Tag Archives: Business Continuity

Disaster-Proof Your Business with a Business Continuity/Disaster Recovery Plan

As recent events like severe storms demonstrate, disasters will occur. But they needn’t sideline your business. Read more to find out about developing a plan to mitigate the effects of disasters on your company’s data and network. 

 

The Cost of Failing to Plan

 

The cost of downtime is $5,600 per minute! Multiply that out, and you could be paying hundreds of thousands or even millions for lost revenue, lost wages (or overtime when systems come back online), or fines for regulatory non-compliance. Even if unplanned downtime is just an hour, the cost is steep. The revenue you lose because your customers can’t purchase items on your website, and even missed deadlines for projects, can hurt your bottom line and your reputation with customers. Data breaches from cyberattacks can reduce your customers’ trust as well, and possibly result in fines for regulatory non-compliance. By not having a plan, you may waste valuable time because you don’t know what to do first. 

 

Developing a Business Continuity/Disaster Recovery Plan

 

A business continuity/disaster recovery plan is vital in protecting your company. The disaster recovery aspect deals with how your business will bounce back from a natural or manmade disaster.  How do you develop your plan? A good first step is assessing the current state of your network as well as the risks your company faces. Do your systems have any holes where malware can enter or places where data might become bottlenecked? Do you have redundancy/failover so that if one part of your network is down, another part can pick up the traffic? What about equipment you have on-premise–is it protected from overheating, a common cause of equipment failure? And what about cyber defense? Is your data backed up and safeguarded in the event of loss or intrusion? Finally, consider whether your employees are adequately trained and able to recognize (and stop) a potential phishing attempt. A robust plan will have provisions for infrastructure, systems, processes and personnel.

 

Keep Your Plan in Shape

 

Once you have a plan and implement it, testing will show how well it works. Staging mock events will show how workers act in the event of a cyberattack, and will show what they know (or don’t). Testing your plan will show what areas are strong and which need fixing. How quickly, for example, can data be retrieved from backup? Making detailed note of what goes well will help refine your plan and prepare you in case of an emergency.

 

Disasters come, but need not harm your business; having a plan is key. For guidance, contact your trusted technology advisor today. 

Keep Your Business Operating with a Business Continuity Plan

As the last year has shown us, we don’t know exactly what the future holds. However, with manmade and natural disasters like cyber attacks and power failures from storms, it’s a matter of when, not if, your company is faced with a situation that could threaten its operations. Read on to learn more about protecting your business with a business continuity plan.

 

Building a Comprehensive Business Continuity Plan

 

In its broadest sense, a business continuity plan is a proactive strategy to keep your business up and running during and after a disaster. That disaster could be a storm causing a power outage, or a ransomware attack like the ones affecting major companies in recent years. These can cause costly downtime that can hurt your company’s revenue and reputation. While data protection is part of the business continuity framework, business continuity plans go beyond to consider the relationships between people, processes and technology. A solid plan will take into consideration individual departments and their operations as well as how these departments work with the others. Risk management means evaluating likely threats, and the impact they’ll have on your business. 

 

Important Questions to Ask Your Technology Advisor

 

Developing a business continuity plan starts with asking questions about each department. What are their functions, and who carries out which functions? What processes do they use to carry out these functions, and what data and applications do they use in these processes? What are the mission-critical functions, and what infrastructure is needed? Then, consider how the departments work together, including the IT and security teams. Consider looking at your plan through the lens of resiliency, recovery, and contingency. Will your company be nimble enough to handle different threats? What are objectives for recovery, and what are your contingency plans for unexpected situations? The more specific your company can be in planning, the  better. Appropriate testing, with evaluation of results and refining your plan, is also critical. 

 

More than ever, your business needs to be nimble in their response to any disaster. For help in developing a comprehensive plan for your company’s response, contact us today.

How To Stay in Business with a Business Continuity and Disaster Recovery Plan

With technology growing by leaps and bounds, and regulations assigned to protect the data generated by this technology, you need a business continuity and disaster recovery plan in place to determine how that data is collected, protected, analyzed and stored. Read on to find out how to protect your company from data loss and its consequences.

Why You Should Care About Data Protecting Your Data

According to COMPTIA, data protection will be a key trend in 2018 and beyond. Businesses will continue to generate large amounts of data; for some companies, regulations such as PCI, GDPR and HIPAA require protection of data and plans for business continuity in the face of potential data loss. Even without the need for compliance to regulations, businesses need access to their data even in the event of a natural disaster or a cyberattack.

How Much Downtime Can you Afford?

The average cost of downtime is $5,600 per minute. Not only that, but if your business is inaccessible during a flood, fire or other disaster, or simply a power outage, customers can lose confidence in the product or service you provide. Even more serious is the prospect of confidential data being lost or exposed. Having a plan in place can make the difference in whether your business stays in business.

What to Include in Your Plan

How much data can you afford to lose, and how long can you be without it? The best plan provides for storage and restoration of data during and after a disaster. How long can your systems be down before it affects profitability? How will you restore data that is lost? A robust plan is one that enables your company to retrieve lost data as quickly as possible. Data can be stored on-premise on a server, or in the cloud, or a combination of both. Once you have a plan in place, test it to make sure it works, and verify it periodically to make sure all your data is accessible.

Having a plan for business continuity can keep your business in business during a disaster and afterward. If you do not yet have a plan, or if you’re not sure the plan you do have is optimal, contact your trusted technology advisor today.

Disaster Recovery and Data Protection –Now More Than Ever

Disaster Recovery PlanRecent Hurricanes Harvey and Irma, along with major earthquakes in Mexico, remind us how vulnerable we can be to disasters, and underscore the importance of data protection. As businesses depend on access to a range of systems–including call center, communications and collaboration application, customer management, and more–having a solid data protection plan can help you in a disaster recovery scenario. Now more than ever, a range of options exist to help maintain business continuity. Here are a few options to consider.

 

Review Your Data Protection Plan

Key to your data protection plan is identification of mission-critical systems. The most important systems should be redundant, with the ability for failover in the event of a disaster. Your data centers and failover options should be geographically dispersed and on different network backbones. This can minimize downtime and get you back up and running sooner. Having your data backup available in Cloud Storage can help you recover other important files and application data if you lose access to your on-premise systems.

SD-WAN for Business Continuity

Software-defined wide area networks (SD-WAN) can also provide you a highly reliable and redundant network. Having the ability to switch Wide Area Networks using SD-WAN as an alternative to more costly MPLS solutions can ensure connectivity during a natural disaster. What’s more, Software-Defined Wide Area Networking can save you money in the long run by giving you the flexibility of a multi-carrier solution.

Software as a Service for Disaster Recovery

More businesses are turning to the Cloud for a range of applications–hosted email, Voice over IP (VoIP), Call Center, and others–to keep communications flowing during a disaster. Using Software as a Service (SaaS) for these important communications and collaborations applications keeps your employees, customers and business partners connected even when you are unable to gain physical access to your facilities. Having these applications in the Cloud can help you ensure everyone on your team is present and accounted for.

Don’t wait until a disaster strikes to review your data protection and disaster recovery plans.  Contact your technology advisor today if you are unsure how well you will weather the storm.

Can A Business Continuity Plan Save Your Reputation?

Reputation Management is a hot topic in the boardroom these days. Having a solid business continuity plan could make or break your company’s ability to survive a data breach or other systems failure that could tarnish your hard-earned reputation. Company news about data loss, systems downtime and other unplanned interruptions occur with regularity. According to technology research firm Gartner, a business that has a catastrophic data event has a two-year survival rate of just 6%. Surprisingly, your company can avoid these scenarios by having a solid BC/DR Plan. It is no surprise that recent research by MarketsandMarkets forecasts the spend on DR as a Service (DRaaS) to grow from $1.68 Billion in 2017 in revenue to $11.11 Billion by 2020. Read on to find out how a Business Continuity Plan could save your business.

Understand Your Business Continuity Risk and Exposure

A great place to start with Business Continuity planning is a review of your company policies and procedures. Your business continuity policies should — in addition to identifying the technical standards for managing your company’s applications, data, and related infrastructure — should identify acceptable risk, what your employees will do in a disaster recovery scenario, and identify any compliance requirements. It is important to understand what information is most important and to consider the risks of suffering a data loss. What would be the impact to your revenue, productivity and reputation? If you could not access your information, or it was subject to data breach, how may that impact your customers’ trust and your business’s reputation?

An Ounce of Planning is Worth a Pound of Cure

Ensure you have a solid data protection plan. Ask yourself; how often is your data backed up, how fast could you recover if needed, who are the stakeholders and how would you communicate with them if you suffered a data loss? Another consideration is your Recovery Time Objective (RTO). Your RTO is how long it will take to restore your data. The size of your data and backup methodologies can impact how long recovery may take. Your network may also be a factor in how quickly you can get up and running. Network bottlenecks can turn a routine restore into a never-ending project. Make sure your network is robust enough to meet your Recovery Time Objectives. Also, remember to train your employees on how to avoid malware and phishing schemes. Last but not least, test your backups regularly to ensure data integrity.


Proactive Communications and Rapid Recovery are Critical

If you find yourself in a situation where your data has been compromised, most experts agree you should respond quickly and proactively. As of last count, the United States had 48 state data breach notification laws to comply with. Many countries around the world have various data protection breach notification laws as well. The EU is in the process of implementing The General Data Protection Regulation (GDPR), which establishes data protection guidelines for its citizens’ information.

Having a Business Continuity plan could save your business. Being able to rapidly respond in a disaster recovery scenario is a critical element of survival. Not only will it help you get back up and running quickly, you will avoid unnecessary fines and protect your company’s reputation. If you feel your business would benefit from a risk assessment, contact your technology advisor today.

Reducing Business Risk with Backup and Disaster Recovery

Business ContinuityDoes your business have a backup and disaster recovery plan? Businesses of any size should know which applications–and their associated data–they rely on and what the cost of interruption would be in the event of an unintended disruption. Cyber Threat, natural disasters, and systems failures may impact your business; however, human error is said to be the top cause of data breach (58%), ahead of technology errors. To avoid unnecessary downtime, here are some questions to ask to help assess your backup and disaster recovery plans.

Assess the Risks of Data Loss and System Downtime

With Backup and Disaster Recovery there is always a balance between cost and risk. To allocate your technology spending, it is important to focus on your areas of exposure. Maybe your business relies heavily on an order-processing and invoicing system, or perhaps a manufacturing and inventory control system. If these systems go down you may lose revenue and productivity from employee idle time.  

You may also have intellectual property that is important to your business. What would be the consequence if this data was lost and could not be recovered? You may also have compliance exposure, if you suffered a breach of privacy or other data that should be encrypted was exposed. Assessing your risks and ranking the exposure is an important step to evaluate your backup and disaster recovery plan priorities.

Not all Backup Plans are Alike

For systems you rely on heavily, you may consider having an offsite failover system in the event of a data loss. This can minimize your downtime by enabling you to rapidly cut over to a live system running in parallel to your production environment. Having daily (or even hourly) backups of these systems will minimize downtime for your mission-critical applications and their data.

Other information, including files and other productivity applications, may not need such rapid recovery. Many File Sync and Share applications also provide real-time recovery using Cloud Backup technologies. For productivity applications, this may provide a cost-effective way for you to keep your team productive in the event of a data loss. Some data that may not reside in the cloud, however, needs weekly backup. This regular backup would allow the information to be recovered on an as-needed basis, ensuring continuity in a cost-effective manner.

Testing your Backup and Disaster Recovery Plan

Periodic testing of your backup and disaster recovery plan is suggested to ensure things are working, in order to minimize downtime and related business disruption. Size of data, network capacity, and other variables could extend your backup window beyond your time requirements. In addition, data may get corrupted during the backup process. So it is important to verify and test your backups to provide confidence in your ability to recover from a disaster.

Every business is different and will have different disaster recovery needs. To ensure that your backup and disaster recovery plan meets your needs, contact your technology advisor for an assessment.

Is Your Network Ready for Cloud Backup?

Cloud BackupRansomware, Privacy Breach, Compliance requirements and Business Continuity make the case to protect your company’s data. Cloud backup and Disaster Recovery as a Service (DRaas) require reliable network access to ensure your IT assets are backed up and available for rapid recovery. Today’s networks also support a range of applications including Hosted Email, SaaS, VDI, VoIP and Call Center Solutions. Your network needs to be in top shape to accommodate these demands. Here are some tips to determine if your network is ready for Cloud Backup.

Assess Your Network for Cloud Backup Readiness

When adding Cloud Backup, it is important to understand possible points of failure on your network before they happen. Consider starting with a Network Assessment to stress your network in a controlled environment, in order to determine your backup window. Database and file information on a regular backup schedule may impact your network performance if not properly optimized. Make sure your initial backup and incremental backups run smoothly by simulating peak loads for voice and data on your network. In addition, test your backup and recovery scenarios to identify weaknesses in a controlled environment. Proactive network monitoring can identify potential packet loss and latency that can impact connection speed and uptime. This testing is critical to avoid failed backup and recovery.  

Proactively Monitor Your Network for Security and Compliance

In addition to network usage, Malware and other unauthorized network access can slow your network performance and disrupt your backup and recovery. Your backup may fail when you need it most. Worse, remediating malware during a recovery scenario may delay your ability to bring critical systems back online when restoring from a Cloud-Based Backup. Making sure your network is secure and in compliance may avoid unnecessary downtime.

Cost Effective Network Performance

Technological innovation consistently drives down costs to make systems more efficient. Software Defined (SD) solutions for Wide Area Network and Storage create affordable options to provide secure and reliable Network and Cloud Backup solutions. Software Defined Wide Area Network (SD-WAN) provides centralized management and policy-based enforcement, making it faster to deploy and easier to manage networks across multiple remote sites. This helps ensure all your locations are ready for Cloud Backup.
Your network is the backbone of your systems infrastructure. If you are unsure if your Network is ready for Cloud Backup, contact your technology advisor today to find out more.

Cybersecurity is Everybody’s Business

Cyber SecurityIt is no surprise, technology flattens the world for many businesses. What’s more, nearly every business sector finds it necessary to collect, maintain, analyze, and monetize user data. Many think Cybersecurity risks only apply to highly regulated industries, such as legal, healthcare and financial services.

Cybersecurity Risks Go Beyond Borders

Factors outside industry, including geographic considerations and sensitive consumer data, can create cybersecurity risks that need to be managed. These factors run the gamut of domestic and international laws, regulatory bodies, and private-party business agreements. Cybersecurity compliance can touch every business to some degree.

Internet of Things (IoT) and Cybersecurity

Adding to the list of concerns are non-traditional technologies entering your businesses network. IP-enabled technology called Internet of Things (IoT) is rapidly being adopted in the workplace.  The Cybersecurity threat is moving beyond desktops, laptops and services. A new generation of mobile devices–Point of Sale (POS), IP video surveillance, embedded sensors, VoIP, and others–is just the first wave of emerging technologies that need to be secured.

How to Minimize Cybersecurity Risks

There are many things a business can do to reduce Cybersecurity threats. According to the Computing Technology Industry Association (CompTIA), the following elements are the building blocks for a cybersecurity program:

  • Documented policies, procedures & standards

  • Asset management

  • Identity & access controls

  • Risk management

  • Vendor management

  • Physical & environmental security

  • Compliance

  • Privacy

  • Remote access

  • Data backups

  • Data destruction

Cybersecurity threats are a reality of today’s world. The risks of data compromise and/or loss can cost more than dollars; such risks can cost your reputation. Your business is only as secure as your Network. If you have questions about your business needs, ask your technology advisor about how to manage Cybersecurity threats to your business.

Can You Afford a Data Loss?

Business ContinuityAccording to the technology industry research firm Gartner Group, ninety percent of companies that experience data loss go out of business within two years. Countless studies indicate the longer the downtime, the greater the risk. More and more businesses are turning to Cloud Backup and collation to ensure their critical data is protected. But how long will it take to restore that data when a disaster strikes? Here are some points to consider to minimize the risk of downtime.

Identify Critical Data

If you are an online business or rely on retail systems to keep your registers ringing, you could easily calculate the hourly loss due to system downtime. Similarly, manufacturers, distributors, healthcare organizations, and financial services firms all rely on mission-critical systems to keep employees productive and customers happy. How long could your business survive without email? More than likely, not very long. While more difficult to quantify, communications and collaborations are mainstays to employee productivity and interactivity. In addition to direct financial impact, consider the public relations consequence related to data loss.

Other files and productivity applications are also important to ongoing operations. However, there is a cost to rapid recovery. Understanding the tradeoffs between costs and how much time it takes to recover will help you balance the risks with the financial constraints.

Bullet Proof Your Network

Your network is a critical component for data backup and recovery. Some systems may have a backup window of several hours. A high-performance network can reduce the time it takes for backup and recovery. What’s more, an optimized network has less chance of downtime and connection loss. A flaky connection may reduce the integrity of your backup and impede progress during data recovery.

By monitoring your network you can identify performance bottlenecks, bandwidth constraints, and poorly performing hardware. Keeping your network up to date also reduces unforeseen risks from intrusion that can also impact your recovery time.

Test Your Backups Periodically

Data loss can occur for a variety of reasons. Unprotected systems may be stolen or become corrupted from Malware. Natural disasters including fire, earthquake, tornados, cyclones, and hurricanes may make data unavailable. Your data may fall victim to human error or hardware failure. Regardless of the reason, recovering from a data loss isn’t something any business wants to face.

Backup is really about recovery. Testing your backup provides a number of benefits. Missing files or systems components could cause delays during the recovery process. Data corruption may occur, leaving your backup useless. Network failure during backup may also add to the time it takes for your business to fully recover. By periodically testing your backup you can identify these issues before they occur and avoid common pitfalls associated with disaster recovery scenarios.

If you feel you cannot afford a data loss, research indicates you are not alone. Take the time to consult your technology advisor to minimize business risks from losing your critical data.

What is Distributed Denial of Service, and What Does it Mean to You?

Cyber SecurityWe all know, not being able to get on the WiFi is annoying. But worse still, Distributed Denial of Service (DDoS) attacks can impact  your business and even interfere with vital infrastructure such as electrical grids. According to Forbes’s Michael Krancer, an attack in 2015 knocked 80,000 electrical customers offline for three hours. Other recent attacks put several eCommerce and Internet Server Providers out for hours. In a world where people are always connected to computers, such an attack is becoming all the more common.

What is Distributed Denial of Service?

A Distributed Denial of Service (DDoS) attack occurs when devices connected to the Internet are used to flood a business’s server with data, and make it unavailable to customers (and potential customers). Unlike a simple Denial of Service, a Distributed Denial of Service is an attack on a large, perhaps global, scale. Botnets, networks of devices controlled remotely, are used by malware authors to send huge amounts of junk data to servers. Devices can include cameras, smartphones, or PCs—any device connected to the Internet. Internet of Things (IoT) and other IT trends will fuel the expansion of connected devices. The effect is to exhaust server resources with fake or incomplete information requests, and render the business’s website unavailable to legitimate customers. Attacks can happen on the bandwidth or application layer, or from sheer volume.

What Does a Distributed Denial of Service Mean to You and Your Business?

First, it means loss of legitimate traffic. Your customers can’t access your website, and of course can’t buy products and services from you, costing your company revenue. According to a report by Incapsula cited in a Security Week post, a typical attack lasting 6 – 24 hours can result in a loss of half a million dollars. Second, non-financial costs–loss of trust from customers, loss of intellectual property, and exposure of confidential data–also result.

What Can You Do to Be Prepared for a DDOS Attack?

The primary purpose of protection is to detect and mitigate attacks. As DDoS attacks target multiple systems, be sure to protect on multiple fronts. Be sure to monitor call centers and other customer-facing systems. Mission-critical systems should have redundancy and failover. All of these defenses should be part of your business continuity plan, in the event of a natural—or man-made—disaster.

If you are unsure about your readiness to survive a DDOS or need assistance in protecting yourself, contact your trusted technology advisor today.