- May 2018
Myth busting Microsoft Office 365
Microsoft Office 365 is the industry leading cloud based solution for office software and applications. As with cloud based applications, most come with a designated volume of storage. For Office 365 this is available via OneDrive and provides a variety of file storage options. As these applications are always available and accessed from anywhere, the tendency is to rely on them like you would a backup solution, however this could leave your business exposed to a variety of risks and data loss is almost inevitable.
1 in 3 businesses have reported losing data that is stored in cloud-based applications. That means the permanent deletion of potentially hundreds of work hours. The truth is that even data in cloud-based applications are vulnerable to:
- Malware damage or ransomware attacks
- Accidental end-user deletion
- Malicious end-user activity
- Operational errors such as accidental data overwrites
- Lost data due to cancelled account subscriptions
- Misconfigured application workflows
With more and more companies depending on cloud applications, these risks are impossible to ignore. That means that best practices like data backup are just as important in the cloud as in traditional on-premises IT systems. An independent data backup separated from the app itself is necessary to avoid the most common data loss pitfalls.
Why is Office 365 backup insufficient?
Although most Office 365 can provide modest backup and restoration capabilities, these are fairly basic and limited, and in many cases there are scenarios where data loss can be experienced, such as when licenses have expired, where data is deleted or when historic files are being restored.
Whatever your Office 365 backup requirements, such as point in time, on demand and daily, we have the ideal solution with Datto Security as a Service. It’s an entirely cloud based solution and doesn’t require any additional software to be installed. Datto SaaS can give you the peace of mind that your data is protected, easily retrievable, and that in the event of a ransomware attack, can be restored at the touch of a button.
For more information on these or any other security related products click here.