Skip to main content
Cloud Services

Backup and disaster recovery for Sydney businesses.
Tested every month. Immutable by design.

A backup you have never tested is a backup you cannot trust. CIO Tech uses the 3-2-1 backup strategy with immutable storage, runs restore tests every month, and builds disaster recovery plans that tell you exactly how to get back online. Every Assured client gets this as standard.

Bella Vista, NSW
Same-day on-site
Published pricing

Three copies. Two media types. One offsite.

The 3-2-1 rule is the gold standard for backup. It means no single event can wipe out all your data. Fire, ransomware, hardware failure, accidental deletion. At least one copy survives.

3

Copies of your data

Your production data plus two backup copies. Redundancy is the foundation. If one copy is corrupted or deleted, two remain.

2

Different storage types

Local disk and cloud storage, for example. This protects against a failure that takes out one type of storage entirely. A NAS failure does not touch your cloud backup.

1

Copy offsite

At least one copy in a physically separate location. If a fire or flood destroys your office, the offsite copy is untouched and ready to restore.

Immutable storage

Once a backup is written, it cannot be changed, encrypted, or deleted. Not by ransomware, not by a compromised admin account. This is the feature that makes your backups ransomware-proof.

Monthly restore testing

We run recovery drills every month. Files are restored, databases are verified, and the results are documented. You get proof your backups work, not just a green tick on a dashboard.

Backups are the first step. Recovery is the plan.

Having backups is necessary but not sufficient. You also need a plan that tells you exactly what to do when something goes wrong. How long recovery takes, who does what, and in what order.

Recovery time objectives (RTO)

How long can your business be offline before it causes serious damage? We define your RTO for each system and build recovery procedures that meet it. Your accounting server and your marketing drive do not need the same urgency.

Recovery point objectives (RPO)

How much data can you afford to lose? An hour? A day? Your RPO determines backup frequency. Critical systems with a 1-hour RPO get more frequent snapshots than a document archive.

Documented runbooks

Step-by-step recovery procedures for each scenario: ransomware, hardware failure, accidental deletion, office loss. Written so any engineer on our team can execute them, not just the person who set them up.

Insurance and audit support

Cyber insurers and auditors ask about your backup and DR posture. We provide the documentation they need: backup schedules, retention policies, restore test results, and the DR plan itself.

What we back up

Backup coverage depends on your environment, but these are the most common workloads we protect for Assured clients.

Microsoft 365

Email, OneDrive, SharePoint, Teams

Servers

On-premise and Azure virtual machines

Endpoints

Laptops and desktops with critical data

Applications

Databases, LOB apps, configuration data

Backup and disaster recovery is included in every CIO Tech Assured plan from $500/month plus GST. Not sure if your current backups would survive a ransomware attack? Find out with a $990 plus GST IT Audit.

Ready to get your IT sorted?

Start with a IT Audit to see exactly where you stand. Or take our free maturity assessment for a quick snapshot.

Cyber Posture Snapshot

Your details 1 / 10

How exposed is your business?

Six quick questions, two short ones to tailor the result, and you'll see where your business stands. About two minutes. Plain English, no jargon.

We'll use your email to send a copy of your result. No spam, no pushy sales calls.

Question 1 of 9

When your team logs in to email and business apps, do they need a code from their phone as well as a password?

Question 2 of 9

If a ransomware attack locked all your files tomorrow, could you restore them from a backup?

Question 3 of 9

When Microsoft or Apple release a critical security update, how fast does it land on your computers?

Question 4 of 9

How many people in your business can install software or change system settings on any work computer?

Question 5 of 9

If a staff member got a fake invoice or "urgent" email pretending to be from you right now, what would happen?

Question 6 of 9

When a staff member leaves, when does their access to email, files, and apps actually get cut off?

Question 7 of 9

How many people work in your business?

Question 8 of 9

Who looks after your IT today?

Question 9 of 9

What sort of business are you?

Tailoring your result...

Hi there, here's where your business stands.

Your Cyber Posture
Critical gaps Critical
Notable exposure Notable
Mixed picture Mixed
On the right track On track

Notable exposure

Your two biggest gaps

  1. 1
  2. 2

Where this leaves you on Essential Eight

  • MFA Multi-factor authentication
  • Backups Regular backups
  • Patching Covers 2 of 8: Patch applications + Patch operating systems
  • Admin access Restrict administrative privileges

This snapshot covers 5 of the 8 Essential Eight controls. The full IT Maturity Assessment covers all 8, plus Microsoft 365 hardening, device management, and staff training.