Backups exist but have never been restored
The most common failure mode: a green dashboard for years, and the first restore attempt is during a real incident. Untested backups are not backups; they are hopes.
Service · Backup & Disaster Recovery
We test the restore. We rehearse the runbook. We commit RTO and RPO in writing. When the primary tenant goes down at 2 a.m. (it almost never goes down at 10 a.m.), recovery follows a timeline you signed off on, not one we invent under pressure.
The most common failure mode: a green dashboard for years, and the first restore attempt is during a real incident. Untested backups are not backups; they are hopes.
Modern ransomware actors target backup infrastructure first. If your backup target is reachable from the production tenant with the same credentials, it's already compromised.
Default retention in Microsoft 365 is short and recovery-bin-style. Mailbox loss after the deletion window — gone. SharePoint, OneDrive, and Teams chats all need third-party protection.
Most managed-IT contracts include backups but never define how fast recovery has to happen, or how much data loss is acceptable. When something goes down, neither side has a written commitment.
Most companies cannot describe — in writing — exactly what happens in the first hour after a disaster. The team that knew the plan left two years ago.
We back up what you have. Veeam, Rubrik, Datto, Acronis, Microsoft 365 Backup — we operate the platforms that fit your environment. If your current setup is working and just needs better operations, we keep it.
Quarterly at minimum. Critical workloads (Microsoft 365 mailboxes, primary file shares, ERP) test every month. Test results — including any failure — are documented in your monthly executive review.
Depends on workload class. Critical services typically target RTO under 4 hours and RPO under 1 hour. Standard services target RTO 24 hours, RPO 4 hours. Bulk archive can be 72 hours / 24 hours. The exact targets are negotiated and contractually defined per workload during onboarding.
Yes. Backups land in an immutable + air-gapped tier that uses separate credentials, separate network paths, and write-once retention. Even if the primary tenant is compromised, the backup target cannot be deleted within its retention window.
Yes. Backup is the data part. DR is the runbook part — who pages who, in what order, with which authority. Both are operated together. Annual DR exercise included with the Fortress SOC tier.