{"id":24,"date":"2007-10-01T10:07:52","date_gmt":"2007-10-01T08:07:52","guid":{"rendered":"http:\/\/blog.intego.com\/2007\/10\/01\/dont-be-like-francis-ford-coppola\/"},"modified":"2007-10-01T10:07:52","modified_gmt":"2007-10-01T08:07:52","slug":"dont-be-like-francis-ford-coppola","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/dont-be-like-francis-ford-coppola\/","title":{"rendered":"Don&#8217;t Be Like Francis Ford Coppola"},"content":{"rendered":"<p>Anyone involved in computer security knows that the first rule of security is to back up your data. Many people will then go on to say that the second rule is to back up your data, and the third rule is to back up your data as well. In some cases, you can never have too many backups. <\/p>\n<p>Film director Francis Ford Coppola <a href=\"http:\/\/news.bbc.co.uk\/2\/hi\/entertainment\/7019644.stm\">recently had a theft in his home<\/a>, and lost his computers, his backup drives, and all their contents. He lost the script of a film he&#8217;s working on, but, worst of all, he lost 15 years of family pictures. He has sent out a plea to get them back, but there&#8217;s a good chance those photos will be lost for good.<\/p>\n<p>What would you do if you lost all your baby pictures, all those pictures from your wedding or your kids&#8217; graduation, or all your vacation pics? You&#8217;d be mighty upset, with no way to replace them. Unless, of course, you had backups. <\/p>\n<p>Now that photos are mainly digital, theft or a few rogue electrons can wipe out your entire photo library, and it&#8217;s essential that you have multiple backups. Backing up to a hard disk is the best way, but for essential files, you should also back up to DVDs, or even to an off-site server, such as an FTP server or an iDisk. <a href=\"https:\/\/www.intego.com\/personalbackup\/\">Intego Personal Backup<\/a> lets you do all these kinds of backups, and much more. You can be sure that your data is protected, and, if theft or lightning come your way, you can still have copies of your most important files. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Anyone involved in computer security knows that the first rule of security is to back up your data. Many people will then go on to say that the second rule is to back up your data, and the third rule is to back up your data as well. In some cases, you can never have [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Anyone involved in computer security knows that the first rule of security is to back up your data. Many people will then go on to say that the second\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/dont-be-like-francis-ford-coppola\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Don&#039;t Be Like Francis Ford Coppola - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Anyone involved in computer security knows that the first rule of security is to back up your data. Many people will then go on to say that the second\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/dont-be-like-francis-ford-coppola\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2007-10-01T08:07:52+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-be-like-francis-ford-coppola\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-be-like-francis-ford-coppola\/\",\"name\":\"Don't Be Like Francis Ford Coppola - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2007-10-01T08:07:52+00:00\",\"dateModified\":\"2007-10-01T08:07:52+00:00\",\"description\":\"Anyone involved in computer security knows that the first rule of security is to back up your data. Many people will then go on to say that the second\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-be-like-francis-ford-coppola\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/dont-be-like-francis-ford-coppola\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-be-like-francis-ford-coppola\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Don&#8217;t Be Like Francis Ford Coppola\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-be-like-francis-ford-coppola\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-be-like-francis-ford-coppola\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Don&#8217;t Be Like Francis Ford Coppola\",\"datePublished\":\"2007-10-01T08:07:52+00:00\",\"dateModified\":\"2007-10-01T08:07:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/dont-be-like-francis-ford-coppola\/#webpage\"},\"wordCount\":274,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Anyone involved in computer security knows that the first rule of security is to back up your data. Many people will then go on to say that the second","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/dont-be-like-francis-ford-coppola\/","og_locale":"en_US","og_type":"article","og_title":"Don't Be Like Francis Ford Coppola - The Mac Security Blog","og_description":"Anyone involved in computer security knows that the first rule of security is to back up your data. Many people will then go on to say that the second","og_url":"https:\/\/www.intego.com\/mac-security-blog\/dont-be-like-francis-ford-coppola\/","og_site_name":"The Mac Security Blog","article_published_time":"2007-10-01T08:07:52+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-be-like-francis-ford-coppola\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/dont-be-like-francis-ford-coppola\/","name":"Don't Be Like Francis Ford Coppola - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2007-10-01T08:07:52+00:00","dateModified":"2007-10-01T08:07:52+00:00","description":"Anyone involved in computer security knows that the first rule of security is to back up your data. Many people will then go on to say that the second","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-be-like-francis-ford-coppola\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/dont-be-like-francis-ford-coppola\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-be-like-francis-ford-coppola\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Don&#8217;t Be Like Francis Ford Coppola"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-be-like-francis-ford-coppola\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-be-like-francis-ford-coppola\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Don&#8217;t Be Like Francis Ford Coppola","datePublished":"2007-10-01T08:07:52+00:00","dateModified":"2007-10-01T08:07:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/dont-be-like-francis-ford-coppola\/#webpage"},"wordCount":274,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-o","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/24"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=24"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/24\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=24"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=24"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=24"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}