Home / Knowledge Base / Backups & Disaster Recovery / Designing a Sensible Backup and Restore Strategy with Your Host: RPO, RTO and Real Recovery Tests in Plain English
  1. Home
  2. »
  3. Knowledge Base
  4. »
  5. Backups & Disaster Recovery
  6. »
  7. Designing a Sensible Backup and…

Designing a Sensible Backup and Restore Strategy with Your Host: RPO, RTO and Real Recovery Tests in Plain English

Table of Contents

Designing a Sensible Backup and Restore Strategy with Your Host: RPO, RTO and Real Recovery Tests in Plain English

Who This Guide Is For (And Why Backups Keep Letting Teams Down)

This guide is for teams who know they should have backups, probably have something in place, but are not entirely confident what would happen in a real incident.

You might be:

  • Running a brochure site that supports offline sales.
  • Managing a busy WooCommerce or other e‑commerce store where orders arrive every few minutes.
  • Operating a membership or content site where users update profiles, upload files or post content.
  • Responsible for client sites at a digital agency, where downtime is reputational as much as financial.

Typical situations where backups suddenly matter

Backups tend to become interesting at exactly the moment you wish you had tested them the week before. Common examples include:

  • A bad plugin or update that takes a WordPress site down or corrupts content.
  • Human error, such as deleting the wrong database, folder or customer record.
  • Automated processes gone wrong, for example an integration that overwrites products or prices.
  • Server failure or a serious data centre problem where the original system is no longer usable.
  • Security incidents such as malware or data tampering that is noticed hours or days later.

In all of these cases, “we have backups” only helps if you can restore the right data fast enough, to the right place, without making the situation worse.

Why “we have backups” often turns out not to be enough

There are a few recurring reasons backup plans fail at the worst possible moment:

  • No clear objectives: nobody has written down how much data loss is acceptable or how long the site can be down.
  • Wrong scope: only parts of the system are backed up, for example files but not databases, or vice versa.
  • Backups only on the same server: if the server fails completely, the backups disappear with it.
  • Untested restores: backups exist, but nobody has practised a full restore end to end.
  • Blurry responsibilities: the host thinks backups are your job, you think they are the host’s job.

This guide focuses less on backup tools and more on backup outcomes: how much data you can afford to lose, how long you can be offline, and how you work with your hosting provider to meet those goals.

For a more conceptual overview of why backups are different from resilience and uptime, see Backups vs Redundancy: What Actually Protects Your Website.

Plain English RPO and RTO: How Much Data You Can Lose, How Long You Can Be Down

Two terms help turn vague “we have backups” into clear expectations:

  • RPO (Recovery Point Objective): how much data loss, measured in time, you can tolerate.
  • RTO (Recovery Time Objective): how long it can reasonably take to get systems working again.
A simple timeline style diagram that shows different examples of RPO and RTO for a brochure site vs a WooCommerce store, helping readers visualise backup points and recovery windows.

What RPO actually means, with simple business examples

RPO asks: “If we had to restore from backup, how far back in time could we go without serious problems?”

  • Brochure site example: Your content changes once a month. If you take nightly backups, the worst case is losing a day of edits. That is usually acceptable. Your RPO might be 24 hours.
  • Busy WooCommerce store: You receive orders every few minutes. If backups run every 4 hours and a restore is needed, all orders placed in the last 4 hours are gone. That is normally not acceptable. You might need an RPO of 5 to 15 minutes.

In practice, RPO drives questions such as:

  • How often should database backups run?
  • Do you need more frequent backups during business hours than overnight?
  • Do some parts of your system need tighter RPO than others (for example orders vs blog posts)?

The tighter your RPO, the more often data needs to be copied somewhere safe, which can increase complexity and cost.

What RTO actually means, with real timelines

RTO asks: “Once we decide to restore, how long can we reasonably be offline?”

  • Low urgency site: A local club website might tolerate 4 to 8 hours of downtime in a serious incident. RTO can be relaxed.
  • Revenue site: An e‑commerce store might suffer noticeably after 30 to 60 minutes of outage. RTO needs to be short.
  • Internal tools: A staff-only system may be able to go down outside core hours, but not during the workday.

RTO affects choices such as:

  • How quickly your host can provision replacement servers if there is a failure.
  • Whether you have pre-configured standby environments.
  • Whether restores can be self-service or always require support tickets.

Neither RPO nor RTO need to be perfect. They just need to be honest and written down so that your hosting choices can support them.

How RPO and RTO interact with hosting choices (shared, VPS, VDS and managed)

Your hosting model has a large impact on what RPO and RTO are realistic.

  • Shared / basic cPanel hosting:
    • Backups are usually daily or weekly.
    • RPO better than 24 hours may require your own additional backup solution.
    • RTO depends on how quickly support can respond and how much you can do yourself.
  • VPS (Virtual Private Server) and Virtual dedicated servers for managed and self managed backup strategies:
    • You have more control over backup schedules and tools.
    • RPO of minutes and RTO of under an hour become realistic with good planning.
    • You are also responsible for more of the setup and monitoring unless you choose a managed service.
  • Managed WordPress / managed hosting:
    • The provider often configures backups, monitors them and assists with restores.
    • Useful when your RPO / RTO are tight but you do not have a full in‑house operations team.

When you speak to your host, use RPO and RTO explicitly. Ask “What RPO and RTO can we realistically achieve on this plan, and what is my part in that?”

Backups vs Redundancy vs Snapshots: Getting Clear on the Building Blocks

It is easy to mix up different concepts that all sound like “safety”. Understanding the building blocks helps you avoid gaps.

An abstract architecture sketch contrasting a live server with redundant components and a separate backup storage target, so readers can see that redundancy and backups are different layers.

What a backup really is, and what it should contain

A backup is a copy of data stored separately from the live system, kept for the purpose of recovery. In hosting, that usually means:

  • Database dumps or snapshots.
  • Website files (code, uploads, media).
  • Configuration files, environment variables and sometimes server configuration.

Good backups are:

  • Complete: all components needed to rebuild the system.
  • Versioned: multiple points in time you can restore to.
  • Isolated: not sitting only on the same disc as the live copy.
  • Retained long enough: so that problems detected late can still be rolled back.

How redundancy keeps things running, but does not replace backups

Redundancy means having multiple components so that if one fails, another takes over. Examples include:

  • RAID on a server disc so a single disc failure does not bring down the server.
  • Multiple application servers behind a load balancer.
  • Dual power feeds and network connections in a data centre.

Redundancy helps with uptime. It does not protect against:

  • Accidental deletion of data.
  • Corruption that is synchronised quickly across copies.
  • Software bugs that apply to all redundant nodes.

For more detail on this distinction, you can read What ‘Redundancy’ Really Means in Hosting.

Snapshots, control panel backups and plugin backups: strengths and traps

There are several common backup mechanisms, each with benefits and traps.

  • Infrastructure snapshots (for example at VPS or virtual dedicated server level):
    • Fast to take and restore entire servers.
    • Good for server-level disasters or major upgrades.
    • Can be storage-heavy, and sometimes all stored in the same infrastructure as the live server.
  • Control panel backups (such as cPanel account backups):
    • Simple and usually integrated into your hosting.
    • Often support self-service restores of files, databases or whole accounts.
    • Schedules and retention are sometimes “one size fits all” and may not meet tight RPO.
  • Application-level or plugin backups (WordPress plugins, for instance):
    • Useful when you lack control over server-level backups.
    • Can send backups to third-party storage (for example S3, Backblaze).
    • May run within the same environment they are protecting, so very large sites can struggle.

In many environments, you combine these methods. For example, daily server snapshots plus more frequent database backups.

Where your host’s responsibilities usually start and stop

Most hosting providers guarantee some level of infrastructure backup, but the detail varies. It is common to see:

  • The host backs up the server or account once per day for disaster recovery purposes.
  • No guarantee that backups are suitable for specific legal or compliance requirements.
  • Restores available on a “best effort” basis unless you have a documented SLA.

Your responsibilities usually include:

  • Deciding what RPO and RTO you need.
  • Checking that the standard backup service meets those needs, or adding your own.
  • Protecting application-level data and configurations the host cannot see.
  • Testing restores and documenting your own processes.

The shared nature of these duties is described in more depth in What ‘Shared Responsibility’ Really Means in Hosting.

Designing a Sensible Backup Policy: How Often, How Many, Stored Where

A backup policy turns abstract ideas into concrete rules: what to back up, how often, for how long and to which locations.

Working backwards from your real risks: brochure site vs busy WooCommerce store

Start with what would actually hurt your organisation.

  • Brochure / informational site:
    • New content is infrequent and often also stored elsewhere (for instance in documents).
    • Main risks are extended downtime or loss of SEO value.
    • Daily backups with a few weeks of retention may be enough.
  • Busy WooCommerce or other transactional site (see also WooCommerce hosting for transactional sites where RPO really matters):
    • Orders, payments, subscriptions and stock levels update constantly.
    • Loss of even an hour of data can mean lost revenue and customer support workload.
    • You may need near-continuous database backups and the ability to restore only the database without losing product changes.

If you work with client sites, treat client expectations as part of your risk. A small business relying heavily on online leads may see a day of missing enquiry forms as very serious.

Choosing sensible backup frequency and retention based on RPO

Once you know your RPO, design around it:

  • RPO 24 hours: Daily backups are fine. Keep at least 14 to 30 days of versions.
  • RPO 4 hours: Schedule database backups at least every 4 hours, files at least daily, preferably with some weekly and monthly points.
  • RPO 15 minutes: Consider continuous or near-continuous database backup, plus hourly or better file backups. This is easier on VPS or Virtual dedicated servers for managed and self managed backup strategies than on generic shared hosting.

Retention is about two questions:

  • How long might a problem go unnoticed?
  • How far back might you need to go for legal or audit reasons?

For security incidents spotted late, having 30, 60 or even 90 days of backups can be valuable. Often you mix short term, high frequency backups with longer term, lower frequency ones.

On‑server, off‑server and off‑site copies: avoiding single points of failure

Copies all in one place are less useful than they appear. A sensible policy usually includes:

  • On‑server backups:
    • Fastest for “I just broke something” moments.
    • Vulnerable to hardware failure and serious security incidents.
  • Off‑server backups within the same data centre or provider:
    • Protect against single-server failure.
    • May still be affected by provider-wide problems.
  • Off‑site backups with a different provider or region:
    • Protect against data centre level incidents and provider outages.
    • Useful for compliance and disaster recovery planning.

In practice, that might mean control panel backups on the server, automated copies to provider storage, and a third copy to your own storage account.

Encryption, access control and compliance (including PCI conscious setups)

Backups contain the same sensitive data as your live system, sometimes more. Treat them accordingly.

  • Encryption:
    • Use encryption at rest, especially for off‑site backups.
    • Store encryption keys separately from the backups.
  • Access control:
    • Limit who can access and restore backups.
    • Use separate credentials for backup storage.
    • Log restore actions where possible.
  • Compliance:
    • If you handle cardholder data, ensure backups are part of your PCI scope.
    • Data retention rules may apply, especially for personal data under privacy regulations.

Providers offering PCI conscious hosting for card payment and compliance sensitive workloads typically have clearer guidance on how backups are handled, where they are stored and how they are secured. You still remain responsible for your own processes and application data.

What a Real Restore Looks Like: Scenarios You Should Be Able to Handle

Designing backups is only half the work. The other half is being able to restore in realistic situations without guesswork.

Quick recoveries: a bad plugin update or broken theme

This is the most common restore scenario for WordPress and similar platforms:

  1. A plugin update or theme change breaks the site layout or causes fatal errors.
  2. You decide it is faster to roll back than to debug in production.
  3. You restore either:
    • Just the affected plugin or theme folder, or
    • The full site files from a recent backup, keeping the latest database.
  4. You verify the site and re‑apply any safe updates.

Your backup and hosting setup should allow a rollback like this in minutes, ideally without needing to contact support.

Data sensitive incidents: deleted orders, user data or content

These scenarios are more delicate:

  • A staff member deletes a batch of orders or customer records by accident.
  • A script or integration overwrites product data or stock levels.
  • User generated content is removed or corrupted in bulk.

Here you often want a partial restore, not a full reset of the entire site. Options include:

  • Restoring the database to a separate staging environment to export just the missing records.
  • Using application-level tools to import or merge data from a backup.
  • Rolling back only a single database table from a backup archive.

This kind of restore benefits from a more capable hosting environment, such as Managed WordPress hosting with server level backups or your own VPS / VDS, where you can operate on multiple database copies safely.

Full server failure or data centre incident: restoring to new infrastructure

In a serious incident, your original server or even the hosting facility may be unavailable. A full restore typically involves:

  1. Provisioning new infrastructure (new VPS, virtual dedicated server or equivalent).
  2. Restoring system configuration, databases and files from off‑server or off‑site backups.
  3. Updating DNS, load balancers or routing to point to the new system.
  4. Validating the restored environment before fully switching over.

Here your RTO is influenced by:

  • How quickly you or your host can spin up new servers.
  • How organised your configuration and deployment practices are.
  • Whether you have practised this type of restore before.

This is where managed services can reduce operational burden, especially for small teams that rarely handle such incidents.

Partial restores vs full rollbacks: not everything needs a full site reset

Full rollbacks are sometimes overkill. They can undo legitimate changes made after the backup point and cause more support work.

Examples of partial restores:

  • Restoring one folder of uploads after accidental deletion.
  • Restoring only theme files, not the database.
  • Restoring selected database tables such as product data but not orders.

Your backup approach should make partial restores practical, either via the control panel or with help from your host. When planning, ask, “How would we restore only X if needed?”

Testing Your Backups: How to Run Real Recovery Drills Without Drama

Backups that have never been restored are an assumption, not a safety net. Testing turns uncertainty into confidence.

A high level flowchart of a recovery test, from starting a restore to verifying the site and signing off, to help non technical readers picture the steps in a drill.

Why untested backups are a common hidden risk

Backup failures often stay invisible until the first real incident because:

  • Systems report “backup completed” even when only part of the data is captured.
  • Configuration changes are made but not included in backup scope.
  • Retention is too short and the needed restore point has already expired.
  • Restores require manual intervention that nobody has documented.

Regular, calm testing reduces the chance of unpleasant surprises when you are already under pressure.

Simple recovery tests you can do on shared or cPanel hosting

Even on straightforward shared hosting, you can run useful tests:

  1. Clone to a subdomain: Use your control panel to restore a backup to test.yoursite.com.
  2. Check completeness: Confirm pages, media and logins work as expected.
  3. Time the process: Note how long the restore takes from start to finish.
  4. Try a file-only restore: For example, restore only the home directory and check the site still works.

The aim is not to simulate every disaster, but to prove that the backups exist, are usable and that you understand the steps.

More advanced tests on VPS and virtual dedicated servers

With control over the server, you can go further:

  • Spin up a temporary server: Restore from off‑site backups to a new VPS or virtual dedicated server and point a temporary hostname at it.
  • Simulate a database-only restore: Restore an older copy of the database into a test environment and confirm your application handles it correctly.
  • Test automation: Script parts of the restore, such as pulling backups and restoring databases, to reduce manual errors.

These tests are especially useful if your RTO is tight or your setup is complex.

Documenting what you learn: turning tests into a repeatable runbook

The most valuable output from tests is not just confidence that things work, but a runbook that captures:

  • Where backups live and how to access them.
  • Step‑by‑step restore procedures for common scenarios.
  • Rough timings and any dependencies on third parties.
  • Who is allowed to authorise and perform restores.

Keep this documentation where your team can find it during an incident, and update it after each test or real‑world restore.

Working With Your Host: Questions to Ask and What to Agree in Writing

A strong relationship with your host can simplify backup and restore enormously. Clear questions and written expectations reduce confusion later.

Key questions about backup scope, frequency and storage location

Useful questions to ask any provider:

  • Scope: Exactly what is backed up? Entire servers, just account data, or only certain directories?
  • Frequency: How often are backups taken, and is this configurable?
  • Retention: How far back can you go? Days, weeks, months?
  • Location: Are backups stored on the same server, same data centre, or in another region?
  • Access: Can you access backups directly or only via support?

Ask for these details in writing, preferably in documentation or service descriptions that sit alongside your contract.

Understanding limits: self service restores, support‑assisted restores and SLAs

Clarify the operational side:

  • Which restores can you perform yourself through a control panel?
  • When do you need to open a ticket and how are such tickets prioritised?
  • Are there any charges for restores beyond a certain number per month?
  • Do you have a written SLA that covers response times for backup-related incidents?

An SLA is not a guarantee that incidents will never be painful, but it makes expectations transparent.

Managed vs unmanaged: who actually presses restore in an emergency

In unmanaged setups, your team is normally responsible for:

  • Requesting or initiating restores.
  • Deciding which restore point to use.
  • Testing and validating the restored system.

In managed hosting, the provider may:

  • Advise which restore point to choose based on logs and monitoring.
  • Perform the restore and initial checks.
  • Help with more complex scenarios, such as partial database restores.

Managed services tend to be valuable where the cost of mistakes is high and your in‑house operational capacity is limited. They are not mandatory, but they do shift some of the burden away from your team.

How backups plug into broader resilience, uptime and disaster recovery plans

Backups are one part of a broader resilience picture that can also include:

  • High availability setups for reduced downtime.
  • Content delivery networks and caching for performance and load handling.
  • Disaster recovery plans for large‑scale incidents.

As your organisation grows, it is worth connecting backup conversations with uptime and business continuity discussions. The article From Backups to Business Continuity: Building a Realistic Disaster Recovery Plan with Your Hosting Provider covers this step in more depth.

A Practical Backup and Restore Checklist You Can Use With Any Provider

The following lists can be adapted to most hosting platforms.

Monthly and quarterly tasks for small teams

  • Review backup success logs or reports from your host or plugins.
  • Verify that new sites, subdomains or databases are included in backup scope.
  • Perform at least one test restore to a non‑production location.
  • Check retention settings still match your needs.
  • Update contact details and runbook if team members have changed.

Once a quarter, consider a slightly deeper exercise:

  • Simulate a full server failure by restoring to a fresh environment.
  • Review RPO and RTO against any changes in the business.
  • Confirm backup locations and encryption settings.

Extra steps for e‑commerce, membership and higher risk sites

If your site holds transactional or sensitive data:

  • Check that order, subscription and membership tables are all included in backups.
  • Run test restores focused on data integrity, not just site appearance.
  • Validate that email confirmations, payment gateways and stock levels behave correctly after restores.
  • Ensure backup and restore processes are considered in PCI or other compliance assessments.

For WordPress and WooCommerce users, What Every WordPress Owner Should Know About Backups and Restores offers platform‑specific guidance.

When to revisit your strategy as you grow or change hosting model

Revisit your backup and restore strategy when:

  • You move from shared hosting to VPS or virtual dedicated servers.
  • You add significant new functionality, such as subscriptions or user-generated content.
  • Traffic or revenue from the site grows substantially.
  • Regulatory requirements change or you expand into new regions.

As complexity grows, you may find that more managed services, or clearer SLAs with your host, become cost effective compared to handling everything yourself.

Where to Go Next: From Backups to Full Disaster Recovery and Business Continuity

Once your backup and restore basics are sound, it makes sense to connect them to wider risk management.

Connecting your backup plan to a wider hosting risk register

A simple risk register lists potential issues, their impact and likelihood, and your mitigations. For hosting, include items such as:

  • Single data centre dependency.
  • Key person risk for backup knowledge.
  • Third‑party integrations that can damage data.
  • Compliance gaps related to stored backups.

Link each risk to specific backup policies, restore procedures and tests so you can show how they are managed.

When you might need multi‑server or enterprise WordPress hosting

There comes a point where uptime requirements, traffic levels or compliance needs make multi‑server or more advanced architectures sensible. Signs you are approaching this include:

  • RTO targets of minutes rather than hours.
  • Revenue that justifies investment in high availability setups.
  • Regulatory scrutiny of hosting and disaster recovery processes.

In these cases, backups are part of a larger design that may also include clustering, automated failover and continuous replication. Managed enterprise hosting can reduce the operational load, but you still need a clear view of your own objectives and responsibilities.

Further reading and next conversations to have with your host

Helpful next steps:

  • Discuss your RPO and RTO with your current host and confirm what their platform can support in practice.
  • Review your current backup locations, retention and restore procedures against the ideas in this guide.
  • Explore related topics such as High Availability Explained for Small and Mid Sized Businesses to see where backups fit into broader resilience planning.

If you would like a practical conversation about your own sites, you are welcome to talk to G7Cloud about choosing the right hosting architecture or exploring managed hosting or virtual dedicated servers that match your risk appetite and operational capacity.

Table of Contents

G7 Acceleration Network

The G7 Acceleration Network boosts your website’s speed, security, and performance. With advanced full page caching, dynamic image optimization, and built-in PCI compliance, your site will load faster, handle more traffic, and stay secure. 

WordPress Hosting

Trusted by some of the worlds largest WooCommerce and WordPress sites, there’s a reason thousands of businesses are switching to G7

Related Articles