Do you trust your business continuity plan?
Pexels

Do you trust your business continuity plan?

All businesses--regardless of size--have a digital presence. This mandates that both mundane and mission critical data must be regularly backed up and ready for recovery at the drop of a hat. Whether it is manged in-house or outsourced business owners and financial managers don't always know what data is backed up, how often it's backed up, where it is stored or how long it will take to recover when disaster strikes.

Here are some questions around data backup and recovery that should be asked to whoever is responsible for this function:

  • Is the company data safely stored and readily available?
  • Is it easy to recover? If stored in the Cloud, how will you recover if the Internet is down?
  • Is sensitive data encrypted? If you handle important customer data or intellectual property, it should be encrypted. Laptops and all mobile devices that store and transmit company data should also be encrypted. The bottom line? Encrypt all sensitive data when it is backed up.
  • Should backups be stored both onsite and offsite? Onsite data is much easier to recover rapidly which reduces the time needed to recover from problems such as hardware failures. Offsite data, on the other hand, is essential in the event of a fire or flood.
  • Can you afford lost productivity and revenue if your data is destroyed? If yours is like most businesses the answer is “no”. That’s why a workable disaster recovery plan that has been well thought out and practiced is so essential.

The key take away for business managers is that backing up your data and storing it either onsite or in the Cloud is only part of the solution if your business suffers catastrophic damage.

It is critical to understand that backing up your data, even daily, is not the same thing as a disaster recovery plan.

Data backups are far from perfect. Company data can still be lost through corrupted files, power outages and accidental deletions. Sometimes data can be re-entered but information captured on the fly as transactions occur is gone unless your servers that or back up new information as it is entered. Are these used at your business?

Corrupted files can often be recovered within the same program that the user is working in, such as Word or Excel, but other applications don’t offer this option. Do you know the capabilities of your software applications?

Disaster Recovery Plans

Should your company's data be catastrophically breached or be irrecoverable by ordinary means, a disaster recovery plan will provide a guide to the restoration process. When implementing a new plan or reviewing the one you have keep these points in mind:

  • Document at what point the recovery kicks in and who makes the determination
  • Include alternate locations that key recovery personnel can work from in order to recover company data
  • Regularly review and update contact information for key recovery personnel
  • Document the order of events required to fully recover operations

This plan will be your “cookbook” to follow when total chaos occurs. If contact information is incorrect or steps are missing in the process the recovery time will increase. That’s why it is imperative to review, test and change the plan as the company evolves.

Business Continuity

Business continuity goes beyond a defined process or plan, and when full continuity is achieved, a company is prepared to not only recover from a disaster but also limit the adverse effects of the event. Implementing business continuity practices ensures that the appropriate people have access to critical functions. This is why business continuity cannot be achieved simply through one solution or technology.

Companies must plan their business continuity strategy on two fronts: planning for how to continue business processes in the event of disaster and choosing the appropriate business continuity solution to support these processes. If a company lacks the correct solution(s) in place, access to data vital to their functions could be unavailable for hours, days or even weeks depending on the level of damage and/or the amount of data that needs to be recovered. Frustrated employees, lost clients, revenue deficits or business closure are all possible in an extended recovery scenario.

When assessing disaster preparedness every aspect of the planning process must be viewed from both a technological and human standpoint.

Security

Cybercriminals armed with ransomware are a formidable adversary. While small-to-mid-sized businesses aren’t specifically targeted in ransomware campaigns, they may be more likely to suffer an attack. An IT staff that is stretched thin and outdated technology is the perfect environment for a breach to occur. Security software is essential, however, a proper ransomware protection strategy also requires a strong backup and recovery process.

If your business suffers a ransomware attack, properly managed backup technology allows a roll-back of data to a point-in-time before the corruption occurred. When it comes to ransomware, the benefit of this is two-fold. First, there is no need to pay the ransom to get the data back. Second, restoration is to a point-in-time before the ransomware infected your systems, the system will be clean and the malware can’t be triggered again.

Regardless of the cause, once this disaster is over and recovery is complete, now is the time to determine the cause of the outage. Remedying the “root cause” will harden the business against future failures.

About NPI Technology Management

Our Canopy? Backup and Recovery service is a powerful addition to a business continuity plan. Verified daily and tested regularly, this service quickly restores data and applications.  

Ehtisham Syed

Architect STRATRISK Solutions

7 年

"Planning Is Everything. The Plan Is Nothing"

回复
Horst Simon The Original Risk Culture Builder

Transformational Nonconformist-It is time to Think Differently about Risk. "It didn’t take guts to follow the crowd, that courage and intelligence lay in being willing to be different" Jackie Robinson

7 年

It is not enough to have a plan, not even a "tested" plan, disasters do not follow plans.... It is about how well your staff is trained to respond to a situation of risk

Mark Gembick?

Technology Executive | GTM Strategist | Government Liaison | Dual-Use Investor

7 年

Couldn't agree more. Our analysis of 7,000 companies via Resilient Scores clearly shows over 85% of the plans are inadequate.

John Burton

Director of Research for the Vermont Futures Project

7 年

Any business hit by a fire or flood knows that just backing up is not a business continuity plan. What is your plan?

回复

要查看或添加评论,请登录

John Burton的更多文章

  • Ever wonder what a CIO does?

    Ever wonder what a CIO does?

    1 条评论
  • Think your business is too small for cyber insurance?

    Think your business is too small for cyber insurance?

    The general perception is that only large businesses have vulnerabilities to cyber breaches. In truth, small businesses…

    2 条评论
  • Preventing Business Banking Fraud Part II

    Preventing Business Banking Fraud Part II

    Any private data your business possesses, company and personal, can be predisposed to fraud. Is your organization…

  • 2 Looming Cybersecurity Deadlines for Government Subcontractors

    2 Looming Cybersecurity Deadlines for Government Subcontractors

    12/31/17 – The latest date that contractors and subcontractors can continue to maintain and receive new defense related…

    1 条评论
  • Deadline fast approaching for DOD manufacturers

    Deadline fast approaching for DOD manufacturers

    As you may know, many manufacturers with DOD contracts must be compliant with new cyber security requirements…

    1 条评论
  • Facing an IT Audit? Don’t Panic.

    Facing an IT Audit? Don’t Panic.

    IT audits are one of many tools to help manage risk and identify areas of your business that are not only open to…

    2 条评论
  • Hard to Cry for the WannaCry Victims

    Hard to Cry for the WannaCry Victims

    The WannaCry ransomware attack ended up causing tens of millions of dollars of damage when it encrypted important data…

    4 条评论
  • Discovering value at business trade shows

    Discovering value at business trade shows

    This post was written by our Marketing Coordinator Dawn McGinnis who is a veteran trade show exhibitor. If you try…

    3 条评论
  • Arrest bogus wire fraud

    Arrest bogus wire fraud

    Business owners are seeing a huge increase in attempted wire fraud. The FBI reports that this problem has cost…

    5 条评论
  • Taming the security monster in your printer

    Taming the security monster in your printer

    When the subject of security comes up, most businesses focus on their everyday devices such as PCs, laptops, tablets…

    2 条评论

社区洞察

其他会员也浏览了