likely to occur. Even a few errors that result in data loss or corruption could negatively impact operations or decrease staff productivity.

 

⁃        Cyberattacks - It’s important to note that M365 can be vulnerable to cyberattacks, data breaches, and loss due to criminal activities such as ransomware. If you rely solely on Microsoft for data retention, your business may suffer significant losses and harm to its reputation. Taking proactive measures to safeguard your data against any potential incidents is crucial.

 

⁃        Natural disasters - There is a possibility, albeit small, that a catastrophe could cause a disruption in your access to M365 for several days or more. If you don’t have a backup of important data stored elsewhere, your organisation might be unable to function properly until M365 access gets restored.

 

 

Microsoft's Native Data Retention Features

 

Now that we’ve highlighted how you can lose M365 data due to corruption or deletion, let’s outline the features Microsoft includes to deliver partial data security, compliance, and availability.

 

Datacentre-to-Datacentre replication - Microsoft replicates data across multiple M365 data centres. However, it is important to note that this replication does not serve as a replacement for a dedicated backup solution. It cannot protect against some of the common data loss issues, such as accidental deletion or ransomware attacks. You still need a proper backup solution for comprehensive data security.

 

Retention policies - M365 provides retention policies that enable organisations to comply with regulations and internal policies by retaining or deleting content after a specific period. However, although these retention policies are helpful, they are not fool proof. Mistakes can occur when configuring retention policies, which can result in data loss. System Admins are susceptible to making errors, just like any other person.

 

Litigation hold - M365 allows organisations to put content on hold for legal cases, eDiscovery, or internal investigations. However, backups are vital to complement M365 legal holds to protect against user error or malicious deletion to preserve content needed for investigations.

 

Archive mailbox - Exchange email in M365 provides an archive mailbox with extra storage space to archive emails. However, this archive is subject to the same data loss risks as the primary mailbox, including accidental deletion and user error.

 

Microsoft Defender for Office 365 - While Microsoft Defender for Office 365 helps protect email with advanced protection against phishing, business email compromise, ransomware, and other cyber threats, it is not a substitute for backup. Backups are the ultimate safety net to protect your organisational data and shared knowledge from accidental and malicious damage.

 

 

Proper Backups are required to Deliver Compliance

 

Regulations such as GDPR require organisations to ensure data protection. This responsibility includes securing data while it is being stored, transmitted over networks, and even backed up. Hence, when choosing a backup solution to safeguard data, it is crucial to select a solution that allows the selection of target locations that align with each organisation’s regulations. For instance, when data must remain within the EU region to adhere to regulations.

 

 

Quick Data Recovery is Vital

 

One of the most important aspects of data backup or retention policies is the ability to quickly recover vital emails or other information when needed. Often in pressured situations if a disaster or cyberattack has occurred. Even if you believe that Microsoft’s built-in data protection features are good enough (trust us - they really aren’t), experience shows that recovery of data using the native M365 tools can be slow and cumbersome. In some cases, restoring data to its original state may be extremely difficult, particularly across different user accounts.

 

Having a robust third-party backup of your M365 data, especially emails, ensures you can meet your Recovery Point Objectives (RPO) and Recovery Time Objectives (RTO), minimising downtime and enabling a swift return to normal operations after an incident.

 

 

Conclusion

 

There is no doubt that Microsoft’s built-in M365 features provide some functionality for data security, compliance, and availability, but they do not replace the functionality in a comprehensive backup solution. As demonstrated in Figure 1 where Microsoft clearly states that the responsibility for information and data resides with their customers - the organisations that use M365 (and other Microsoft cloud services).

 

As the data owner, you are responsible for managing the risk of data loss due to issues like accidental deletion and ransomware. By implementing a dedicated backup solution for Microsoft 365, you can ensure that your critical data is always protected and recoverable, enabling business continuity and peace of mind in the face of ever-evolving threats. The Microsoft M365 and Azure experts in Infinity IT are here to help you choose, implement, and operate a backup solution that protects your M365 data.


Your IT Upgrade Starts Here: Contact Us for a Complimentary Assessment

Contact Us

Clock on the keyboard
By Alan Kluba October 24, 2024
How Winter Time Change Affects Computer Systems
By Alan Kluba October 19, 2024
Enterprise Ireland Cyber Review Grant – Your Complete Guide In today’s fast-paced digital world, cybersecurity is more important than ever. With the rise of cyber threats—especially those targeting smaller businesses—it’s crucial to protect your company’s data and reputation. To help businesses like yours, Enterprise Ireland (EI) has introduced the Cyber Review Grant. This grant not only helps you assess your current cybersecurity status but also provides a roadmap for improvement. But what does this mean for you? This blog breaks down the process and explains why now is the time to act. What is the Enterprise Ireland Cyber Review Grant? The Cyber Review Grant is a new initiative designed to help Irish companies evaluate their cybersecurity readiness and create a plan to improve it. The grant covers 80% of the fixed project cost (€3,000), making it an affordable and essential step in protecting your business from cyberattacks. Who is it For? This grant is available to Irish companies that are clients of Enterprise Ireland. If your business is engaged in exporting and leveraging digital tools, this grant can help secure your digital assets and ensure that your company meets the highest cybersecurity standards. With cyber threats growing in sophistication, this grant offers you a chance to strengthen your defences. Why Should You Apply? Cybersecurity isn’t just a technology issue—it’s a business imperative. Attacks can disrupt your operations, damage your reputation, and compromise customer trust. The Cyber Review Grant allows you to: Identify vulnerabilities in your current systems Improve your defences by following expert recommendations Boost your international credibility with a secure and compliant setup Future-proof your business against evolving cyber threats With advancements in AI making businesses more vulnerable to cyberattacks, now is the time to take action. The grant offers a structured, expert-led process that’s tailored to your company’s specific needs. What Do You Get? When you apply for the Cyber Review Grant, you gain access to certified cybersecurity experts, who will: Interview your key personnel to understand your current practices Review your technology and digital processes, both onsite and in the cloud Provide a detailed report identifying vulnerabilities and offering actionable steps to improve your cybersecurity measures This report, based on the National Cyber Security Centre (NCSC) framework, will cover essential areas such as software updates, data backups, access management, and more. Each recommendation will have a clear, measurable action plan with designated owners within your company, ensuring you can address these vulnerabilities over the next 6 to 12 months. How Much Does It Cover? The total cost of the cybersecurity review is €3,000, but with Enterprise Ireland funding 80%, your business will only pay €600. This small investment could save your company from costly cyberattacks and help you comply with industry regulations. The Application Process Applying for the Cyber Review Grant is quick and straightforward. Here’s how it works: Confirm Eligibility: Ensure your company is an Enterprise Ireland client and has an assigned Development Advisor. Find a Certified Consultant: Infinity IT is a certified consultant and can guide you through the entire process. Submit Your Application: Apply online, naming your chosen consultant (Infinity IT). Receive Your Offer: Once your application is approved, you will receive a letter of offer. Complete the Review: Work with your consultant to carry out the review and receive a comprehensive report. Claim the Grant: After paying your consultant, submit the required documents to claim back 80% of the project cost. Who is Eligible? The grant is open to Enterprise Ireland client companies. Only one grant is available per company, so it’s important to act quickly as the funding is limited and offered on a first-come, first-served basis. What’s Not Covered? Certain activities, such as routine software upgrades, physical security measures, or general management consultancy, are not eligible for the grant. The focus is on cybersecurity and protecting your company’s digital assets. Why Choose Infinity IT? At Infinity IT, we are experts in Information Technology, providing Managed IT Support Solutions and Services both in the Cloud and On-Premise to a diverse base of customers in Ireland and beyond. Our technical expertise with leading technologies ensures we deliver a superior level of customer service, helping you implement best practice IT strategies. We deploy and manage technologies that mitigate risks and improve productivity, allowing you to focus on running your business. Choosing Infinity IT as your consultant means you’re partnering with a trusted Enterprise Ireland-certified cybersecurity expert who understands the grant process inside and out. We will ensure the review is comprehensive and actionable, tailored to your company’s specific needs. Ready to Apply? If you’re ready to strengthen your cybersecurity defences and apply for the Cyber Review Grant, don’t wait—funds are limited, and demand is high. Contact Shane Casey at shane.casey@infinityit.ie today to start your application and secure your company’s future.
By Alan Kluba October 3, 2024
Countdown to Windows 11: Why Upgrading now is a must before time runs out... As the technological landscape continues to evolve, so must our tools. The impending end of Windows 10's lifecycle marks a significant turning point, especially as 70% of computers worldwide apparently use Windows 10: it's time to embrace Windows 11. With only one year left to upgrade, it's crucial to understand why making the move now is essential for both individuals and businesses. Let’s explore the compelling reasons for upgrading to Windows 11 sooner rather than later. 1. Smooth Transition: Avoid Last-Minute Rush Waiting until the last minute to upgrade can lead to several complications: Increased Demand: As the End-of-Life date approaches, demand for upgrades and technical support will surge, potentially leading to longer wait times and higher costs. Hasty Upgrades: Rushing the upgrade process increases the likelihood of errors, data loss, and compatibility issues. Limited Time for Adjustment : Upgrading now gives you ample time to familiarise yourself with Windows 11, ensuring a smooth transition. By upgrading early, you can avoid the last-minute rush and ensure a seamless, well-planned transition. 2. Enhanced Security: Protecting Your Digital Realm Security should always be a top priority, and Windows 11 is built with advanced security features that surpass those of Windows 10. Here’s why upgrading now is vital: Hardware-Based Security: Windows 11 leverages TPM 2.0 (Trusted Platform Module) and Secure Boot, providing robust protection against firmware and hardware attacks. I ntegrated Threat Protection: Enhanced malware protection, including cloud-based security and Microsoft Defender Antivirus, offers comprehensive defence mechanisms. Zero Trust Model: Windows 11 adopts a zero-trust security approach, ensuring stricter access controls and data protection measures. By upgrading now, you can immediately benefit from these advanced security features, safeguarding your data and devices against emerging threats. 3. Continued Support and Updates: Stay Current and Supported Microsoft will cease to provide updates, security patches, or technical support for Windows 10 after October 14, 2025. This lack of support means: No Security Patches: Without regular updates, your system becomes vulnerable to new security threats. No Feature Updates: You'll miss out on new features and improvements that enhance user experience and productivity. No Technical Support : Troubleshooting issues without official support can be challenging and time-consuming. Upgrading to Windows 11 now ensures you remain in the loop with ongoing updates and support, keeping your system secure and up to date. 4. Performance and Productivity Boost: Work Smarter, Not Harder Windows 11 is designed to improve both performance and productivity. Here’s how upgrading now can transform your computing experience: Faster Performance : Optimisations in Windows 11 result in quicker boot times, faster app launches, and improved power management. Enhanced Multitasking: Features like Snap Layouts and Virtual Desktops streamline multitasking, allowing you to organise your work more efficiently. Integrated Tools: Seamless integration with Microsoft Teams and other productivity tools fosters better collaboration and communication. Upgrading now allows you to start benefiting from these enhancements immediately, enabling you to work more effectively and efficiently. 5. Compatibility with New Technologies: Future-Proof Your System As new software and hardware are developed with Windows 11 in mind, staying on an outdated OS can lead to compatibility issues. By upgrading now, you ensure: Software Compatibility: Access to the latest applications and software updates designed for Windows 11. Hardware Compatibility: Compatibility with new hardware technologies and peripherals, ensuring optimal performance and functionality. Future-proofing your system by upgrading now minimises the risk of running into compatibility issues down the line. Conclusion: Embrace the Future Today The impending end of Windows 10 signals a crucial moment: it’s time to embrace Windows 11. With only one year left to upgrade, the clock is ticking. Upgrading now offers numerous benefits, from enhanced security and ongoing support to improved performance and future-proof compatibility. Don’t wait until it’s too late. Start planning your upgrade today and step confidently into the future with Windows 11. Your digital realm deserves the best—upgrade now and ensure it remains secure, efficient, and ready for whatever comes next.
old computer
By Alan Kluba June 25, 2024
How Old is Old? - Understanding the Lifespan of Business Computers
Midleton Flood
By Shane Casey March 7, 2024
We cannot express enough gratitude to Infinity IT for their exceptional Disaster Recovery efforts following the unforeseen flooding of our Credit Union premises. The flooding posed a significant threat to our daily operations and the safety of our members' financial assets. However, thanks to the meticulous disaster recovery planning and swift execution by Infinity IT, we were able to navigate through the crisis seamlessly. Their emphasis on defining Recovery Point Objectives (RPO) and Recovery Time Objectives (RTO) proved invaluable, allowing us to maintain data integrity and resume operations swiftly. Infinity IT demonstrated unparalleled efficiency by successfully transitioning our critical systems to our designated Disaster Recovery site within 24 hours. This remarkable feat not only minimised downtime but also reassured our members of the unwavering reliability of our services. We recommend Infinity IT to any Credit Union seeking reliable, comprehensive, and effective disaster recovery solutions. John Fenton, Manager, Midleton Credit Union
By Linda Barry February 28, 2024
We have worked with Infinity IT for a number of years now and I would highly recommend them. The team at Infinity IT have worked with us to upgrade our IT systems; significantly improving our IT security and business continuity plans in that time. They have also been able to identify cost saving measures for us in terms of our email and licensing packages. The Infinity IT support team are quick to resolve any queries for us through their dedicated support desk and the monthly security reports provide great oversight and reassurance that our IT systems are secure and efficient. Liz Hogan, Clinic Manager, Wellington Eye Clinic
Healthcare Technology
By Alan Kluba February 8, 2024
The healthcare industry remains one of the prime targets for external and internal cyber attacks, as protected health information (PHI) is in high demand on the dark web. The frequency and sophistication of attacks continue to rise, posing significant challenges to the healthcare sector. Malware Attacks by Industry - Sonicwall CyberThreat report 2023 Education Healthcare Finance Retail Government Key Challenges facing healthcare Keeping critical infrastructure covered and continuously available Protecting patient privacy from insider risks Preserving the integrity of healthcare data Preventing data breaches originating from ransomware and phishing attacks HSE Attack This attack highlighted the devastating impact of cyber attacks on healthcare infrastructure in Ireland disrupting operations and compromised patient data. MARCH 2021: An email was sent on the 16th of March, opened on the 18th of March 2021 which delivered the lethal blow. MARCH 2021: The HSE antivirus software detected malicious activity on 31st March 2021, monitor only mode. MAY 2021: Mid May HSE operations were finally alerted to the attack by a service provider. JUNE 2021: At least three quarters of the HSE's IT servers had been decrypted and 70% of PC’s were back in use. SEPTEMBER 2021: 90% of systems were recovered. Impact of an Attack The consequences of such attacks extend far beyond financial losses, affecting patient care and safety. Patients don’t get the care they need when healthcare providers are taken offline due to ransomware attacks. Surgeons postpone surgeries because the information necessary to perform a life-saving surgery becomes inaccessible. Failures in diagnostic procedures and laboratory tests result in delayed medical treatment. Emergency Room (ER) bypass causes ambulances to diverge to healthcare facilities miles farther, leading to degraded and irreversible outcomes. What can you do to protect your healthcare organisation from similar attacks: Implementing a multi-layer protection platform can help mitigate vulnerabilities and defend against evolving cyber threats. Healthcare organisations must invest in robust security measures to safeguard critical infrastructure, protect patient privacy, and prevent data breaches. Infinity IT and SonicWall have worked with healthcare providers to help build a healthier system. Our innovations and comprehensive strategies have allowed us to meet new expectations regarding improving security, increasing operation efficiencies, and reducing IT costs. Our knowledge and wealth of experience helps us to help Healthcare Organisation’s to avoid surprises and spend more time focused on their primary mission: ensuring the health and well-being of the communities they serve. As threats continue to evolve, the healthcare industry must remain vigilant and proactive in addressing cybersecurity risks. By learning from past attacks and investing in effective security measures, healthcare organisations can better protect their systems, safeguard patient data, and uphold the trust and integrity of the healthcare system. The time to act is now – the health and well-being of patients depend on it. Case Study: “Our improved security performance coupled with simplified security management has reduced costs and time spent on administrative tasks. The whole process has been a very positive experience!” Steve Jackson IT Director Kingdom Services Group
By Alan Kluba February 1, 2024
Recent data breaches across healthcare organisations highlight the urgency for robust cybersecurity measures. In this blog post, we explore the challenges faced by the healthcare industry and how Infinity IT's comprehensive cybersecurity solutions are helping organisations protect their digital infrastructure. The Alarming Rise of Healthcare Cyberattacks: Hacking incidents, particularly targeting network servers and emails, account for over 80% of attacks, posing significant threats to electronic health records (EHR) and personal health records (PHR). Understanding the Impact: The implications of healthcare data breaches extend beyond compromised records. Cyberattacks can lead to severe consequences, affecting the efficiency of medical procedures, increasing mortality rates, and causing long-term financial and mental distress for patients. The evolving tactics of cybercriminals demand a proactive and resilient cybersecurity approach to ensure the safety of patient care. Infinity IT and SonicWall have joined forces to address this challenge. For the past three decades, SonicWall has been at the forefront of cybersecurity, working closely with healthcare providers to enhance security, and operational efficiency, and reduce IT costs. Our Boundless Cybersecurity approach integrates security, central management, advanced analytics, and unified threat management across their entire security solutions portfolio, forming the robust Capture Cloud Platform. Essential Cybersecurity Solutions for Healthcare Organisations: In the face of advancing threats and government-backed ransomware assaults, our cybersecurity solutions emerge as a vital lifeline. These solutions strengthen networks, secure IoT medical devices, and safeguard patient data. Our portfolio comprehensively addresses the intricate security requirements of the healthcare sector, providing a crucial defense against cyber threats. To Summarise: Healthcare organisations must prioritise cybersecurity to ensure patient safety and the uninterrupted delivery of care. Our Cybersecurity approach and comprehensive solutions offer a strategic advantage, empowering healthcare providers to proactively defend against evolving threats and secure the future of healthcare delivery. As the healthcare industry navigates the challenges of an increasingly digital landscape, SonicWall stands as a trusted partner, dedicated to closing the cybersecurity gap for enterprises, governments, and SMBs worldwide. Case Study: “The SMA device rapidly allowed our newly deployed workforce complete access to their internal applications. We now have physicians working from home without problem. We extended our physicians reading environment to their homes, and we’ve moved our scheduling department from in-house to at-home workers.” Michael Brown, IT Director, Women’s Center for Radiology
By Linda Barry January 29, 2024
Fantastic experience with Infinity IT for the on-boarding of their Managed IT Support Service! Smooth and efficient on-boarding process! Credit to the team for their impeccable organisation and attention to detail. They made the transition seamless, ensuring no disruption to our daily operations. Exceptional communication throughout the on-boarding journey. The Infinity IT team was always responsive and kept us informed at every step. We are thoroughly satisfied with the on-boarding experience and are confident that Infinity IT is the right partner for our Managed IT Support. Looking forward to a long and successful collaboration with a team that truly understands our IT needs. Andrew Higgs, CTO, Community Credit Union
By Linda Barry January 29, 2024
Here at Byrne Wallace, we have found that Infinity IT’s prompt response to any technical challenges we face has minimised disruptions and allowed us to focus on serving our clients and running the business effectively. This was highlighted when they worked with us during the Covid outbreak to ensure we could keep all our staff working safely from home from day one and to ensure we could keep on advising our clients without any disruption. Some of the IT team members had experience with Infinity IT in previous companies and quickly brought them in as part of a key IT provider. What sets Infinity IT apart is not only your technical expertise but also your commitment to customer satisfaction. Your team takes the time to listen to our concerns and tailor solutions that align with our business goals. Over the years, Infinity IT has proven themselves with their proactive approach to security measures and has helped us stay ahead of potential threats, giving us confidence in the integrity of our data. In a fast-paced industry, your reliability and dedication to staying updated with the latest technological advancements have been invaluable. Byrne Wallace is proud to be associated with Infinity IT, and we look forward to continuing this partnership for years to come. John Kelly, Head of IT, Byrne Wallace.
Show More
Share by: