The average cost of an unplanned IT downtime event for a small business is measured in thousands per hour — and that doesn't include the longer-term cost of lost client trust, reputational damage, and the data that sometimes cannot be recovered at all. Despite this, surveys consistently find that fewer than 40% of small businesses have a tested, documented disaster recovery plan. Most assume the backup is working. Most haven't tested it. And many discover the problem only when they actually need it to work.

A backup and disaster recovery plan is not a luxury for enterprises. It's the minimum viable infrastructure for any business that depends on its data and systems to operate — which, in 2026, is every business. This guide walks through the complete process of building a plan that actually works: defining your recovery objectives, choosing the right backup strategy, selecting tools and platforms, and — critically — testing the plan before disaster strikes. We work with businesses worldwide, and the organisations that recover from ransomware, hardware failure, and natural disasters in hours rather than weeks all share one thing: a tested plan built before the event.

Understanding RTO and RPO: The Two Numbers That Drive Everything

Before you choose a single backup tool or cloud provider, you need to define two numbers that will shape every other decision in your disaster recovery plan:

Start by listing your 5–10 most critical business systems and assigning a realistic RTO and RPO to each. Don't default to 'as fast as possible' for everything — that drives unnecessary cost. Be honest about the actual business impact of different downtime durations. Your accounting software being down for 4 hours is a problem. Your archive storage being unavailable for 72 hours probably isn't. The difference in recovery cost between those two requirements is substantial.

The 3-2-1 Backup Rule (and the 2026 Update: 3-2-1-1-0)

The 3-2-1 rule has been the foundation of backup strategy for 20 years. It states: keep 3 copies of your data, on 2 different types of storage media, with 1 copy offsite. It remains valid and is the minimum standard for any SMB backup strategy.

In 2026, the updated version — 3-2-1-1-0 — adds two important components driven by the ransomware threat:

The immutable copy is the 2026 addition that matters most. Modern ransomware actively targets backup systems, deleting or encrypting backup copies before launching the main attack. An air-gapped or immutable backup (using features like AWS S3 Object Lock, Wasabi Immutable Buckets, or Backblaze Immutability) cannot be touched by ransomware, ensuring at least one clean recovery point regardless of what the attack reaches.

What to Back Up: A Complete Inventory for SMBs

The most common backup gap in small businesses is incomplete scope — backing up some systems but not others, or backing up files but not the configurations and credentials needed to restore operations.

Critical data to back up

What people forget to back up

Want help putting this into practice?

Book a free 30-minute strategy call — I'll review your current setup and map out the next 3 high-impact steps for your business.

Book a Free Strategy Call →

Backup Tools and Platforms for SMBs in 2026

The backup market has consolidated around a set of well-tested platforms suitable for SMBs. Here are the most widely deployed options by category:

Endpoint and server backup

Cloud and SaaS backup

Cloud storage for backup destinations

Building Your Disaster Recovery Runbook

A backup without a recovery procedure is an incomplete plan. A disaster recovery runbook is a documented, step-by-step guide that tells your team exactly what to do when a specific failure scenario occurs. It should be written in plain language, stored in multiple locations (including offline), and usable by someone who was not involved in designing the original infrastructure.

What a runbook should contain

  1. Scenario description: What type of failure does this runbook address? Ransomware attack, server hardware failure, office fire, cloud provider outage?
  2. Responsible parties: Who does what? Names, roles, and contact information. Include an escalation path if the primary contact is unavailable.
  3. Step-by-step recovery procedure: In sequence, numbered steps. Include login credentials vault locations, system access procedures, and verification steps at each stage.
  4. Recovery time target: The RTO for this scenario and which systems are restored in what order of priority.
  5. Communication plan: Who notifies clients, vendors, and staff? What do you say? A pre-drafted communication template avoids delays and inconsistencies during the chaos of an actual incident.
  6. Post-recovery checklist: Steps to take after systems are restored — scanning for remaining threats, changing credentials, documenting lessons learned, notifying any regulatory bodies if data was breached.

Store your runbook in at least three places: a printed copy in a secure physical location, an encrypted copy in cloud storage accessible without your primary systems being operational, and a copy with your IT support provider or managed service partner.

Testing Your Backup and Recovery Plan

A backup plan that has never been tested is not a plan — it's a hope. Backup failures are common, and they fail silently: corrupted backup files, incomplete snapshots, misconfigured retention policies, and authentication failures that prevent restore are all discovered at the worst possible time unless tested proactively.

Testing schedule

Document every test: what you tested, the results, any failures encountered, and what was corrected. This documentation satisfies auditors, insurers, and clients who ask about your data protection practices. It also creates a history of your backup programme's maturity that is valuable during due diligence processes.

For help designing or auditing your backup and disaster recovery programme, our IT consultation services include full BDR assessments. Also see our guide on ransomware protection for small business for the threat context that makes tested recovery plans essential.

Frequently Asked Questions

Is cloud sync (OneDrive, Google Drive) the same as a backup?

No — and this is one of the most dangerous misconceptions in SMB IT. Cloud sync replicates your files to the cloud, but it also immediately replicates deletions and ransomware encryption. If ransomware encrypts your files, the encrypted versions sync to the cloud within minutes. A real backup maintains historical versions with a retention window long enough that you can restore from before the ransomware event. Use dedicated backup tools in addition to sync.

How long should I retain backups?

A common retention policy for SMBs: daily backups retained for 30 days, weekly backups retained for 12 months, and monthly backups retained for 7 years (for compliance with most financial and legal records requirements). Adjust based on your industry's specific regulatory requirements. Ransomware attacks are sometimes not detected for 30 to 90 days, so retaining backups for at least 90 days significantly improves your recovery options.

What is the difference between backup and disaster recovery?

Backup is the process of copying and storing data so it can be restored if lost. Disaster recovery is the broader plan for restoring business operations after a significant disruptive event — including the documented procedures, communication plans, failover systems, and tested runbooks needed to get back to operational status within your RTO. Backup is one component of disaster recovery, not a substitute for the full plan.

How do I protect backups from ransomware?

Three practices together provide strong ransomware protection for backups: immutable backup storage (backup files that cannot be modified or deleted for a defined retention period), offline or air-gapped backups (a copy with no live network connection that ransomware cannot reach), and separate access credentials for backup systems (different from your production environment so that a compromised admin account cannot access backups).

Do I need cyber insurance in addition to a backup plan?

Yes — a backup plan and cyber insurance complement each other. Backup covers data recovery. Cyber insurance covers the broader costs of an incident: business interruption losses, forensic investigation, legal liability if client data was breached, regulatory notification requirements, and sometimes ransom negotiation. Insurers increasingly require evidence of a tested backup and recovery plan as a condition of coverage, so having a documented programme also reduces your premium.

Ready to build a backup and recovery plan that actually works when you need it?

Book a free 30-minute strategy call and we will audit your current backup posture, identify critical gaps, and design a tested recovery plan that meets your specific RTO and RPO requirements.

Book a Free 30-Minute Strategy Call →