Pritesh Ganatra

British Technology Solutions

Your technology problem solver ...

What's Your Back Up Strategy?

Pritesh Ganatra

CREATED BY PRITESH GANATRA

Published: 19/08/2025 @ 09:00AM
#DataBackup #PreachToClients #IronyOfSituation #InevitableHappening #CaughtOut

Here is the irony of the situation. It was inevitable that it would happen one day; that I would be caught out on the very thing I always preach to my clients. In two words: data backup ...

Back up in the sky, Clouds part to reveal the sun, A new day begins

Back up in the sky, Clouds part to reveal the sun, A new day begins

This story relates only to my personal data, as I had not got around to properly setting up the backup. I did not have sufficient storage in my generic data centre cloud backup account to store the data that was on my handset, including photographs that I had for the past few years.

For only the second time since I have had a mobile phone
contract in 1996, I had my phone stolen!

It was on my birthday this year, in May 2024. The main difference is that we are now in a very precarious position of having vast amounts of both personal and company data on our handsets, so security is of the utmost importance, along with having the correct backup facilities in place.

Looking from a corporate perspective, companies need to seriously adopt email security and, more importantly, Mobile Device Management (MDM), which is the business solution equivalent to Apple and Google's 'find my phone' and 'wipe my phone' facilities that both Operating System vendors offer on their platforms.

These facilities are all well and good for personal phones and data, but nowhere near as efficient if you have a fleet of handsets, including any tablet devices that also have company emails and documents stored on the device for work purposes.

MDM offers not just search and wipe facilities, but a whole host of corporate features like bulk app delivery and updating of firmware, as well as geofencing facilities and blocking of apps within certain times of the day (for example, the user cannot access Facebook from 9.00am to 5.30pm).

When considering IT strategies, it is time to consider the whole picture in terms of tech strategies and treat the entire network as being vulnerable at the network core!

All roads lead to your internet connections via wired and Wi-Fi connectivity, which connects all internal devices to the external world and also to your backup systems. Apple and Google have tried their best to ensure your chosen apps can be reinstated on a new handset.

But some of the protocols for locking a lost or stolen phone and using a standard web browser to access your account are nigh on impossible, as their standard approach is to verify the account by sending a code to the phone.

Which is as useful as a chocolate teapot!

When it comes to your technology strategies, backing up and keeping data from mobile phones and tablet devices inside the organisation should be part of the workflow as much as any PC or laptop security configuration.

Until next time ...

PRITESH GANATRA

Your technology problem solver

Would you like to know more?

Did you know, you can negotiate an all-encompassing contract to cover MDM, email security and anti-virus for a single discounted price? Give me a call on 01604 926100 or take a look at my website, which you can find by clicking here.

Share the blog love ...

Share this to FacebookBuffer
Share this to FacebookFacebook
Share this to TwitterTwitter
Share this to Linkedin (popup window)Linkedin
Share this to Pinterest (popup window)Pinterest
Share this to WhatsApp (popup window)WhatsApp

#DataBackup #PreachToClients #IronyOfSituation #InevitableHappening #CaughtOut

About Pritesh Ganatra ...

Pritesh Ganatra 

The word 'Technology' has too many connotations in today's world! Where do we start? Simple terms like 'IT' and 'Telecoms'? or terms that appear NOT to have an actual meaning at all!, e.g. 'Internet of Things (IoT). Technology also encompasses specialist products and services like 'Rugged' and 'Tough' android devices, Lone Worker Software, panic alarm devices, smart energy devices, low energy lighting, credit card terminal (PCI DSS) security, indoor/ outdoor Wi-Fi systems, Ultrafast Gigabit internet connectivity, access control systems, industrial IoT circuit controllers.

BTS UK can consult from simple solutions to the most complex, provide some of the products through a wholesale channel, bring together a multi-disciplined 'Task Force' to deliver and implement complete Technology 'projects'.

I am your technology problem solver and I look forward to helping you.

More blog posts for you to enjoy ...

Click here to view this blog post


UK Mobile Operators And Protection Against Scam Texts: The Art Of Defence

Here's how UK networks now deliver protection against scam texts with relentless, multi-layered defence. They block fraud at scale, work with government and law enforcement, and clamp down on spoofing and SIM farms. It's prac...

Click here to view this blog post


Spending billions on AI startups: A Disturbing Trend in Valuations

The madness of spending billions on AI startups raises alarm over staggering valuations and the implications for society. Many of these companies focus on trivial applications while genuinely innovative solutions remain sidel...

Click here to view this blog post


What Is The Most Important Part Of Your Business Network?

The final words from a recent blog post led me to determine a business network's common point of failure. We're heading into the VoIP era and plunging feet-first into having the traditional PSTN/ISDN networks disconnected for...

Click here to view this blog post


Fraud, Fraud, Fraud! What's The Cost To Your Business?

Did you know that small and medium-sized enterprises (SMEs) account for 99.9% of the businesses in the UK? At the start of 2023, there were estimated to be 5.6 million private-sector businesses ......

Click here to view this blog post


Datacentres Demand Power and Water: How Will AI Affect Our Resources?

As the ascent of datacentres keeps accelerating, driven by advancements in generative AI and quantum processors, the demands for electricity and water are growing alarmingly. This surge not only strains resources, but also ha...

Click here to view this blog post


What is Email Security, And Why Do You Need To Be Really Careful About It?

Did you know that emails can be intercepted and the contents manipulated, modified and forwarded back to the intended recipient without you even knowing about it? Sounds frightening, doesn't it?...

Click here to view this blog post


The Essential Role of Two Factor Authentication in Preventing Hacking Attacks

In our digital age, safeguarding personal information is crucial. Two Factor Authentication (2FA) stands out as a vital security measure, offering a robust layer of protection against hacking. By requiring an additional piece...

Click here to view this blog post


Do You Test Your Email Systems Regularly?

I recently sent an email to someone I had previously corresponded with. When I got a bounce-back, I thought I had the wrong address or made a typo. I doubted myself, as that is my nature, but seeing the email address in my ‘h...

Other bloggers you may like ...

Click here to view this blog post


Networking: I Don't Do Small Talk!

Posted by Jacky Sherman on https://www.jackysherman.com

I wish I had a pound for every time I've heard that. It's a common reason given by people who dislike networking because they see the banality of talk ...

Click here to view this blog post


UK Unveils Amnesty For Covid Loan Debtors: Your Last Clean-Slate Chance

Posted by Helen Beaumont on https://blog.essendontax.co.uk

Here's what the UK's amnesty for Covid loan debtors means for you. Pay back what you shouldn't have taken, no questions asked. Miss it, and expect tou ...

Click here to view this blog post


Landlord Safety Certificate Renewals Are Simple When You Work With A Virtual Assistant

Posted by Sarah Hannaford on https://blog.sarahpasolutions.co.uk

Here's how a virtual assistant streamlines landlord safety certificate renewals so you stay compliant without the hassle. You get clear timelines, sma ...

Click here to view this blog post


How Do We Create Our Subscribers' Blog Posts?

Posted by Steffi Lewis on https://www.sblogit.com

Many people wonder what steps are required for us to create a blog post for one of our subscribers. I wouldn't say it's simple and straightforward, bu ...