Proton
What is 3-2-1 backup

3-2-1 backup rule: What is it, and why stick to it?

Data backup is vital for businesses and individuals alike: In case something happens to your primary computer, you always have a copy of your data to fall back on. 

How should you approach backup, though? The 3-2-1 rule can act as a guide when deciding how to manage backups.

What is the 3-2-1 backup principle?

The 3-2-1 backup principle is pretty simple to explain. The idea is that you have three copies of your files — one you work on, two for backup purposes. Those two backups are stored on two different media, and one of them is offsite. 

The idea behind the 3-2-1 rule is to make smart use of redundancy, which in this case means having more of something than you need. The one working copy is what you need in your day-to-day, and then you have one copy of it as a backup in case something goes wrong with the file (for example if it gets corrupted).

However, having just one copy to fall back on isn’t all that safe. If you’re working on a project that took multiple years to put together, you likely won’t rest easy having just one copy. Though the statistical chances of losing both the work file and the backup at the same time is tiny, it’s a small effort to make an extra copy; this is the “3”.

Naturally, you can’t have all three copies on the same device. The whole idea behind backups is to keep things safe, so if all backups are on the same device and the hard drive malfunctions, all three copies are fried, and your efforts with it. 

This is where the “2” comes in. Assuming your working copy is on your laptop, smartphone or another “daily” device, the other two are kept elsewhere, and on different media from each other. For example, you could use two thumb drives, or an external HD and another laptop, whatever you have handy.

As an extra failsafe, though, there’s the “1”, which is keeping one of your two backups offsite, in another physical location. This is to protect from non-technical problems. A good example would be a house fire, which could destroy your laptop with your work copy, as well as the backup USB you kept the backup on. If you had a second USB at your neighbor’s house, your work would still be protected.

How you can apply a 3-2-1 backup strategy

The 3-2-1 backup rule was originally developed by companies back in the days when a computer took up a whole desk, if not a room, and keeping data offsite probably meant hiring a courier. However, now that we’re in the third decade of the 21st century, technology has developed that anybody, whether a business or an individual, can apply a 3-2-1 strategy without too much hassle, or cost.

This is mainly thanks to the development of cloud storage, which lets you store data offsite, yet makes it very easy to get to at the same time — imagine having to call up your neighbor just to get a USB when misfortune strikes in our example above.

For example, say you’re working on a document — a school paper, a briefing for your boss, or even a short story — and you want to make sure nothing can happen to it. You can have one backup copy on a USB (cheap, easy to get, easy to transport) and then you can have your second copy in the cloud, safely stored on a service’s servers. This meets both the “2” and the “1” part of the 3-2-1 backup rule.

Proton Drive and the 3-2-1 rule

Some features make some cloud storage services better than others when implementing the 3-2-1 backup principle. For example, the ability to automatically sync files is vital, as any changes you make in the document will immediately reflect in the backup copy. You won’t have to manually update it every time.

Our cloud storage service, Proton Drive, comes with this ability on the Windows and macOS desktop apps. On top of creating automatic backups, we also offer some unique features that will add greatly to your peace of mind when storing important files in the cloud.

As a privacy-first service, we offer end-to-end encryption on all our products, meaning that your files are secured at every point in the process, from when they are sent from your device to when they are stored on our servers. At no point can we or anybody else take a peek at what’s in your files. Nor would we want to: Unlike many cloud services, including Google Drive, we don’t make money from targeted ads. All our revenue comes from subscriptions from our community, so protecting your privacy and the security of your data is our top priority.

If you want to implement a 3-2-1 backup strategy — and you should — Proton Drive is a great tool to use. We offer up to 5 GB of storage for free, meaning it’s easy to use secure storage without spending a penny. Keeping files safe and private doesn’t have to cost a lot of money.

Keep your files private, share them securely
Hanki Proton Drive ilmaiseksi

Related articles

en
Cyberattacks aren’t always executed through sophisticated methods like man-in-the-middle (MITM) attacks on public WiFi. Sometimes, they rely on something as simple as looking over your shoulder.  Shoulder surfing attacks are when someone watches you
en
Proton prioritizes our community’s privacy and data security in every aspect of our business.  To further demonstrate our commitment, we underwent a rigorous external audit and – on May 2, 2024 – received our ISO 27001 certification.  As an organiz
en
Anyone with an iPhone can now enjoy Proton Drive’s secure and private photo backup capabilities. This feature is gradually rolling out to the Proton community and will be available to everyone by the end of this week. Smartphones have made us all am
en
From the very beginning, Proton has always been a different type of organization. This was probably evident from the way in which we got started via a public crowdfunding campaign that saw 10,000 people donate over $500,000 to launch development. As
en
Your online data is valuable. While it might feel like you’re browsing the web for free, you’re actually paying marketing companies with your personal information. Often, even when you pay for services, these companies still collect and profit from y
en
Password spraying attacks pose a major risk to individuals and organizations as a method to breach network security by trying commonly used passwords across numerous accounts. This article explores password spraying attacks, explaining their methods