• Follow us

Internet

Nine steps to building a business-oriented disaster recovery plan

Although IT disasters are unpredictable, data recovery shouldn’t be. In fact, recovery should be planned, predictable and controlled. The following steps will help you organise your thoughts, ask the right questions and develop a strategy for your DR plan that is closely aligned with your business.

 1. Conduct an asset inventory 

Disaster recovery planning should always start with an inventory of all your IT assets. This step is necessary to untangle the complexity of your environment. Start by listing all the assets under IT management, including all servers, storage devices, applications, data, network switches, access points and network appliances. Then map where each asset is physically located, which network it is on, and identify any dependencies.

 2. Perform a risk assessment 

Once you have mapped out all your IT assets, networks and their dependencies, list the potential internal and external threats to each of those assets. Imagine the worst-case scenario — and be thorough. Threats could include natural disasters or mundane IT failures.

Next, include the probability of each happening and the impact it could have. How would it affect the business if each scenario were to occur? Enlist the help of your business colleagues for this exercise — but be sure to emphasise that mundane events happen much more frequently than natural disasters. Move the conversation away from earthquakes and hurricanes and toward higher probability events such as power outages or IT hardware failures.

 3.Define criticality of applications and data 

Before you begin to build out your business-oriented DR plan, you’ll need to classify your data and applications according to how critical they are to the business. Start by speaking to your business colleagues and support staff.

Look for commonalities and group them according to how important each is to the business, frequency of change and retention policy. You do not want to apply a different DR technique to every application or dataset you have. Grouping assets with similar characteristics will allow you to implement a less complex strategy.

Classifying data in a vacuum based on assumptions could come back to haunt you. Be sure to involve other business managers and support staff in this exercise. You will undoubtedly have to make some trade-offs to limit the number of data classes you have. For medium-sized businesses, the number of classes should likely be between three and five.

 4. Define recovery objectives 

Different classes of assets and data will have different recovery objectives. For instance, a critical e-commerce database may have very aggressive recovery objectives because the business simply can’t afford to lose any transactions or be down for long. On the other hand, a legacy internal system may have less stringent recovery objectives because the data involved doesn’t change very often and it’s less critical to get back online.

Many IT pros fall short when it comes to this step. Setting recovery objectives without consulting the business line managers is the No. 1 cause for misalignment. It’s imperative that you involve them in this process. The key here is to ask specific questions of key stakeholders, to understand business needs and provide a differentiated level of service availability based on business priority. Once you have that information in hand, it needs to be translated into recovery objectives to be included in your DR plan.

Recovery Time Objective (RTO) refers to the acceptable time any of your data and production systems can be unavailable. To calculate the RTO for an application, consider how much revenue your organisation would lose if the application went down for a given length of time. For example, how much would you lose if your customer portal went down for an hour or a day? How much cost would be incurred if none of your employees can work because email is down?

Calculating your RTO is necessary to determine the features you need in your backup systems and products. For example, if you have a very high RTO (say, more than four hours), you will probably have time to back up from tape, but if you have a very low RTO (such as just a few minutes), you need to use host-based replication or disk-based backup with continuous data protection features.

What is the acceptable amount of data your organisation can afford to lose? That is your Recovery Point Objective (RPO). If your organisation has a high tolerance for data loss, your RPO can be high, from hours to days. If your business can’t afford to lose any data, or very little, your RPO will be seconds. The RPO you set will determine the minimum frequency for backing up your data. If you can only afford to lose an hour’s worth of data, you should back up the data at least every hour. That way, if an outage begins, for example, at 2:30 p.m., you can retrieve the 2 p.m. backup and meet the RPO requirement.

The good news is that numerous disaster recovery solutions are on the market today. Just make sure that what you choose offers the appropriate level of protection. Over-protection can cost the company needless money and introduce unnecessary complexity. Under-protection is obviously bad because it puts important business functions at risk.

For instance, nightly backups using traditional (file-based) methods are more than sufficient for low-impact data, but this method would be inappropriate for high-impact data and applications. A continuous data protection (CDP) solution is great for high-impact data and systems, but it can add overhead to production servers and storage costs.

Perhaps the most critical component of your DR plan is offsite protection — use it regardless of the type of backup method you choose. Offsite protection (be it a tape vaulting service or replication to the cloud) should be commensurate to your recovery objectives. Make sure your data is sent to a location that is far enough away that it is not in the same geographic risk zone. Typically, this is at least 25 miles away from the primary location.

Finally, automate and streamline the recovery process as much as you can. In the event of a disaster, key IT staff may be unavailable. Automation also lessens the risk of human error.

 6. Get stakeholder buy-in 

Go beyond the walls of the datacentre and involve key stakeholders for all your business units. They need to be involved in the planning phase, and they should agree with you on the company’s priorities as well as the service-level agreements (SLAs) your team will provide.

Also, consult your strategic partners and vendors to make sure you’re getting the most out of your DR solution or services. Once you have consulted all of the key stakeholders, enlist an executive-level sponsor who will get behind you and the project. The importance of collaboration, consensus and executive support to your DR plan’s success cannot be emphasised enough.

 7. Document and communicate your plan 

In a disaster scenario, you need a documented strategy for how to get back to a working state. This document should be written for the people who will use it.

Importantly however, this documented plan must be communicated. All too often, only one person in the organisation really knows the whole picture, leaving the organisation vulnerable if that one person is unavailable during a disaster. In addition, be sure to store your recovery strategy where it can be accessed during a disaster — not on a public share in your Exchange folders. Ideally, it should be printed and posted in multiple locations.

 8. Test and practice your DR plan 

People often say, “Practice makes perfect.” A better saying might be, “Practice makes progress.” No organisation ever gets to perfection with its DR plan, but practice will help you find and rectify problems in your plan, as well as enable you to execute it faster and more accurately. Make sure that everyone who has a role to play attends the practice sessions, although you do not need to practice executing the full disaster recovery plan every time. It’s perfectly acceptable to carve out pieces of your plan to test.

 9. Evaluate and update your plan 

A DR plan should be a living document. It’s especially important to regularly review your plan given the shifting sands of an ever-changing business environment. Tolerance for downtime and data loss may decline, and key personnel may go on leave or terminate their employment. IT might migrate to new hardware or operating systems or the company might acquire another company. As your organisation is dynamic and ever changing, your plan needs to reflect the current state of the organisation, whatever that may be.

Adrian Moir, senior consultant, product management, QuestImage Credit: alphaspirit / Shutterstock

Read More



Leave A Comment

More News

Latest ITProPortal news

What is Big Data? Everything you need to 2019-02-07 10:32:16Big Data: What’s New  05/02 - FEATURE - New year’s resolutions for business looking to leverage big data in 2019 - We’ve spoken

Huawei defends actions, calls for time in UK 2019-02-07 08:00:54The company says it has never had a serious incident in almost two decades of international business.

Apple regains spot as top US tech company 2019-02-07 07:30:59iPhone maker retakes top spot from Microsoft.

Raspberry Pi opens first high-street store 2019-02-07 07:00:17Store aims to attract “customers who were curious about the brand”.

Google blocks 100m Gmail spam emails with TensorFlow 2019-02-07 06:30:19Finding extra 100m spam emails is quite a feat, Google says.

Microsoft joins OpenChain platform 2019-02-07 06:00:42Open sourced solutions are great for businesses, but many fear possible issues with governance.

Human voice: the next generation of data 2019-02-07 06:00:33Voice data is much harder to secure, deliver and analyse than ‘traditional data’.

2019 – The year of automation 2019-02-07 05:30:41The ongoing data generation, gathering and analysis is the fuel behind digital transformation, but if data is the fuel, and digital transformation is

Treading a digital path in 2019 2019-02-07 05:00:16Here are five key trends that Cognizant expects to emerge in the year ahead, as technologies continue to mature and become mainstream.

How to build an agile data pipeline 2019-02-07 05:00:05Agility and data are two of the most overused buzzwords of the business community – and for good reason.

Top 10 personal technologies to support digital business 2019-02-07 04:30:41Here are the 10 most effective technologies that technology leaders should begin to incorporate into their roadmaps and strategies.

Nine steps to building a business-oriented disaster recovery 2019-02-07 04:00:15The following steps will help you organise your thoughts, ask the right questions and develop a strategy for your DR plan that is closely aligned with

TechRadar: Internet news

The cheapest Xbox One bundle deals and sale 2019-02-08 13:03:00We've listed the UK's hottest Xbox One deals, including the best value bundles with games.

Google makes Chrome bug detection tool open-source 2019-02-08 12:56:25Google has made its fuzzing tool ClusterFuzz open-source so that developers can easily find bugs in their software.

Valentine's Day 2019: the best online flower delivery 2019-02-08 12:38:47The best online flower delivery services for Valentine's Day from Amazon, ProFlowers and more.

The best Valentine's Day flowers online delivery services: 2019-02-08 12:37:37We've tracked down the best places to buy flowers online for Valentine's Day

SSD vs HDD: which is best for your 2019-02-08 12:35:32What are the key differences between hard drives and solid state drives? We look at the pros and cons of both.

The best cheap TV sales and 4K TV 2019-02-08 12:33:09We've searched through the latest TV sales to compare prices and bring you the finest selection of cheap TV deals.

Get 10GB of data for only £5 a 2019-02-08 12:18:47Incredibly cheap SIM only deals thanks to massive cashback!

Carbonite acquires Webroot for $618m 2019-02-08 12:06:31Carbonite is acquiring Webroot to bring endpoint security with built-in cloud backup to its users.

Best 55-inch 4K TVs 2019: the best medium-sized 2019-02-08 11:42:00From 4K UHD and advanced displays to Smart TV capability, the best 55-inch TVs have it all.

Best 65-inch 4K TVs 2019: the best big 2019-02-08 11:30:28If you want to upgrade your home entertainment system, go big with one of the best 65-inch 4K TVs.

Is it worth getting insurance for my iPhone? 2019-02-08 11:22:07If you want to keep your iPhone crack-free and in your pocket long-term you might want to consider insurance.

Building trust in open source: a look inside 2019-02-08 11:00:51OpenChain's Shane Coughlan explains how the Linux Foundation is working to boost open source adoption.

Dev Pro

IBM Invests $2 Billion in New York Research 2019-02-07 17:56:00International Business Machines Corp., based in Armonk, New York, has been pushing into fast-growing new technologies, like AI, cloud-computing platfo

Facebook's Model Attacked by German Antitrust Regulator 2019-02-07 17:26:00Facebook Inc.’s advertising model came under attack in a landmark ruling from German antitrust regulators who ordered the social network to over

Assessment of Gartner’s Market Guide for Cloud Workload 2019-02-07 17:07:00Learn about the core capabilities in Gartner’s Market Guide for cloud workload protection platforms.

Supplementing the Limitations in Office 365 2019-02-07 17:06:00The focus of this whitepaper is to discuss what Office 365 does and does not do, as well as how to supplement its limitations.

The Top Five Myths of Hybrid Cloud Security 2019-02-07 17:05:00Let’s look at the top five myths surrounding hybrid cloud security.

Mapping the Future: Dealing with Pervasive and Persistent 2019-02-07 17:04:00Learn about Trend Micro’s security predictions for 2019.

Leveraging the Agility of DevOps Processes to Secure 2019-02-07 17:03:00Learn how to leverage the agility of DevOps processes to secure hybrid clouds.

Microsoft Aims to Connect Patient Health Records in 2019-02-07 16:44:00Microsoft Corp. is releasing a service to help health-care companies move vast amounts of patient data to its cloud and connect with other related sys

Tape Storage Is 'Still Here' 2019-02-07 01:49:00When it comes to reliability, longevity and cost-effectiveness, don’t count tape storage out. In fact, tape storage is not just "still here,"

Google Warns Data Privacy Changes Could Hurt Its 2019-02-06 22:58:00As consumers and politicians re-evaluate the data-collecting business models of companies like Google and Facebook Inc., the chance of tough regulatio

Apple FaceTime `Privacy Violation' Gets Queries From Lawmakers 2019-02-06 22:29:00Apple Inc. Chief Executive Officer Tim Cook is getting questions from two key U.S. House Democrats about a bug that let users of its FaceTime video-ch

Rancher Now Allows Containerized Apps to Run on 2019-02-06 21:53:00The open source Kubernetes startup Rancher makes public its easy way to deploy containerized applications to multiple clusters.

TechCrunch » Enterprise

Google doubles down on its Asylo confidential computing 2019-02-06 12:00:52Last May, Google introduced Asylo, an open-source framework for confidential computing, a technique favored by many of the big cloud vendors because i

Big companies are not becoming data-driven fast enough 2019-02-06 10:33:34I remember watching MIT professor Andrew McAfee years ago telling stories about the importance of data over gut feeling, whether it was predicting suc

vArmour, a security startup focused on multi-cloud deployments, 2019-02-06 06:35:15As more organizations move to cloud-based IT architectures, a startup that’s helping them secure that data in an efficient way has raised some c

Retail technology platform Relex raises $200M from TCV 2019-02-06 05:17:38Amazon’s formidable presence in the world of retail stems partly from the fact that it’s just not a commerce giant, it’s also a tech

Google’s still not sharing cloud revenue 2019-02-05 17:33:05Google has shared its cloud revenue exactly once over the last several years. Silence tends to lead to speculation to fill the information vacuum. Luc

Backed by Benchmark, Blue Hexagon just raised $31 2019-02-05 09:00:33Nayeem Islam spent nearly 11 years with chipmaker Qualcomm, where he founded its Silicon Valley-based R&D facility, recruited its entire team and

BetterCloud can now manage any SaaS application 2019-02-05 09:00:16BetterCloud began life as a way to provide an operations layer for G Suite. More recently, after a platform overhaul, it began layering on a handful o

Databricks raises $250M at a $2.75B valuation for 2019-02-05 03:01:40Databricks, the company founded by the original team behind the Apache Spark big data analytics engine, today announced that it has raised a $250 mill

Coda’s programmable document editor comes out of beta, 2019-02-05 03:01:19Coda, which is coming out of its limited beta today, wants to reinvent how you think about documents and spreadsheets. That’s about as tough a c

After 5 years, Microsoft CEO Satya Nadella has 2019-02-04 12:46:13Five years ago today, Satya Nadella took over as CEO at Microsoft, and by most any measure has been wildly successful. It’s common to look at th

Workplace messaging platform Slack has confidentially filed to 2019-02-04 12:44:37The company has taken its first official step toward a rumored direct listing.

Chicago RPA startup Catalytic hauls in $30M Series 2019-02-04 09:00:42Robotics process automation (RPA) is as hot as any enterprise technology at the moment, as companies look for ways to marry their legacy systems with

ExtremeTechInternet –

Apple Blocks Google’s Internal iOS Apps Over Privacy 2019-01-31 18:32:47Apple just killed Google's internal iOS applications after discovering the company was monitoring internet users in virtually the same manner as Face

Scamers Use YouTube Copyright Strikes in Extortion Scheme 2019-01-31 16:06:47Some particularly unscrupulous people have realized that Google's YouTube copyright strike system makes a good extortion tool, so they're using it t

Apple Kills Facebook’s Internal iOS Apps After Latest 2019-01-30 13:19:21It's Wednesday, so that must mean Facebook is in hot water yet again after taking a laissez-faire attitude toward privacy. The post Apple Kills Face

The FCC Has Been Accused of Colluding With 2019-01-28 10:48:57The head of the House Commerce Committee has accused the FCC of collaborating with cellular carriers to game the US court system and move cases into f

New Mac Malware Uses Steganography to Sneak Into 2019-01-25 13:49:25The so-called VeryMal payload makes its way into computers by way of ad image files impregnated with a steganography based payload. The post New Mac M

Google’s Proposed Chrome Changes Would Cripple Ad Blockers, 2019-01-24 15:15:17Google is proposing major changes to Chrome that would cripple the functionality of ad blockers and other security-and-privacy-focused extensions. Th

Who Makes the Most Reliable Hard Drives? 2019-01-24 09:13:46Backblaze has released its data set for the full year 2018 and there are some surprises in it this time around. The post Who Makes the Most Reliable

New Massive Security Breach Exposes 773 Million Passwords 2019-01-17 15:45:21A new massive data breach has leaked 773 million email addresses and associated passwords. The post New Massive Security Breach Exposes 773 Million P

Netflix Plans Across-the-Board Price Increases 2019-01-16 08:42:21The extra cash is being billed as a way to pay for the absolutely massive amounts of money Netflix is sinking into making its own content. The post N

Amazon’s Ring Security Camera Let Employees Spy on 2019-01-14 09:01:45Companies supposedly devoted to bringing us smart-home breakthroughs are often violating the privacy of their customers in significant ways. The post

T-Mobile, Sprint, and AT&T Caught Selling Location Data 2019-01-09 11:42:48AT&T, T-Mobile, and Sprint are selling your location data, with precious little concern for who eventually buys it. The post T-Mobile, Sprint, an


Disclaimer and Notice:WorldProNews.com is not responsible of these news or any information published on this website.