Traditionally, backup and recovery software products had a purpose, to make a copy of the data. Storage administrators are increasingly relying on encryption and other security technologies to store sensitive data. The field is of growing importance due to increased support in computer systems and the Internet. But over the last few years, backup software products have evolved to include a whole host of functionalities.Technology such as data protection (CDP), file retrieval, data deduplication, repetition, backup reporting tools, and even data archiving have become features or are strongly integrated with software classroom backup applications enterprise. Generally the computer must be protected from theft, vandalism, opening, launch with another media. This study aims to provide a description of safe backup systems and how they function.Backup, or backup of backup, is one of the most important steps that can be taken to protect our information. Backup enables data recovery if a problem occurs, such as disk corruption, accidental deletion of data, theft or loss of equipment, or virus infection.Always good system administration includes reliable backup and recovery procedures. Based on business needs, booking procedures should be planned. Integrated backup and recovery tools in the Operating System or software devoted to another vendor can be used. Sometimes, an extra device may be required to store the data.Some of the important facts that should be considered during backup planning are:o How often backup data needs to be made and what is the best backup timeo How much data should be storedo Outbound data storage in case of disastero How long should backup data be storedo Data Saved Data: The backup media should be stored in a safe place. If data is stored online, securing data from a hacker / intruder is just as importanto Good documentation for recovery and backup proceduresThere are two ways to decide what to backup: (1) special data that are important, such as documents, photos, or video footage; (2) anything, including the operating system or any program that may be installed except the data. The first way it simplifies the backup process, but the second way is simpler and more reliable if the whole system needs to be restored when fully disrupted. If there is no guarantee what to do backup, then backup everything.Backup refers to copying physical, virtual or database files to a secondary storage location, in case of hardware failure or other catastrophes. This, using different security tools and protocols according to accepted standards. The process of data retention is essential for a successful disaster recovery plan (DR).Planning backup procedures is done depending on the business needs and corporate purpose. Any disaster recovery plan / procedure is not complete unless it is tested. Backup and Recovery Testing examines the practices and technologies of an organization for data security and data retrieval. The aim is to provide fast and reliable data retrieval if need arises. The process of obtaining backup data files is known as file retrieval. Periodically, it should be proven whether data regulation is working.Enterprises support the information they think to be vulnerable to malicious software, data corruption, hardware failure, malicious attack, user error, or other unforeseen events.When disaster recovery and recovery is planned, basic rules are how quickly the system should be rebuilt in the latest state of the job if the entire system is destroyed and how much data can be recovered to lose.Generally there are two ways to backup: in physical media or in “cloud”. Physical media include DVD, USB, or external disks. When using physical backups, we must make sure that the copy is not in the same place as the original data. Media labels are also set so that backups can be distinguished on a given date or time.The advantage of physical media is that backup and recovery of data is done quickly. The disadvantage is that in the event of a disaster it may lose not only the computer but also the backup. Therefore, there should be a plan to save backup copies to a location other than the original. When backups are saved away, they must also be encrypted – so if you lose the backups at least the data is protected. When encrypting backups, we need to make sure we keep passwords securely.Cloud backup solutions are different. This service means that data is stored in “cloud” (somewhere on the Internet). This works by installing a computer program, which then automatically backs up the data. The advantage of this solution is that there is no need for disk space and payment for expensive servers or software licenses. Cloud shortage in the cloud is that it may be slow, especially when there is a lot of data.A backup process applies to critical databases or related business line applications. The process is guided by predefined backup policies that specify how often data is stored and how many copies are required, as well as service level agreements (SLAs) that determine how quickly the data should be restored.The most common backup options are every hour, every day, every week, and so on. Personal backup applications such as Microsoft Time Machine and Windows Backup and Restore allow you to create hours when automatic backups are made. These solutions keep the data quietly while working on the computer, or not. Other solutions offer “continuous protection”, meaning that all new or changed documents are backed up when they are shut down by the user.Best practices suggest that a full backup of data should be scheduled to occur at least once a week, often over the weekend or overtime. To complete the full weekly backups, enterprises usually plan a series of differential backup jobs or data growth that only store data that has changed since the last full backup was made.The most important and most valuable data, whether personal or business, should be stored in a safe backup location. The security of this backup site is very important and requires constant monitoring and improvement. Without a Backup Data Backup Plan, the entire business can be in jeopardy. If possible, the best way is to backup in both ways: in the physical medium and in the cloud. The backup process needs to be automated as much as possible.System administrators need to be more up-to-date with the systems and networks they manage. There is a greater challenge for them, to preserve them and protect them from hackers. It also helps any organization to be prepared in the event of any breach of security or misfortune. If system administrators are more cautious and follow good practices during routine administrative tasks, there may be secure systems.