{"id":51390,"date":"2026-03-31T10:12:50","date_gmt":"2026-03-31T10:12:50","guid":{"rendered":"https:\/\/www.open-e.com\/blog\/?p=51390"},"modified":"2026-03-31T11:12:51","modified_gmt":"2026-03-31T11:12:51","slug":"common-mistakes-when-using-backups","status":"publish","type":"post","link":"https:\/\/www.open-e.com\/blog\/common-mistakes-when-using-backups\/","title":{"rendered":"How to Avoid Mistakes When Setting Up Backup"},"content":{"rendered":"\n<p><b>Most modern business organizations base their work and operations on large amounts of data. However, not every company treats this data according to its importance. Some are even reckless to the extent that simply hope bad things don&#8217;t happen to them. Just as end users only read manuals when something breaks, business owners sometimes only start to appreciate creating backups after the data has already been lost or corrupted.&nbsp;<\/b><\/p>\n\n\n\n<p><b>Companies generally make two mistakes regarding backups \u2014 not having any at all and having them incorrectly configured. So, what exactly can we do to prevent data loss? Let\u2019s examine how these two backup issues affect companies and show you how they can be resolved.<\/b><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Creating a Backup<\/span><\/h2>\n\n\n\n<p>According to the Infrascale, <a href=\"https:\/\/www.infrascale.com\/data-loss-statistics-usa\/\" title=\"\">67.7% businesses experienced significant data loss till February 2025.<\/a> This number is pretty alarming, but the threat goes even further:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/invenioit.com\/continuity\/data-loss-statistics\/\" title=\"\">About 40% of companies lost critical data due to a cyberattack in 2025<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/invenioit.com\/continuity\/data-loss-statistics\/\" title=\"\">Attacks on cloud services increased 26% in 2024<\/a>, which raises the need of looking for a more reliable data storage solution (in-house for the maximum control)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.mimecast.com\/resources\/ebooks\/state-of-human-risk\/\" title=\"\">Two out of three security leaders see AI-powered attacks as inevitable in 2026 (about 69% of the experts), yet only 40% report full preparation for this threat.<\/a><\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-weight: 400;\">Most businesses are inextricably linked with technology and each other, so the failure of one could easily create a knock-on effect that affects many more businesses.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">You may wonder, what are the main causes of data loss? Here\u2019s a list of the most significant Open-E solutions to avoid them:<\/span><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1720\" height=\"2048\" src=\"https:\/\/www.open-e.com\/blog\/wp-content\/uploads\/2024\/03\/Mistakes_in_Backup_infographic_new-1720x2048.jpg\" alt=\"Mistakes When Using Backup and Open-E Solutions\" class=\"wp-image-53518\" srcset=\"https:\/\/www.open-e.com\/blog\/wp-content\/uploads\/2024\/03\/Mistakes_in_Backup_infographic_new-1720x2048.jpg 1720w, https:\/\/www.open-e.com\/blog\/wp-content\/uploads\/2024\/03\/Mistakes_in_Backup_infographic_new-390x465.jpg 390w, https:\/\/www.open-e.com\/blog\/wp-content\/uploads\/2024\/03\/Mistakes_in_Backup_infographic_new-860x1024.jpg 860w, https:\/\/www.open-e.com\/blog\/wp-content\/uploads\/2024\/03\/Mistakes_in_Backup_infographic_new-768x915.jpg 768w, https:\/\/www.open-e.com\/blog\/wp-content\/uploads\/2024\/03\/Mistakes_in_Backup_infographic_new-1290x1536.jpg 1290w, https:\/\/www.open-e.com\/blog\/wp-content\/uploads\/2024\/03\/Mistakes_in_Backup_infographic_new-202x240.jpg 202w\" sizes=\"auto, (max-width: 1720px) 100vw, 1720px\" \/><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Of course, these situations may occur while using a backup as well. However, if you use the correctly set up configuration, you can avoid most of these problems.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Check if Everything Works Well<\/span><\/h2>\n\n\n\n<p><strong>Creating a backup is a significant step in the right direction for any company<\/strong> that requires a highly responsible approach. It leads to many positive outcomes, but only if done correctly. Let\u2019s look at the main aspects that should be considered regarding this.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Keeping up with Backups<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">There are various configurations available for any data storage solution connected to backup servers, but setting the correct one up can quickly become complicated. And even if a backup was set up correctly, it <\/span><b>can\u2019t provide us with a 100% guarantee that nothing will happen to the data over time<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">You\u2019ve probably heard that the movie <\/span><a href=\"https:\/\/www.cbldatarecovery.com\/blog\/data-recovery\/data-loss-toy-story-crisis-at-pixar-averted\"><span style=\"font-weight: 400;\">Toy Story 2 by Pixar might have never been released<\/span><\/a><span style=\"font-weight: 400;\"> due to data loss caused by human error &#8211; one of the most common reasons for data loss, as we\u2019ve already shown above. Yet this arguably wasn\u2019t even the worst part of this story. The redundant data kept by Pixar on the backup server wasn\u2019t continuously checked, and the data was not backed up for a whole month, which may even be considered worse than someone accidentally deleting the movie. In any case, we can consider this a lesson learned.<\/span><b> One of the worst things that can be done with backup is to create one that is never verified again.<\/b><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Looking into Retention Plans<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">First, let\u2019s start with a description of a <\/span><a href=\"https:\/\/www.open-e.com\/blog\/how-do-retention-plans-work\/\"><span style=\"font-weight: 400;\">retention plan<\/span><\/a><span style=\"font-weight: 400;\">. At Open-E, we describe a retention plan as follows:<\/span><b> a retention plan is a process of automatically creating and deleting <\/b><a href=\"https:\/\/www.open-e.com\/blog\/how-do-zfs-snapshots-really-work\/\"><b>snapshots<\/b><\/a><b> at a frequency that the user sets<\/b><span style=\"font-weight: 400;\">. This can be done on any source a user chooses. It can even be done with backup copies, typically located on the local or remote backup server, perhaps even both. A retention plan combines several rules, such as the intervals at which the snapshots are made and their retention periods, i.e., how long the snapshots should be kept on the main node and, optionally, on a second node as well (Off-site). <\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">It\u2019s essential to mention that a<\/span><b> snapshot is not a backup itself<\/b><span style=\"font-weight: 400;\">. However, it can be used as one. When a snapshot is copied onto the backup server, it can be used to recreate the data on the snapshot by transforming it into a clone. Snapshots function this way to better protect against data loss or corruption, including ransomware. Since snapshots are made in a read-only format, they cannot be encrypted.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">During the configuration stage, deciding which retention plan is most suitable for your company\u2019s needs is essential. For instance, <\/span><b>you can take snapshots every five minutes or once a week\u2014it\u2019s up to you<\/b><span style=\"font-weight: 400;\">. But sometimes, these configuration settings can be set up incorrectly. <\/span><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"232\" src=\"https:\/\/www.open-e.com\/blog\/wp-content\/uploads\/ezgif.com-video-to-gif-converter.gif\" alt=\"animated graph showing how Open-E retention plan works\" class=\"wp-image-53522\"\/><\/figure><\/div>\n\n\n<p><span style=\"font-weight: 400;\">For example, let\u2019s say you work in an organization where business-critical data constantly changes throughout the workday. However, the backup is created only once a day to avoid overloading the system. Due to that, most of the business-critical data created during a workday may be lost if a problem occurs towards the end of said workday but before the daily backup. Using Open-E JovianDSS\u2019 retention plans, you can record the state of the volume as often as needed, without any waste of time or significant risk of overloading your system.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Real-life Use Case of Misconfigured Retention Plan<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Not a long time ago, one of our clients requested our support as all the snapshots that they kept as backups at an off-site location disappeared. When our team looked into the problem, it appeared that the retention plan was set incorrectly. The client had set the off-site retention plan for a much shorter time than was required and the older data they wanted to reach was erased. This is why you should ask yourself the question, \u201cHow long should I keep the backup copies\u201d? The answer may vary, depending on the exact type of documents ( e.g., tax documents when working in the government sector compared to say, discount flyers, for a local business) you\u2019re storing.<\/span><\/p>\n\n\n\n<p><b>To avoid such unpleasant surprises, we suggest double-checking the retention plan of your data storage solution or requesting technical support at the time of installation.<\/b><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Space Matters<\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">It\u2019s essential to evaluate the needs of your enterprise correctly; needs like how often a backup should be made, how long it should be kept (the retention plan we described above), and how much space it can occupy on the backup server. Moreover, you also have to estimate the amount of data that the company can reasonably accept to lose after a potential disaster and how much time a company can take to recover data before it starts to harm the organization&#8217;s work processes. These can be calculated using the following metrics:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>RPO (Recovery Point Objective)<\/strong> \u2013 the maximum acceptable amount of data that can be lost after the recovery.<\/li>\n\n\n\n<li><strong>RTO (Recovery Time Objective)<\/strong> \u2013 the maximum acceptable time a system can be down after unexpected failure.<\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-weight: 400;\">Using these, you can decide what best matches your company\u2019s goals even before setting up the data storage solution and backup server. It should be noted that using an off-site server as a backup may not let you recover the data as fast as required. You might also consider creating a backup on-site to accelerate the recovery process.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">So, what could happen if you underestimate the workload of your business? Some of our customers recently found out when they had to deal with a lack of backup space for their snapshots, which they used as their backup. There are several reasons why this can happen: <\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Incorrect business workload estimation<\/strong> (when you configure less space than is needed).<\/li>\n\n\n\n<li><strong>Poor retention plan configurations<\/strong> (snapshots taken too often, sometimes even without any changes to the data, which then overloads the storage space)<\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-weight: 400;\">Generally speaking, overloading a server and running out of storage space isn\u2019t a big deal if you react as soon as possible. However, if you miss that moment and the system tries to take another snapshot before the situation is rectified, the snapshot will not be recorded, and the latest changes to your data will not be saved.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">With <\/span><a href=\"https:\/\/www.open-e.com\/products\/jovian-data-storage-software\/general-information\/\"><span style=\"font-weight: 400;\">Open-E JovianDSS<\/span><\/a><span style=\"font-weight: 400;\">, you can always ensure your data and backup are safe.<\/span><b> With the <\/b><a href=\"https:\/\/www.open-e.com\/products\/jovian-data-storage-software\/backup-and-disaster-recovery\/\"><b>On- and Off-site Data Protection<\/b><\/a><b>, you can create multiple backup servers locally as well as in remote locations for extra protection. <\/b><span style=\"font-weight: 400;\">Additionally,<\/span><b> with the High-Availability clustering infrastructure,<\/b> <b>you can simultaneously run the system with almost no downtime <\/b><span style=\"font-weight: 400;\">and eliminate any single points of failure. It gives you the peace of mind that your workload will not be interrupted as your workday proceeds.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span style=\"font-weight: 400;\">Beyond Backup: Understanding the Data Protection<\/span><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">When it comes to data loss, backup issues can be downright disastrous for many reasons, not only described above. E.g., <\/span><a href=\"https:\/\/www.wired.com\/story\/ransomware-payments-2023-breaks-record\/\"><span style=\"font-weight: 400;\">the total amount paid in ransomware attacks in 2023 surpassed $1.1 billion.<\/span><\/a><span style=\"font-weight: 400;\"> It gives you some perspective on how dangerous these attacks are. Ecept that there\u2019s also <\/span><b>silent data corruption, cluster rebuild and drives failures, natural disasters, human errors, system downtimes, or just thefts.<\/b><span style=\"font-weight: 400;\"> If you\u2019d like to know more, about efficient data storage protection in kind of unexpected disaster &#8211; check out the brochure <\/span><a href=\"https:\/\/www.open-e.com\/download\/data-sheets\/beyond-backup-understanding-the-data-protection\/\"><span style=\"font-weight: 400;\">\u201cBeyond Backup: Understanding the Data Protection\u201d<\/span><\/a>.<\/p>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/www.open-e.com\/support-and-services\/academy\/data-sheets-and-brochures\/beyond-backup-understanding-the-data-protection\/\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"660\" src=\"https:\/\/www.open-e.com\/blog\/wp-content\/uploads\/2026\/03\/Mockup-Backup-Brochure-2026-by-Open-E.png\" alt=\"\" class=\"wp-image-56557\" style=\"width:521px;height:auto\" srcset=\"https:\/\/www.open-e.com\/blog\/wp-content\/uploads\/2026\/03\/Mockup-Backup-Brochure-2026-by-Open-E.png 1000w, https:\/\/www.open-e.com\/blog\/wp-content\/uploads\/2026\/03\/Mockup-Backup-Brochure-2026-by-Open-E-768x507.png 768w, https:\/\/www.open-e.com\/blog\/wp-content\/uploads\/2026\/03\/Mockup-Backup-Brochure-2026-by-Open-E-364x240.png 364w, https:\/\/www.open-e.com\/blog\/wp-content\/uploads\/2026\/03\/Mockup-Backup-Brochure-2026-by-Open-E-705x465.png 705w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure><\/div>\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><a href=\"https:\/\/www.open-e.com\/download\/data-sheets\/beyond-backup-understanding-the-data-protection\/\"><img loading=\"lazy\" decoding=\"async\" width=\"215\" height=\"50\" src=\"https:\/\/www.open-e.com\/blog\/wp-content\/uploads\/read-the-brochure.png\" alt=\"read the brochure Open-E button\" class=\"wp-image-52919\" style=\"width:206px;height:auto\"\/><\/a><\/figure><\/div>","protected":false},"excerpt":{"rendered":"<p>Most modern business organizations base their work and operations on large amounts of data. However, not every company treats this data according to its importance. Some are even reckless to&nbsp;&#8230;<\/p>\n","protected":false},"author":2,"featured_media":56554,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[14,27,798],"tags":[],"class_list":["post-51390","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-backup-storage-technology","category-open-e-joviandss","category-tips-tricks"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/posts\/51390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/comments?post=51390"}],"version-history":[{"count":5,"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/posts\/51390\/revisions"}],"predecessor-version":[{"id":56560,"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/posts\/51390\/revisions\/56560"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/media\/56554"}],"wp:attachment":[{"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/media?parent=51390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/categories?post=51390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.open-e.com\/blog\/wp-json\/wp\/v2\/tags?post=51390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}