What is the 3-2-1 rule

Issue 6 2023 Infrastructure


Emma Mbebe.

Bad things happen. One day, that file you worked on is fine. The next, it is gone, lost in a hard drive failure or perhaps a stolen device. Maybe the version you worked on has been corrupted and you need to recover an earlier file. Someone might have deleted the file, removing it from your systems forever.

Data corruption is a bit like a car accident. It does not happen often to a person, but when it does, even a minor fender bender can create inconvenience, and a major smash can cause months, even years, of problems. Likewise, when a file or database no longer performs as it should, it can lead to severe losses. Is not there anymore," says Emma Mbebe, Account Manager at Sithabile Technology Services. "Hours of work evaporate just like that, and you can spend a lot of time afterwards trying to fix the situation. It is a big inconvenience when this happens to one person. When the data is used by multiple people, the impact is exponential across a business. This is why criminal attacks like ransomware work so well; they hit a business where it hurts the most."

Hence, why data backups are critical. Yet, it is not enough to make one backup. If you want to be thorough, follow the 3-2-1 rule. What is the rule, does it apply to every company, and can they afford it?

The 3-2-1 safety net

The 3-2-1 rule is pretty simple; have 3 copies of data on 2 different media and 1 kept offsite. For example, keep two copies of a file on separate removable flash drives, and a third on cloud storage (offsite). You can also have the file on network storage, and two removable drives, keeping one drive at an offsite location.

You can apply the rule manually or with backup automation. You could even print the file's contents on paper and keep that safe. It is not convenient, but it is a backup. You could maintain two or several copies of a file. The point is to create redundancy through multiple independent backups.

Surprisingly, IT experts did not invent the 3-2-1 rule. It first appeared in a book, Digital Asset Management for Photographers, where author Peter Krogh guided photographers on safeguarding their growing digital photo libraries. Digital photos were one of the first digital mediums that started growing is gone forever. That is, unless they have a copy.

The 3-2-1 rule has since become the baseline for good backup practices, and it has evolved to incorporate many different storage mediums and backup strategies.

Is the 3-2-1 rule for your business?

Applying the 3-2-1 rule makes a lot of sense, but it may also feel excessive. Specifically, paying for different storage options and managing copies across those instances sounds complex and expensive. Smaller businesses might feel they do not qualify, but Mbebe disagrees. "Making multiple backups can sound daunting and costly when you look at the higher-tier options, such as dedicated network storage, but, in principle, you do not need to go that far. The hardest part is to decide what data is important, then balance that with security and compliance. For example, if you are writing a pitch document, that is not very sensitive. You can save a copy to email, to a flash drive, and save a third one on a service such as OneDrive."

At a fundamental level, the 3-2-1 rule works for any situation. It is all relative to what a person or business needs.

"I like to think of the rule as a conversation starter. The question is not whether you use this rule but whether you are concerned about backups at all. If you need to be serious about backups, then the rule provides a good foundation. Now, decide on your priorities and capacity, then establish a backup strategy which can be as simple as telling employees to save copies to the cloud, or involve elaborate management and backup appliances. A healthcare provider or financial institution should never back sensitive data onto removable drives or external emails. So, there we already know what they can and cannot do, projected through the rule."

The 3-2-1 Rule sets a benchmark. Fill in the gaps, and you will see if your backups are sufficient. It is a rule that can apply to every organisation and even individuals.

Without it, you take a massive risk. Bad things happen to data. Beyond the scary stories about ransomware and data theft, it can be a simple case of losing a device or a hard drive failing. Maybe a water pipe bursts and floods your office, now that offsite backup makes sense! So, do not ignore this crucial rule. Consider how it would fit into your organisation, and make your backups as easy as 3-2-1.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Service robot technology for residential complexes
Suprema AI & Data Analytics Infrastructure Residential Estate (Industry)
Suprema has signed a three-party memorandum of understanding (MOU) with Hyundai Motor Group Robotics LAB and Hyundai Engineering & Construction (Hyundai E&C) to collaborate on advancing residential complexes through service robot technology.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
AI projects are failing at alarming rates
AI & Data Analytics Infrastructure
As organisations around the world accelerate their investments in artificial intelligence, digital transformation and data analytics, a growing number of industry experts are warning that many companies are still approaching these initiatives in fundamentally flawed ways.

Read more...
Understanding the Shared Responsibility Model
Infrastructure Security Services & Risk Management
While the cloud can certainly be a growth enabler in many ways, it can also introduce new security risks. Companies want to have a clear understanding of where their security duties end and where their cloud service provider’s begin.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.