For SMEs in Sussex & Kent

Backup & Business Continuity

Reliable, tested backups and a clear recovery plan - built into your all-inclusive service, not sold as an add-on.

Why This Matters

Why backup & continuity matter more than most SMEs expect

Most 10-25 seat SMEs assume their data is "already backed up" because they use Microsoft 365, keep files in SharePoint, or have an old on-premise server with a USB drive attached.

Why This Matters

Why backup & continuity matter more than most SMEs expect

Most 10-25 seat SMEs assume their data is "already backed up" because they use Microsoft 365, keep files in SharePoint, or have an old on-premise server with a USB drive attached.

Why This Matters

Why backup & continuity matter more than most SMEs expect

Most 10-25 seat SMEs assume their data is "already backed up" because they use Microsoft 365, keep files in SharePoint, or have an old on-premise server with a USB drive attached.

Unfortunately, this false sense of security is one of the biggest risks small businesses face. Here's the reality:

Microsoft 365 does not provide full backup by default. Microsoft protects availability, not your resource needs (or data).

Human error is the number one cause of data loss. Accidental deletion, overwrites, sync conflicts or disgruntled leavers all pose a risk to your data integrity.

Cyber incidents increasingly target backups. Attackers often corrupt or encrypt backup data before deploying ransomware.

Insurance and supply chains now expect proof of tested backups. Not vague reassurance — documented evidence.

If your business can't confidently answer "How quickly could we recover if we lost critical data today?", you don't have a continuity plan. You have a hope.

Failure Modes

Common failure modes in SME environments

Failure Modes

Common failure modes in SME environments

Failure Modes

Common failure modes in SME environments

We see the same issues across almost every SME before they standardise their IT.

"I thought Microsoft/the cloud backed everything up?"

Microsoft 365 has data retention features, not a traditional backup that you can fully restore from. It also doesn't protect you from accidental deletion or malicious deletion.

No restore testing

Backups exist — but nobody knows if they actually work.
Weeks or months can pass before someone notices data is missing.

Gaps in what's backed up

For example:

  • Mailbox backed up, but SharePoint sites not

  • Teams chat not backed up

  • Personal OneDrive accounts ignored

  • Only local servers, not cloud apps

  • Only documents, not configurations or metadata

Single copies of backups

A USB drive or NAS box is not a business continuity plan.

No process for leavers

Departing employees' data either disappears or remains accessible long after they have gone.

No alignment with Cyber Essentials

Cyber Essentials (CE) requires backup and recovery to meet a consistent standard.
Many SMEs fail this without realising.

CTA Text Link

Inclusions

What’s included in your all-inclusive service

Inclusions

What’s included in your all-inclusive service

Inclusions

What’s included in your all-inclusive service

Unlike typical managed service providers (MSPs) who sell backup as an add-on, our baseline service includes:

Third-party Microsoft 365 backup

A full, independent backup of:

  • Exchange Online mailboxes

  • SharePoint sites

  • OneDrive accounts

  • Teams files and data

This protects you from accidental deletion, malicious deletion, sync failures, and ransomware.

Server backup

If you still run local servers, we include:

  • Full image-based backup

  • File-level restore

  • Off-site replication

  • Clear retention policies

Routine restore testing

A backup is only useful if it works when you need it. We perform scheduled restore tests and maintain evidence for your insurance or compliance needs.

Clear retention & recovery policies

We agree these upfront so you know exactly:

  • How far back you can recover

  • How much data you can afford to lose

  • How long a recovery should take

  • Which systems take priority

These are the practical equivalents of Recovery Point Objective (RPO) — how much data you can lose — and Recovery Time Objective (RTO) — how long you can be offline.

Integration with incident response

In the event of a breach or data loss, backup and recovery aren’t isolated steps. They form the foundation of your overall resilience plan.

Clear coverage across your users and core systems - no grey areas or surprise exclusions

Cyber Essentials+ Baseline

How this ties into the Cyber Essentials baseline

Cyber Essentials+ Baseline

How this ties into the Cyber Essentials baseline

Cyber Essentials+ Baseline

How this ties into the Cyber Essentials baseline

1

Cyber Essentials+ (CE+) expects organisations to:

A short, focused call for owner-managers who want to know, at a high level, whether their current setup would pass even a basic Cyber Essentials (CE)–style check.

A simple Red/Amber/Green (RAG? view across identity, devices, patching, malware protection and backup.

A sense of whether any urgent risks exist.

A fit check to confirm whether your business matches our operating model.

2

Backup is not a bolt-on

For SMEs ready for a deeper, CE-aligned assessment.

A structured review mapped to CE-style domains.

Top risks (ranked).

A practical roadmap: what to fix now, next, and later.

A written baseline report you can share with insurers or leadership.

100% of the fee credited against onboarding if you join our all-inclusive service.

3

Recovery plans support your incident posture

If ransomware, corruption or human error occurrs, you already know: * What’s backed up * How to restore it * How long it will take * Who is responsible * What the impact will be

A structured review mapped to CE-style domains.

Top risks (ranked).

A practical roadmap: what to fix now, next, and later.

A written baseline report you can share with insurers or leadership.

100% of the fee credited against onboarding if you join our all-inclusive service.

CTA Text Link

Implementation

How we implement backup & continuity for you

Implementation

How we implement backup & continuity for you

Implementation

How we implement backup & continuity for you

Step 1

Assess your current backup posture

What we evaluate during the Security Triage Call and, if needed, the Security Baseline Review

What's backed up?

How often?

Where does the backup live?

Is the backup (regularly) tested?

Confirm it meets CE-style standards.

Step 2

Deploy the correct backup solutions

Commission our backup tools

We install and configure third-party Microsoft 365 and server (where applicable) backup, ensuring they meet your operational and compliance needs.

Step 3

Define retention & recovery objectives

We agree, in plain English (no jargon), (RPO) and (RTO).

RPO - how much data you are willing to lose in a worst-case scenario.

RTO - how long you can afford to be without a given system.

Step 4

Create a lightweight continuity plan

Not a 40-page binder that nobody reads. A practical plan based on how your SME actually works.

Contact tree.

System priority order.

Step-by-step restore actions.

Communication responsibilities.

Step 5

Routine testing & evidence

Backup failures, missed jobs, or storage issues generate alerts through our monitoring tools so nothing slips through unnoticed.

Insurers.

Larger customers.

Internal governance.

Supplier due dilligence.

Step 6

Ongoing monitoring & altering

Backup failures, missed jobs, or storage issues generate alerts through our monitoring tools so nothing slips through unnoticed.

Backup failures, missed jobs or storage issues generate alerts through our monitoring tools so nothing slips through unnoticed.

CTA Text Link

Why Infinite Cloud IT

Why SMEs choose this model instead of typical MSP backup schemes

Why Infinite Cloud IT

Why SMEs choose this model instead of typical MSP backup schemes

Why Infinite Cloud IT

Why SMEs choose this model instead of typical MSP backup schemes

Typical MSPs:

Infinite Cloud IT:

Sell a low base package.

Treat backup as an optional extra.

Add on security.

Provide partial Microsoft 365 coverage.

Add on backup.

Don't (routinely) test restores.

Add on monitoring.

Offer vague retention policies.

Charge per ticket (or enforce a capped monthly allowance).

Leave recovery steps undocumented.

Leave onboarding to chance.

Provide little support during incidents.

Treat leavers as a last-minute chore.

Support devices they don't manage (e.g. personal devices).

Allow exceptions "just this once".

One all-inclusive package.

Backup included in the core service.

Baseline security by default (not by project).

Full Microsoft 365 and server backup.

No unmanaged devices.

Routine restore testing.

No optional EDR (it's included).

Clear RPO/RTO expectations.

No optional backup (it's also included).

Documented continuity plan.

No nickel-and-diming.

Integration with Cyber Essentials-aligned security.

Automation built-in.

No ambiguity about what's covered.

Standardisation enforced.

Light projects included (heavier pieces of work scoped clearly).

Typical MSPs:

Sell a low base package.

Add on security.

Add on backup.

Add on monitoring.

Charge per ticket (or enforce a capped monthly allowance).

Leave onboarding to chance.

Treat leavers as a last-minute chore.

Support devices they don't manage (e.g. personal devices).

Allow exceptions "just this once".

Infinite Cloud IT:

One all-inclusive package.

Baseline security by default (not by project).

No unmanaged devices.

No optional EDR (it's included).

No optional backup (it's also included).

No nickel-and-diming.

Automation built-in.

Standardisation enforced.

Light projects included (heavier pieces of work scoped clearly).

This is predictable IT for SMEs who want stability, not firefighting.

For SMEs, this is the difference between rapid recovery and business-ending downtime.

Owner Managed SMEs

Take the first step

If you’re a 10–25 seat SME in Sussex or Kent and want your IT to be secure, stable, and predictable, the next step is simple.

The First Step

Take the first step

If you’re a 10–25 seat SME in Sussex or Kent and want your IT to be secure, stable, and predictable, the next step is simple.