Recovery strategies should be developed for Information technology (IT) systems, applications and data. This includes networks, servers, desktops, laptops, wireless devices, data and connectivity. Priorities for IT recovery should be consistent with the priorities for recovery of business functions and processes that were developed during the. IT
required to support time-sensitive business functions and processes should also be identified. The recovery time for an IT resource should match the for the business function or process that depends on the IT resource. Information technology systems require hardware, software, data and connectivity. Without one component of the Бsystem,Б the system may not run. Therefore, recovery strategies should be developed to anticipate the loss of one or more of the following system components: Computer room environment (secure computer room with climate control, conditioned and backup power supply, etc. ) Hardware (networks, servers, desktop and laptop computers, wireless devices and peripherals) Connectivity to a service provider (fiber, cable, wireless, etc. ) Software applications (electronic data interchange, electronic mail, enterprise resource management, office productivity, etc. ) Some business applications cannot tolerate any downtime. They utilize dual data centers capable of handling all data processing needs, which run in parallel with data mirrored or synchronized between the two centers. This is a very expensive solution that only larger companies can afford. However, there are other solutions available for small to medium sized businesses with critical business applications and data to protect. Internal Recovery Strategies Many businesses have access to more than one facility.
Hardware at an alternate facility can be configured to run similar hardware and software applications when needed. Assuming data is backed up off-site or data is mirrored between the two sites, data can be restored at the alternate site and processing can continue. Vendor Supported Recovery Strategies There are vendors that can provide Бhot sitesБ for IT disaster recovery. These sites are fully configured data centers with commonly used hardware and software products. Subscribers may provide unique equipment or software either at the time of disaster or store it at the hot site ready for use. Data streams, data security services and applications can be hosted and managed by vendors. This information can be accessed at the primary business site or any alternate site using a web browser. If an outage is detected at the client site by the vendor, the vendor automatically holds data until the clientБs system is restored. These vendors can also provide data filtering and detection of malware threats, which enhance cyber security. Developing an IT Disaster Recovery Plan Businesses should develop an IT disaster recovery plan. It begins by compiling an inventory of hardware (e. g. servers, desktops, laptops and wireless devices), software applications and data. The plan should include a strategy to ensure that all critical information is backed up. Identify critical software applications and data and the hardware required to run them. Using standardized hardware will help to replicate and reimage new hardware. Ensure that copies of program software are available to enable re-installation on replacement equipment. Prioritize hardware and software restoration.
Document the IT disaster recovery plan as part of the. Test the plan periodically to make sure that it works. Data loss and the disasters that precede them can be both costly and hampering. Even small data losses affecting 100 or fewer files can cost between $18,000 and $36,000, according to a. These are costs that most businesses cannot afford to suffer, and their likelihood is rising. At an enterprise level, the total volume of data loss increased over 400 percent in 2 years, according to a. Costs represent just one of the reasons all businesses need a backup and disaster recovery plan, but there are other reasons to consider implementing this critical action: Anywhere there is data, there are threats to that data. Data is a valuable component of running a business, and it is open to a number of threats that can lead to data leaks and data loss. These include physical device damage, human threats, technical threats and natural disasters. Youвve likely done your due diligence to protect against many of these, but any vulnerability could put your data in jeopardy, making it vital that you have a plan to help you navigate around any disasters or data losses that occur. Even the strongest and most considered security measures can fail, letting in viruses that can do your business harm. are known to withhold a victimвs data in exchange for a ransom payment. However, handing ransom over to cybercriminals may not restore your data, and is discouraged as a means of supporting future attacks. Instead, with the proper backup and disaster recovery plan, you can secure you data in the cloud where you can retrieve uninfected versions of the data that was taken, and restore it to a new device, or your old, cleaned one.
If you rely on the data within your organization to run your business, then your productivity will suffer if that data is lost. The longer your data goes without being recovered, the longer your employees will be unable to perform. When this happens long enough, profits can suffer as a result. Directionless, last minute attempts to recover lost data quickly can become expensive. However, by planning and preparing ahead for the eventuality of data loss, you can act quickly without sacrificing a substantial budget to the recovery process, and with fewer productivity related losses. With a plan in hand, you can limit the length of time your business is affected by data loss, or other disaster, and therefore can limit the scope of the damage. Without a data backup and disaster recovery plan, you may be unable to retrieve the data that was lost. Your ability to retrieve data greatly relies on the actions youвve taken to fortify that data for retrieval. This includes not only creating data backups on physical storage devices, where they are still vulnerable to any number of the threats listed above, but also with a cloud backup service so that they may be retrieved quickly and efficiently, no matter how they were lost or altered to begin with. Businesses can protect themselves from these damages and restore their data quickly after any data loss event by having the right plan in place. For more information on what to include in your disaster recovery plan, read. And, to begin fortifying your data today, sign up for so that your data will remain retrievable and restorable, no matter how data loss occurred.