Fervent Freyja said:
Last year I fully transitioned to using external storage towers with automatic cloud backup. I have one for family photos and another for passions, it's so messy.
It also depends on how personal the data is to you and if you are willing to take risks of it leaking. There are some things I would not put on a cloud. I am losing trust in the ability to retain privacy in this age.
I have recently learned from my lawyer that it would have been best for me to have retained a second copy of a large amount of private data on external storage that I no longer have access to.
Had I had a copy of this data, I would at least be able to use software to routinely scan the web for leaked copies of my personal data and then take immediate action when there was a hit. So, there is more than one good reason to always have at least two copies of your data.
Please understand that in order to "scan the web" for something that may have been leaked, you have to present a copy of at least some part of the something to the search agent, and that in itself carries a risk, if not a certainty, of leakage.
You can't download everything on the web, and then locally compare each thing with the something sought, so you can both keep the something secret, and also search everywhere for it, without any third party being able to find out who's searching for what.
That means you have to isolate a non-sensitive part of the something sought, that is adequate to identify candidate objects, without being sufficient, e.g., to prove that you have the whole object, or worse, to render the whole object constructible.
For example, if you own the secret part of the formula for Coca-Cola, and you want to learn whether it's been leaked, you can't pass it to a search engine and still keep the secret safe. You could seek out the non-secret parts of it in certain contexts and then check whether objects that contain those parts also contain other parts that appear to have a formulaic nature, without necessarily giving it all away, but each datum you present is another piece of the puzzle, and machines these days are very good at piecing such puzzles together.
The best way to preserve sensitive information, and its secrecy, is to keep redundant copies on independent media in an environment you control.