9 Crucial Steps Toward Effective Disaster Recovery

...

Remember "five 9's" and the effort to reduce the amount of downtime your customers had to endure?

A strong disaster recovery plan is key to keeping your business going in the face of a very bad, no good, horrible day. Here are nine steps IT pros should not skip in their planning and preparation for the worst.

Everyone knows that, when it comes to computers, the question is not whether bad things will happen to good companies, but what those good companies do when bad things happen. If the company is very good, indeed, then it relies upon its IT disaster recovery plan to pull it through to the other side.

Disaster recovery plans are insurance against very bad things, and like all forms of insurance they fall into the category of things that you pay for but hope against hope you never have to use. Since you hope you never have to use the disaster plan, some executives take them lightly, figuring that they've hired smart people who can think on their feet, perform heroic acts of improvisation, and make sure that the bits keep rolling along no matter how things get.

When a true disaster hits, executives like these are called "unemployed."

[See 9 Ways IT Can Ruin Its Relationship With the Business.]

I have spent a lot of time in various types of disaster response and business recovery activities. I live in a hurricane-prone state. I've been on governor-appointed emergency response committees.

I've worked in emergency communications during natural disasters, and I've talked to more than my share of people who have planned for or been the victim of business disasters. In all of these situations, a handful of things have come to light as key ingredients that make it much more likely that your business IT will come through the problems intact.

When you get right down to it, most of the following tips fall into one of two broad categories: The first is, "Know what you're going to do before you have to do it." The second is, "Don't keep your plan a secret."

Read on to get the details on these points and more.

Categories
APPLICATIONS
0 Comment

Leave a Reply

Captcha image


RELATED BY

  • 5300c769af79e

    Maintaining Team Focus In The Digital Maelstrom

    For team leaders though, the challenge is to focus on productivity and find ways to be deliberate about harnessing and leveraging technology to make it work for the team, rather than letting it hinder the team's progress.If you've identified that your team's productivity is suffering, now is the time to take action.
  • 5300c769af79e

    HPE, HP Sued for Elbowing Out Older Employees

    Hewlett Packard Enterprise and HP are facing a potential class action lawsuit brought earlier this month by four former employees.The companies engaged in widespread age discrimination during a restructuring of the legacy computer and printer manufacturer, according to their complaint, filed in U.
  • 5300c769af79e

    Enterprise Mobile: The New Threat Vector

    Download Appthority's White Paper, Enterprise Mobile: The New Threat Vector delves into how employees' mobile devices are undermining your enterprise security efforts.Because risky apps on mobile devices leak private data that can be leveraged for spear-phishing or watering hole attacks, and risky apps also send sensitive corporate data to cloud storage or remote servers in locations such as China and Eastern Europe, it may be that CISOs are missing a critical opportunity to secure their enterprises by not making mobile device security a top priority for breach prevention.
  • 5300c769af79e

    Evernote CEO Responds to Privacy Concerns Over New Policy (Updated)

    In enforcing these laws, Evernote employees do not view the content of user notes except in very limited cases.Select Evernote employees may see random content to ensure the features are working properly but they won’t know who it belongs to.