What is the 3-2-1 rule

Issue 6 2023 Infrastructure


Emma Mbebe.

Bad things happen. One day, that file you worked on is fine. The next, it is gone, lost in a hard drive failure or perhaps a stolen device. Maybe the version you worked on has been corrupted and you need to recover an earlier file. Someone might have deleted the file, removing it from your systems forever.

Data corruption is a bit like a car accident. It does not happen often to a person, but when it does, even a minor fender bender can create inconvenience, and a major smash can cause months, even years, of problems. Likewise, when a file or database no longer performs as it should, it can lead to severe losses. Is not there anymore," says Emma Mbebe, Account Manager at Sithabile Technology Services. "Hours of work evaporate just like that, and you can spend a lot of time afterwards trying to fix the situation. It is a big inconvenience when this happens to one person. When the data is used by multiple people, the impact is exponential across a business. This is why criminal attacks like ransomware work so well; they hit a business where it hurts the most."

Hence, why data backups are critical. Yet, it is not enough to make one backup. If you want to be thorough, follow the 3-2-1 rule. What is the rule, does it apply to every company, and can they afford it?

The 3-2-1 safety net

The 3-2-1 rule is pretty simple; have 3 copies of data on 2 different media and 1 kept offsite. For example, keep two copies of a file on separate removable flash drives, and a third on cloud storage (offsite). You can also have the file on network storage, and two removable drives, keeping one drive at an offsite location.

You can apply the rule manually or with backup automation. You could even print the file's contents on paper and keep that safe. It is not convenient, but it is a backup. You could maintain two or several copies of a file. The point is to create redundancy through multiple independent backups.

Surprisingly, IT experts did not invent the 3-2-1 rule. It first appeared in a book, Digital Asset Management for Photographers, where author Peter Krogh guided photographers on safeguarding their growing digital photo libraries. Digital photos were one of the first digital mediums that started growing is gone forever. That is, unless they have a copy.

The 3-2-1 rule has since become the baseline for good backup practices, and it has evolved to incorporate many different storage mediums and backup strategies.

Is the 3-2-1 rule for your business?

Applying the 3-2-1 rule makes a lot of sense, but it may also feel excessive. Specifically, paying for different storage options and managing copies across those instances sounds complex and expensive. Smaller businesses might feel they do not qualify, but Mbebe disagrees. "Making multiple backups can sound daunting and costly when you look at the higher-tier options, such as dedicated network storage, but, in principle, you do not need to go that far. The hardest part is to decide what data is important, then balance that with security and compliance. For example, if you are writing a pitch document, that is not very sensitive. You can save a copy to email, to a flash drive, and save a third one on a service such as OneDrive."

At a fundamental level, the 3-2-1 rule works for any situation. It is all relative to what a person or business needs.

"I like to think of the rule as a conversation starter. The question is not whether you use this rule but whether you are concerned about backups at all. If you need to be serious about backups, then the rule provides a good foundation. Now, decide on your priorities and capacity, then establish a backup strategy which can be as simple as telling employees to save copies to the cloud, or involve elaborate management and backup appliances. A healthcare provider or financial institution should never back sensitive data onto removable drives or external emails. So, there we already know what they can and cannot do, projected through the rule."

The 3-2-1 Rule sets a benchmark. Fill in the gaps, and you will see if your backups are sufficient. It is a rule that can apply to every organisation and even individuals.

Without it, you take a massive risk. Bad things happen to data. Beyond the scary stories about ransomware and data theft, it can be a simple case of losing a device or a hard drive failing. Maybe a water pipe bursts and floods your office, now that offsite backup makes sense! So, do not ignore this crucial rule. Consider how it would fit into your organisation, and make your backups as easy as 3-2-1.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...
The rise of autonomous data recovery
Information Security Infrastructure
Escalating cyberthreats and attacks constantly put businesses under pressure, increasingly prompting organisations to shift their mindsets towards ensuring continuous operations and thus avoiding downtime and revenue loss.

Read more...
Can we really fight AI cybersecurity threats with more AI?
Information Security Infrastructure
In a world where artificial intelligence (AI) is increasingly being weaponised by cybercriminals, the question of whether we can effectively combat AI threats with more AI is not just a technical inquiry but a pressing global concern

Read more...
Partnership delivers 40% storage savings for surveillance
Surveillance Infrastructure
Large-scale video surveillance users and applications demanding extended storage periods will benefit from up to 40% savings on video storage hardware stacks thanks to a new partnership between IDIS and Secure Logiq.

Read more...
How smart video is transforming storage at the edge
Infrastructure Surveillance
As these technologies come together, they are impacting the architecture of the edge and what we require from data storage. More specifically, they are driving a demand for specialised storage.

Read more...
VPS hosting set to dominate in 2025
Infrastructure
SME market growth and the increasing need for a digital footprint are pushing VPS growth in South Africa, especially since it is now perceived as a viable business tool, scalable by nature, with improved performance.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Highest capacity ePMR HDDs
Infrastructure Products & Solutions
Western Digital has announced that it is now shipping the world’s highest capacity UltraSMR HDD with up to 32TB leveraging the time-tested, reliable energy-assisted PMR (ePMR) recording technology for hyperscalers, CSPs and enterprises.

Read more...