In our previous blog we talked about the need to back up a variety of data and systems to protect your company’s most valuable resource, its’ data. But how, exactly, do you get that data back if it has been lost to a hardware or software malfunction, hacking, theft, server crash or even human error? Let’s take a look at different ways we can recover data that has been lost.
Four Data Recovery Methods
There are four main data recovery methods. Which of these you’ll need depends on many factors including, how was the data lost, do you have a working backup of the lost data, and whether or not the original equipment is still available.
Method One – Software File Recovery. File recovery, if previously enabled, is the easiest of the four data recovery methods. Many modern operating systems, such as Windows 10, can be configured to automatically save backup copies of files. This feature, called Previous Versions, creates a copy of a file and holds in a special backup storage area. In addition, server software such as Microsoft Exchange for example, have configurations where you can specify that backup emails should be retained for a certain period of days even after a user deletes them. Other software, such as Quickbooks or Microsoft Office, have features that automatically save or prompt you to save backup copies of databases and files each day. With a previously enabled file recovery feature setup in your software, restoring a lost file is sometimes as simple as right clicking on a folder to quickly browse through all files available for recovery.
Method Two – Restore from Backup. In some cases, restoring from backup is the only possible way to get your data back, especially in the event of theft or some types of hardware damage. Backup restoration is moderately difficult and there are two major factors that contribute to making restoration from backups so difficult. First, you must identify the method used to generate the backup and verify that you have a valid, recent backup containing the data you are looking for. Second, you must find a way to restore the data in a way that brings back data you need without destroying other working parts of the system in question. If everything lines up correctly meaning you have a recent, valid backup of the missing data, and you have the necessary equipment ready to restore it, restoring the data from backup can be accomplished quickly.
Method Three – Scanning for Lost Files. This is a highly advanced data recovery method and is only necessary when a backup isn’t available, file recovery is not enabled, but the original hardware is still working. With this method, various software tools, such as GetDataBack, are used to scan a hard drive and evaluate data fragments that have been lost but are still available to recover because they have not yet been overwritten. Unfortunately, this method is not guaranteed to recover lost data but has been known in some cases to help retrieve missing files.
Method Four – Clean Room Hard Drive Recovery. This is definitely the most advanced data recovery method and, sadly, is the last resort to restore missing data. This method is only necessary when all other methods have failed. File recovery was not setup, there are no recent backups, and scanning for lost files is unable to find any available files. This method is often the only way to recover data when a hard drive completely fails and a backup had not been made. In this method, the equipment is sent to a special processing lab where they attempt to physically extract data from a failed hard drive.
Preparing for Easy Data Recovery
As with everything in life, an ounce of prevention is worth a pound of cure. The best way to make sure we can recover all of our data in the event of data loss is to plan ahead. Proper data disaster planning involves setting up and maintaining all of the software and equipment so that the previously outlined steps work as intended. It means that, while everything is working correctly, we must configure file recovery options in our software, make sure that our data backups are running on a daily basis and backing up all important data, and secure our hardware and backups from theft and damage.
Hiring a competent IT firm such as My PC Techs to protect your data, systems, databases and e-mail ensures that you’ll have technology experts on hand who can keep your backups and data secure. In addition to evaluation and configuring data backups and security, another part of the data recovery process is practicing recovery – even when recovery isn’t required. Making sure you can recover data on a regular basis ensures that, when the worst-case scenario hits, down time is minimized and access is restored quickly.
Data Recovery Help for Your Business
Give us a call today at 602-456-0150 and we’ll come to your business and show you how we can eliminate the worry of data loss by installing the perfect backup and recovery systems for you. We look forward to the opportunity to help!
Let’s face it, the most important asset your business has is data – without it, your business could be lost. Given that, it’s surprising how many businesses don’t do enough to protect this incredibly valuable asset. Whether your business is small or large, it is imperative to have a data backup and recovery strategy in place so you’re not scrambling to put something together after a data loss or breach occurs. With such a plan, you can have your systems backed up and running quickly even in a worst-case scenario.
Here at my PC Techs, data backup and recovery are just two of the many computer maintenance functions we perform for our clients, from both a prevention and recovery perspective. Today’s blog will deal with the various types of data backup, how they are different, and the need to maintain and update your data on an ongoing basis; our next post will deal with the recovery process.
Overview
Let’s go over a few terms before we get too far into the types of backups. First off, a data backup is simply a copy of all your business’ records and data, stored in a storage system that is separate from your regular business operating system. This could be in the cloud, an off-site storage facility, or in a separate, on-site location. These backups can take many forms depending on what you are backing up, how secure it needs to be and how quickly you may need to retrieve it in the event of a data loss, hardware failure or theft. With the proper system, you will be able to restore data to your business computers or servers quickly, so your business is equipped to continue operating seamlessly.
Even the most comprehensive data backup and recovery plan is useless, however, if you don’t back up the data frequently – if you suffer a data loss event and the last backup was a week or 10 days prior, you have just taken a giant step backward.
Types of Backup
There are four primary types of backup, each of which has its own specific benefits and levels of security. These types of backup are data; system; database; and e-mail. Let’s take a closer look at each of these types of backup and exactly what each of them protects.
Data Backup
A data backup is exactly what it sounds like – it makes copies of your business’ files from their desktops or work stations and assures that data and information your company needs to operate is secure and available. Data backups are a good general solution to keep your business up and running in case of a data loss or breach, but does not back up your operating system, databases, or e-mail, any of which could be lost in a hard drive failure. It does, however, give your employees access to all their work files, and the primary cause of data loss is human error – accidentally deleting a file.
System Backup
While a data backup provides a baseline level of protection, a far more comprehensive solution is a system backup. This goes well beyond a standard data backup, saving operating systems, programs and settings as well. With a system backup, should you suffer from hardware failure or theft, a computer’s entire operating system can be restored including all the software and configurations. It also is an excellent tool to have in the event of a software upgrade: by constantly updating and saving your system settings, it allows you to implement changes in the system and know there is a reliable backup in place to protect you from crashes or accidental data loss. System updates are generally ran nightly and, in the event of a server with mirroring RAID drives, in real-time.
Database Backup
This is exactly what it sounds like – a copy of the back-end databases for your production software or servers. Any business that relies on a software solution to manage projects, accounting, or reaching out to clients or prospects on a regular basis should consider this type of backup. Like a system backup, this too is a “snapshot” backup that saves everything up to the moment of the last backup. With this type of backup, you also will have access to the backup to restore your database without affecting other system operations.
E-Mail Backup
E-mail is an extremely important communication tool for modern business. Most businesses use email heavily all day long, both to respond to incoming messages, as well as searching previous messages to recall prior conversations. And e-mail data is lost more often than you think, but not from servers crashing or hard drives failing. The most common way e-mail in formation is lost is by human error: accidentally hitting the delete button on an e-mail message or contact. To protect against this, my PC Techs recommends backing up your e-mail so your contacts, messages, calendars and other vital information can be retrieved in case of either a system failure or human error.
Which Backup Option is Best for Your Company?
Obviously if your budget allows it, implementing all these backup options provides your business the greatest security. The cost of these services varies depending on the size of your network. If you are looking for computers experts who are capable of helping you setup and manage the correct backup solutions for your business at a fair price, you’ve come to the right place. my PC Techs has delivered expert IT solutions you can trust for over 15 years and we can help develop, install, and implement a data backup and recovery plan that is capable of handling virtually any event.
Backup Help for Your Business
Give us a call today at 602-456-0150 for a free systems evaluation and get recommendations for a custom data, system, database and/or e-mail backup plan. We look forward to the opportunity to help!
Hopefully this post can help you solve an issue if you’re experiencing a situation with no audio while connecting to a Windows 10 VM in Hyper-V, but audio is not passing through via RDP.
A client had a Hyper-V deployment on Server 2012 R2, hosting a Windows 7 Virtual Machine. They were using Remote Desktop via a Windows 10 client computer to connect to the Windows 7 VM. Within the RDP shortcut on the Windows 10 machine, they had several options checked under ‘local resources’, ‘configure remote audio settings’:
Remote audio playback, play on this computer was checked
Remote audio recording, record on this computer was checked
In addition, within the same RDP shortcut file were the following applied settings (edited with notepad):
audiocapturemode:i:1
audiomode:i:0
audioqualitymode:i:2
From within the Hyper-V host, the VM had ‘allow enhanced session mode’ and ‘use enhanced session mode’ applied for both user and server.
Under these settings and while connecting to the Windows 7 Virtual Machine, audio pass-through via RDP was functional. The Windows 10 machine was able to RDP into the W7 VM and play audio files within the VM that would pass through to the local machine’s speakers.
The problem arose after performing a Windows Update that updated the Windows 7 VM to a Windows 10 VM. The update went smoothly and all application data and user data was preserved during the update process. The client was using the same RDP connection settings to connect to the new Windows 10 VM as described above. However, no audio was passed through the VM to the local machine. In fact, there was a red X shown on the speaker icon from within the VM in the taskbar, and upon hovering over the red X the message displayed was “No audio device” and “Code 45”.
Several troubleshooting steps were attempted, including all the following:
Verify on the local windows 10 machine that the following services were running and set to automatic startup: Windows Audio, Remote Desktop Services, Remote Desktop UserMode Port Redirector
Verify that all of the same services were running on the Hyper-V host server
Look for the ‘Remote Audio’ device from device manager on the Server 2012 R2 Hyper-V host system, which existed.
Attempt to uninstall, then re-install the ‘Remote Audio’ device on the Windows 10 VM, which failed.
Verify that all updates were applied to both the Hyper-V server and the Windows 10 Virtual Machine, which had no impact on the issue
On the server, looked at the Group Policy settings under Computer Configuration, Administrative Templates, Windows Components, Remote Desktop Session Host, Device and Resource Redirection and verified that “Limit audio playback quality” was set to “Enabled” and “Audio Quality” was set to “High”
SFC and DISM scans were ran within the Windows 10 VM to verify that no OS files were corrupt
The most unusual aspect of this issue was the fact that, when connecting to the Windows 10 Virtual Machine using the Hyper-V Manager, and using ‘Enhanced Session’, the remote audio played on the VM would work just fine and would transfer through for playback on the local machine. Since audio redirection worked just fine when connecting via the Hyper-V Manager, but not RDP, I was certain that it was a setting pertaining to the RDP that connection that was the source of the problem.
After some additional reading, we first thought that the VM was faulty, as it was initially setup as Generation 1 for Windows 7, whereas most recommend using Generation 2 for Windows 10. However, after several days of tweaking settings and testing, we finally found the true source of the issue.
The fix was found in the group policy “Enable Remote Desktop Protocol 8.0”. This setting was set to “Enabled” under the Windows 7 VM for whatever reason. After the update to Windows 10, the setting remained, and caused the audio redirection to fail. Changing this setting from “Enabled” to “Not Configured” followed by a reboot allowed audio redirection to work again. Finally, audio could be passed from the Windows 10 VM to the local Windows 10 machine for playback.
As a business owner or manager, you know that reliable email communications are important to the success of your business. my PC Techs can help keep your corporate email running as smooth as possible, with fast and knowledgeable email support services for businesses located anywhere in the Phoenix, Arizona metro area. Our expert computer technicians come to you and help with all of your business technical support needs including email support, email hosting services, and the configuration of email accounts on computers, smartphones and tablets including iPhones, iPads, Android smartphones and tablets, desktop computers, laptops, and servers.
Whether your corporate email is hosted on Gmail, Office 365, Godaddy, webmail, or Exchange Server, or your client is Mail, Thunderbird, or Outlook, our expert techs are ready to help maximize your email configuration across all devices and services. We can also help your business setup an in-house server for internal email hosting or provide email hosting for you through one of our dedicated cloud servers.
Productivity in your inbox is important to us, which is why our experience with spam filtering technologies and email anti-virus strategies will help keep all of your business emails clean and clear of unnecessary distractions. No one wants to spend one to two hours per day filtering through annoying SPAM or risk infecting their computer network with viruses. No matter where you host your email, we can help prevent and resolve spam and viruses on all of your devices. If your inbox already faces issues with spam, our expert technicians can help cut spam by up to 95% through additional email spam filtering services or through other techniques.
We know that you want functional, easy to use email solutions for your business. Our many years of knowledge in the configuration and management of business email provides you with an unrivaled technical edge. Here are a few of the many ways we can help:
Create new email hosting services for your business internally or on Google Gmail, Microsoft Outlook, or other cloud email hosting services
Attach your email hosting to your business domain, so that your email address reads @#yourdomain# instead of some generic service such as @gmail.com or @hotmail.com.
Migrate all of your email from one service to a new email hosting service, preserving your emails along the way
Create and configure new email accounts for individual employees
Maintain Microsoft Exchange servers, solve errors with Exchange server, and perform Exchange upgrades
Setup and configure email accounts on iPads, iPhones, Android smartphones and tablets, computers, laptops, and more
Make sure that email is synchronized across all devices and configure email accounts for optimal performance
Solve email errors in your software including Outlook, Office 365, Thunderbird, and more
Prevent SPAM and viruses in email
No matter your email account problem, email hosting platform, or email software you can contact my PC Techs for exceptional support. Our business technology experts provide expert IT support and computer services for all of your computers, networks, and servers. Servicing Phoenix, Scottsdale, Tempe, Chandler, Gilbert and surrounding areas.
Don’t unplug, we come to you! The award winning technology team at my PC Techs makes it easy for your Phoenix or Scottsdale area business to save money and increase productivity by delivering superior technology solutions. Call now to schedule a visit from your own dedicated computer expert: (602) 456-0150 or click here to email us.
Phoenix, Arizona has it all: Warm weather, strong population growth, and a business-friendly economy making it one of the best places in America to own and operate a business. If you own a business in the Phoenix area you most likely depend on your computers for most of your day to day operations. It is important to protect your computers and important business data from viruses by hiring an experienced computer technician. Your Phoenix area business can count on my PC Techs, a local IT and computer repair company, to keep your computers and important data safe.
Most computer owners think all that is necessary to prevent viruses is a good antivirus program. While an antivirus program is a good start, hackers have elaborate methods for bypassing these safeguards. This means that spyware, malware, ransomware, rootkits, adware, Trojan viruses, and more might wind up infecting even the most cautious of computer users. To protect sensitive data, avoid infections from crafty viruses, and thwart ransomware viruses like Cryptolocker, seek a professional. Effective virus prevention usually involves user training, special software configurations, and routine monitoring from a professional computer technician.
Beyond prevention, virus removal is another area where you’ll want to enlist the help of a professional to be safe. In some extreme cases, a single virus infection that is not properly cared for can result in all of your computer data being lost forever. Even if everything seems fine at the moment, a computer can have a virus on it that is well-hidden. Rootkits, spyware, malware, adware, and trojans can slip by many virus software filters, wind up on a hard drive unnoticed, and endanger computer data.
Even seemingly “simple” to remove viruses like pop-ups from a fake virus infection require a professional to clean. If a computer is already infected, removing and cleaning the known virus or malware infection may involve a deeper look at the computer to find and remove associated viruses hidden from plain sight.
Our professional computer repair technicians are here to help protect your Phoenix, Arizona business computers and data. Our virus removal and prevention methods will help eliminate those pesky pop-ups and keep you safe from potentially costly ransomware infections such as Cryptolocker. After all, a well-protected computer is a happy computer.
Whether you need immediate computer help or regular computer services, contact us. The computer experts at my PC Techs provide expert computer maintenance and computer repair for your computers, networks, and servers. Servicing Phoenix, Scottsdale, Tempe, Chandler, Gilbert and surrounding areas, call (602) 456-0150.
Don’t unplug, we come to you! The award winning technology team at my PC Techs makes it easy for your Phoenix or Scottsdale area business to save money and increase productivity by delivering superior technology solutions. Call now to schedule a visit from your own dedicated computer expert: (602) 456-0150 or click here to email us.
WE WORK HARD FOR YOU, BUT DON'T JUST TAKE OUR WORD FOR IT! We've helped over 1,000 satisfied businesses throughout the Phoenix valley, click here to view some of their testimonials:
Managed IT and Computer Repair services for these Arizona cities: Ahwatukee, Carefree, Cave Creek, Chandler, Chandler Heights, Fountain Hills, Gilbert, Glendale, Higley, Laveen, Mesa, Paradise Valley, Peoria, Phoenix, Scottsdale, Tempe
To learn how Managed IT and Computer Repair services can help your Phoenix area business save money and increase productivity, click here to visit Phoenix Computer Repairs.
my PC Techs | Expert IT and Computer Repair Solutions You Can Trust | (602) 456-0150