Pritesh Ganatra

British Technology Solutions

Your technology problem solver ...

What's Your Back Up Strategy?

Pritesh Ganatra

CREATED BY PRITESH GANATRA

Published: 19/08/2025 @ 09:00AM
#DataBackup #PreachToClients #IronyOfSituation #InevitableHappening #CaughtOut

Here is the irony of the situation. It was inevitable that it would happen one day; that I would be caught out on the very thing I always preach to my clients. In two words: data backup ...

Back up in the sky, Clouds part to reveal the sun, A new day begins

Back up in the sky, Clouds part to reveal the sun, A new day begins

This story relates only to my personal data, as I had not got around to properly setting up the backup. I did not have sufficient storage in my generic data centre cloud backup account to store the data that was on my handset, including photographs that I had for the past few years.

For only the second time since I have had a mobile phone
contract in 1996, I had my phone stolen!

It was on my birthday this year, in May 2024. The main difference is that we are now in a very precarious position of having vast amounts of both personal and company data on our handsets, so security is of the utmost importance, along with having the correct backup facilities in place.

Looking from a corporate perspective, companies need to seriously adopt email security and, more importantly, Mobile Device Management (MDM), which is the business solution equivalent to Apple and Google's 'find my phone' and 'wipe my phone' facilities that both Operating System vendors offer on their platforms.

These facilities are all well and good for personal phones and data, but nowhere near as efficient if you have a fleet of handsets, including any tablet devices that also have company emails and documents stored on the device for work purposes.

MDM offers not just search and wipe facilities, but a whole host of corporate features like bulk app delivery and updating of firmware, as well as geofencing facilities and blocking of apps within certain times of the day (for example, the user cannot access Facebook from 9.00am to 5.30pm).

When considering IT strategies, it is time to consider the whole picture in terms of tech strategies and treat the entire network as being vulnerable at the network core!

All roads lead to your internet connections via wired and Wi-Fi connectivity, which connects all internal devices to the external world and also to your backup systems. Apple and Google have tried their best to ensure your chosen apps can be reinstated on a new handset.

But some of the protocols for locking a lost or stolen phone and using a standard web browser to access your account are nigh on impossible, as their standard approach is to verify the account by sending a code to the phone.

Which is as useful as a chocolate teapot!

When it comes to your technology strategies, backing up and keeping data from mobile phones and tablet devices inside the organisation should be part of the workflow as much as any PC or laptop security configuration.

Until next time ...

PRITESH GANATRA

Your technology problem solver

Would you like to know more?

Did you know, you can negotiate an all-encompassing contract to cover MDM, email security and anti-virus for a single discounted price? Give me a call on 01604 926100 or take a look at my website, which you can find by clicking here.

Share the blog love ...

Share this to FacebookBuffer
Share this to FacebookFacebook
Share this to TwitterTwitter
Share this to Linkedin (popup window)Linkedin
Share this to Pinterest (popup window)Pinterest
Share this to WhatsApp (popup window)WhatsApp

#DataBackup #PreachToClients #IronyOfSituation #InevitableHappening #CaughtOut

About Pritesh Ganatra ...

Pritesh Ganatra 

The word 'Technology' has too many connotations in today's world! Where do we start? Simple terms like 'IT' and 'Telecoms'? or terms that appear NOT to have an actual meaning at all!, e.g. 'Internet of Things (IoT). Technology also encompasses specialist products and services like 'Rugged' and 'Tough' android devices, Lone Worker Software, panic alarm devices, smart energy devices, low energy lighting, credit card terminal (PCI DSS) security, indoor/ outdoor Wi-Fi systems, Ultrafast Gigabit internet connectivity, access control systems, industrial IoT circuit controllers.

BTS UK can consult from simple solutions to the most complex, provide some of the products through a wholesale channel, bring together a multi-disciplined 'Task Force' to deliver and implement complete Technology 'projects'.

I am your technology problem solver and I look forward to helping you.

More blog posts for you to enjoy ...

Click here to view this blog post


What Is The Most Important Part Of Your Business Network?

The final words from a recent blog post led me to determine a business network's common point of failure. We're heading into the VoIP era and plunging feet-first into having the traditional PSTN/ISDN networks disconnected for...

Click here to view this blog post


Fraud, Fraud, Fraud! What's The Cost To Your Business?

Did you know that small and medium-sized enterprises (SMEs) account for 99.9% of the businesses in the UK? At the start of 2023, there were estimated to be 5.6 million private-sector businesses ......

Click here to view this blog post


Datacentres Demand Power and Water: How Will AI Affect Our Resources?

As the ascent of datacentres keeps accelerating, driven by advancements in generative AI and quantum processors, the demands for electricity and water are growing alarmingly. This surge not only strains resources, but also ha...

Click here to view this blog post


What is Email Security, And Why Do You Need To Be Really Careful About It?

Did you know that emails can be intercepted and the contents manipulated, modified and forwarded back to the intended recipient without you even knowing about it? Sounds frightening, doesn't it?...

Click here to view this blog post


The Essential Role of Two Factor Authentication in Preventing Hacking Attacks

In our digital age, safeguarding personal information is crucial. Two Factor Authentication (2FA) stands out as a vital security measure, offering a robust layer of protection against hacking. By requiring an additional piece...

Click here to view this blog post


Do You Test Your Email Systems Regularly?

I recently sent an email to someone I had previously corresponded with. When I got a bounce-back, I thought I had the wrong address or made a typo. I doubted myself, as that is my nature, but seeing the email address in my ‘h...

Click here to view this blog post


The Importance Of Being Earnest

I still believe in the notion that 'people buy from people', however, we seem to be in a world where people are being pressured into buying technology for the fear that their business will fail or be left behind if they don't...

Click here to view this blog post


The Alarming Decline of Basic Survival Skills in Modern Education

In an era dominated by technology, the lack of Basic Survival Skills in education raises concerns about future generations. As society becomes increasingly reliant on devices and connectivity, essential life skills are being ...

Other bloggers you may like ...

Click here to view this blog post


Feast And Famine To Fully Booked: sBlogIt Keeps Your Pipeline Warm, While You Work

Posted by Steffi Lewis on https://www.sblogit.com

We take consultants from feast and famine to fully booked by publishing a quality blog post every week for them. You send a spark; we deliver, edit, p ...

Click here to view this blog post


How Tackling Tech Debt Supercharges Growth for UK SMEs

Posted by Steph Birch on https://blog.birchstrategicservices.com

My blog post this week explains how addressing tech debt transforms fragile operations into scalable growth. It outlines foundations for ownership, te ...

Click here to view this blog post


Disputed Employer PAYE Charges: Correct Your HMRC Tax Bill

Posted by Roger Eddowes on https://blog.essendonaccounts.co.uk

Did you know it's possible to challenge employer PAYE charges, identify payroll mismatches, and correct your HMRC tax bill? My blog post outlines what ...

Click here to view this blog post


HMRC Triples The Side Hustle Tax Return Threshold

Posted by Alison Mead on https://blog.siliconbullet.com

The side hustle tax return threshold is rising from £1,000 to £3,000, likely from April 2027. Many with modest earnings will avoid full self assessmen ...