Backups can save the day when a device is lost or disabled. Ryan Spence explains the need for security through data continuity. Learn about the value of backup planning for mobile devices. Understand the differences between local and server-based backups. Explore various tools to ensure your data is there for you when you need it.
- Security is not just about preventing malicious access to my data. It is also about building processes for data continuity. Data continuity is setup through backing up my device. In both platforms there are two ways to back up my Android or iOS device, either over the air to Google or Apple servers, or on my own computer. Choosing to backup the device myself means I will need to physically connect my device to one computer for backup, and the same computer for restore.
This choice also means my device will not be backing up as I use it. If something should occur that would require me to restore my backup, I will only be able to get the information present at the time of the last backup. More often than not, this means I will lose critical data. Choosing to backup over the air means that after the initial backup is completed, a regular, unattended backup will occur, keeping my backup data as close to the current as possible without burdening me.
These regularly scheduled backups usually happen as you sleep, during the hours of low use. A consistent, over the air backup will protect me and my data from loss, provide me with a consistent experience, and ensure continuity throughout the life of the mobile device. There are also third party options: Dropbox, CrashPlan, and Seagate provide an alternative to backing up your data with the device manufacturer. It is important to note that backup services are storing your data in their space.
Therefore, your data is only as secure as the service provider's infrastructure. It is wise to review how each provider secures data before relying on one or the other. Wherever you store your data, make sure that the service is using strong security measures to protect their servers and in turn, your user data.
- Understanding mobile security risks
- Buying and disposing of mobile devices
- Setting up mobile passwords
- Implementing lock screen security
- Adjusting Android admin settings and iOS privacy options
- Setting up options to find your phone
- Securing cameras, microphones, and other hardware on your mobile device