Welcome to the accompanying webpage for Data Backup as Part of IT and Cybersecurity: Identifying Technical, Human, and Fraudulent Risks and Minimizing Them with Comprehensive Backup and IT Security Strategies.
![]() |
On these pages, you will find additional downloadable checklists as well as instructions for configuring data backups on Microsoft Windows, Windows Server, and Apple macOS. In addition to detailed step-by-step explanations for setting up secure backup processes, you will also receive practical tips for the long-term maintenance of your backup strategies. The content is regularly supplemented and updated so that you always stay informed about the latest developments in the field of data backup and IT security. As a result, you can not only deepen the fundamentals described in the book but also put them directly into practice. |
In the book, we provide illustrative work aids and templates in Chapter 8. These examples not only serve as demonstrations but can also be used as a reference when creating your own checklists and guidelines.
You can download these sample guidelines here as a PDF. We have also included references to the relevant sections in the book.
(see Sec. 8.1; for more details: Sec. 5.9)
(see Sec. 8.2; for more details: Sec. 4.1.1)
(see Sec. 8.3; for more details: Sec. 4.1.2)
(see Sec. 8.4; for more details: Sec. 4.1.3)
(see Sec. 8.5; for more details: Sec. 4.2.1)
(see Sec. 8.6; for more details: Sec. 4.2.2)
(see Sec. 8.7; for more details: Sec. 4.2.3)
(see Sec. 8.8; for more details: Sec. 4.3)
(see Sec. 8.9; for more details: Sec. 4.4)
Since we refer to online sources with lengthy hyperlinks in this book, we would like to offer you the possibility to click these links via a collection rather than having to type them out. You can download this link collection here: Bibliography and Sources
![]() |
After learning from our book about the purpose and importance of data backup, how diverse the associated risks can be, and how to develop a solid backup concept, we now want to focus specifically on implementing these backups. To help you with that, we are providing an earlier guide Data Backup Made Easy. |
![]() |
Vanessa Chamera earned her Master’s degree in Economic Policy Consulting (M.Sc.) at Ruhr University Bochum, then gained professional experience in the field of IT security. In addition to her work in digital forensics, she specialized in analyzing information security measures for risk prevention. |
![]() |
Martin Bodenstein holds a degree in Computer Science (univ.), an MBA, and has a military background, making him an expert in high-security requirements. Building on many years of forensic expertise, he focuses on the continuous further development and professional hardening of security profiles to achieve “Forensic Readiness.” |
![]() |
Patrick Müller, who holds a degree in Business Information Systems, is an expert in forensic data analysis and has made significant contributions to optimizing analysis methods in leading consulting and industrial companies. As a lecturer, he focuses on forensic data analysis, audit data science, and visual analytics. His ethos, shaped by forensic precision, aims to provide companies with transformative insights while preventing damage. His credo in this regard: “No Data, No Party.” |
Transform data into EBIT, prevent fraud, and boost profitability with our tailored Data & Analytics and IT coaching. We help optimize and secure your business processes and IT systems.
No comments yet
What do you think?