1 Disaster Recovery 100 Success Secrets Disaster Recovery 100 Success Secrets - IT Business Continuity, Disaster Recovery planning and Services Gerard Blokdijk
2 Disaster Recovery 100 Success Secrets Copyright 2008 by Gerard Blokdijk Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Notice of Liability The information in this book is distributed on an As Is basis without warranty. While every precaution has been taken in the preparation of he book, neither the author nor the publisher shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the instructions contained in this book or by the products described in it. Trademarks Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations appear as requested by the owner of the trademark. All other product names and services identified throughout this book are used in editorial fashion only and for the benefit of such companies with no intention of infringement of the trademark. No such use, or the use of any trade name, is intended to convey endorsement or other affiliation with this book.
3 Disaster Recovery 100 Success Secrets Gerard Blokdijk There has never been a Disaster Recovery manual like this. 100 Success Secrets is not about the ins and outs of Disaster Recovery. Instead, it answers the top 100 questions that we are asked and those we come across in forums, our consultancy and education programs. It tells you exactly how to deal with those questions, with tips that have never before been offered in print. This book is also not about Disaster Recovery s best practice and standards details. Instead it introduces everything you want to know to be successful with Disaster Recovery.
4 Table of Contents Innovation of a AS/400 Disaster Recovery System...12 Bank Disaster Recovery Planning Goes Beyond the Usual...14 The Disaster Recovery Journal - Providing Solutions to Ensure Business Continuity...16 Establishing Backup Disaster Recovery Sites for Business Continuity...18 Business Continuity and Disaster Recovery Roles Intertwined...20 The Benefits Of Having A Business Continuity And Disaster Recovery Plan...22 Disaster Recovery Plan for Floods Protecting Computer Databases When Calamity Strikes...24 The Five Main Phases of a BCP Manual for Computer Disaster Recovery...26 How to Pursue Outsourcing of Computer Disaster Plan Recovery...28 Should We Be Concerned About Computer Disaster Recovery?...30 The Value of Preparing a Computer Disaster Recovery Plan Beforehand...32 How Do I Find a Reputable Contractor Disaster Recovery Specialist?...34
5 How is Critical Disaster Information Recovery Conducted? Disaster Recovery Measures in the Data Center Data Disaster Recovery Restoring Information from Damaged Media What Is Database Disaster Oracle Recovery? How to Survive Data Recovery Disaster Disaster Recovery Definition In Layman s Terms Qualifications for Disaster Mail Print Recovery Partners to Success The Key Aspects in Creating Disaster Recovery/Business Continuity Plan Disaster Recovery Plan and Business Continuity Plan What Makes the Difference? Disaster Recovery Plan The Key to Surviving Disasters Disaster Recovery Planning No More Room for Mistakes DRS Making a Mark on Disaster Recovery Services When Disaster Strikes Disaster Recovery Defined How Do You Define Disaster Data Recovery? Understanding Your Disaster Emergency Procedure Recovery Plan What Are the Disaster IBM Recovery Services? How To Go About A Disaster IT Plan Recovery Effort What Disaster Recovery And Business Continuity Planning Can Do To Companies... 70
6 Disaster Recovery Through Disk Based Backups...72 Hiring The Services Of A Disaster Recovery Company...74 Things You Must Consider About A Disaster Recovery Planning Guide...76 The Value of Disaster Recovery Planning Shareware...78 Disaster Recovery Planning Software...80 What Measures Disaster Recovery Planning Templates...82 Disaster Recovery Plan Shareware: Know Its Importance...84 Steps in Planning a Disaster Recovery Public Entity Business Interruption...86 Disaster Recovery Server SQL Is An Efficient Recovery Partner88 The Features of Disaster Recovery Software...90 Why Should I Opt for a Disaster Recovery Solution?...92 The Effects Of Having A Good Disaster Recovery System...94 How many companies go out of business due to poor Disaster Recovery planning?...95 Assurance Through Disaster Recovery Testing...96 How Do You Pursue Disaster Relief and Recovery After a Disaster?...98 The Key Concepts in Fault Tolerance vs. Disaster Recovery Efforts Hospital Disaster Recovery Plan Safeguarding People s Lives Saved on Databases The Quick Fix: HP One Button Disaster Recovery...104
7 IT Disaster Recovery Preventive Measures on How to Deal with Threats A Well Run Company Always Has An IT Disaster Recovery Plan What is the Value of a Network Disaster Recovery? The Perks of Oracle Database Disaster Recovery Oracle Disaster Recovery Redundancy Should We Start Outsourcing Disaster Recovery Plans? Should My Organization Opt for Outsourcing IT Disaster Recovery Efforts? What Are the Components of a Sample Disaster Recovery Plan? The Role of the Server Administrator in the Server Disaster Recovery Process Points In Favor of the TAMP Disaster Recovery System The Importance of Any Testing Disaster Recovery Plan Efforts A Positive Note On The Cost of Outsourcing IT Disaster Recovery Three Points For An Effective Applications Disaster Recovery Plan Things You Need To Know About Your Backup Disaster Recovery Plan
8 Business Continuity And Disaster Recovery Planning For Organizations Making Business Continuity Disaster Planning Recovery A Priority Choosing The Right Business Continuity Disaster Plan Recovery Template Business Continuity Plan vs. Disaster Recovery Explained Implementing A Business Disaster Recovery Plan Creating A Community Bank Disaster Recovery Software How Do I Find a Reputable Contractor Disaster Recovery Specialist? What Is The Database Disaster Oracle Recovery? The Importance Of Having A Data Center Disaster Recovery Plan ServerVault Will Secure Your Data Center Disaster Recovery Plan How Do You Define Disaster Data Recovery? Five Factors An Example Disaster Recovery Plan Must Have..156 What Are the Disaster IBM Recovery Services? IT Disasters Happen, Thus Disaster Recovery Planning Is Needed Implementing A Network Disaster Recovery The Difference Between Disaster Recovery And Business Continuity Plan...164
9 Implementing A Disaster Recovery And Business Continuity Plan Disaster Recovery In Florida: Debris Removal Through Contractor The Importance Of Insurance Policy On Disaster Recovery Disaster Recovery Jobs: A Quick View On Responsibilities Of Disaster Recovery Managers Factors In Building A Disaster Recovery Plan The DRP The Importance Of Disaster Recovery Plans Factors In Choosing A Sample Plan for Disaster Recovery Finding The Right Disaster Recovery Plan Template Disaster Recovery Plan Templates And Its Key Elements Steps in Planning a Disaster Recovery Public Entity Business Interruption Getting A Disaster Recovery Server And Software Hiring A Good Data Recovery Service Company The People Within A Disaster Recovery Team Highly Recommended: Disaster Recovery Training How Do You Pursue Disaster Relief and Recovery After a Disaster? Recovering From An MS Exchange Disaster The Key Concepts in Fault Tolerance vs. Disaster Recovery Efforts What is the Value of a Network Disaster Recovery?
10 Portfolio for Disaster Recovery Your Key Towards the Right Choice Planning For Disaster Recovery What Are the Components of a Sample Disaster Recovery Plan? The Importance of Any Testing Disaster Recovery Plan Efforts...208
12 12 Innovation of a AS/400 Disaster Recovery System Synergistics has now provided businesses with a credible option for disaster recovery the AS/400 disaster recovery system. The AS/400 disaster recovery system has been designed to creatively as well as innovatively provide disaster recovery solutions for middle income market. Its service agreement provides flexible terms of payments which can surely suit the budget of midrange sized businesses. The AS/400 disaster recovery system makes use of the LPAR technology developed by IBM. In addition, the engineers behind Synergistic designed custom-fit solutions to easily adjust depending on the specific needs of the client. The system also boasts of four key points which make it a stand-out when it comes to disaster recovery. AS/400 provides recovery for hot sites, replication of data for proprietary solutions, as well as instant replication of data to be used as leverage for software. In addition to all its detailed processes and cost-effective systems, the AS/400 disaster recovery system also provides its clients with their own team of technical engineers. These engineers are always ready and accessible when it comes to troubleshooting concerns. There are also online updates and full access granted to its clients so they can always be kept updated with new innovations regarding the AS/400 disaster recovery system. And to top it all off, AS/400 also boasts of a unique disaster recovery feature which allows clients to actually choose which type of disaster would they want to declare. This way, specialization of the recovery process is made possible and easily available through the AS/400 disaster recovery system.
13 13 Bank Disaster Recovery Planning Goes Beyond the Usual Banks are among the earliest industries to adapt the features brought about by the birth of information technology. Banks were among the frontline runners who jumped right into whatever information technology promises to offer And as catastrophes are inevitable and unpredictable, bank disaster recovery planning are highly focused on by the said industry. After all, it is money and hard-earned cash which are at stake in these institutions, from individuals alone up to big shot corporations. It seems that even the government has seen how sensitive banks can be and how vulnerable they can become amidst the face of emergency. Hence, the federal government mandated in 1983 that banks disaster recovery planning must be implemented and maintained in each and every financial industry. When it comes to bank disaster recovery planning, the proactive approach is of high value. Planning is definitely on the critical side. The primary objective of bank disaster recovery planning is not to salvage anything from the emergency situation but rather, to actually prevent any unwanted emergencies from hampering operations. This also brought about by the fact that when calamities occur, banks become a hot spot for people who are hit with panic and with an immediate need to check on their resources. In addition, a bank disaster recovery planning puts all people first out of danger. The customers and employees are both very important to save. Without customers, there will be no more business for these banks and without their valued employees, operations will likewise become paralyzed.
14 14 And of course, recovery of data center is not only limited within the confines of the particular branch or department. The whole bank s corporation takes part in the recovery process.
15 15 The Disaster Recovery Journal - Providing Solutions to Ensure Business Continuity Do you have any questions on how you can implement business continuity and disaster recovery (BC/DR) solutions to your organization? The answers are just within your reach because there are a lot of sites that offer suggestions and provide updates as far as BC/DR matters are concerned. Aside from consulting an expert when it comes to BC/DR processes, these web sites are jampacked with tons of information that you can apply to your own business. One of these web sites is the disaster recovery journal. This site offers comprehensive discussions about the latest trends about BC/DR processes and how to successfully put these solutions into practice. The Disaster Recovery Journal is actually a magazine that it has about 60,000 subscribers to date with more than a 100 pages in size. The Disaster Recovery Journal is the first publication that is solely focused on disaster recovery and business continuity. Founded in 1987, its first issue contains 22 pages and was only distributed to about 3,000 readers. The man behind the journal is Richard L. Arnold, who is still acts as the president of the Disaster Recovery Journal. He also happens to be a co-founder of a nonprofit organization named Disaster Recovery Institute in This institution offers certification and awareness of the importance of disaster recovery in the business industry today. To gain more knowledge and learn the different best practices in the field of disaster recovery and business continuity, the Disaster Recovery Journal also sponsors two conferences held
16 16 annually since September With over 3,000 disaster recovery professionals who participated, this only goes to show how critical disaster recovery is to the business.
17 17 Establishing Backup Disaster Recovery Sites for Business Continuity Why do you think that printers, photocopying machines, scanners, diskettes, CDs and DVDs were developed in this day and age? All of these have only one thing in common backup. Producing a backup copy is vital, either soft or hard, that you still can access or read the information you need if in case the original copy is stolen, lost or got damaged. This concept is the same when dealing large volumes of information that are kept on database servers. There is no such perfect system in this world that even high powered machines are still susceptible to change and may lead to malfunction over time. Plus, also take note of unexpected disasters that may happen. Examples would be fire, floods and earthquakes to name a few. Human errors may also occur, though this may seem most unlikely to happen since proper training can always be given to the users of the system. Another human-imposed activity would be hacking and other nuisance that can cause too much trouble. When worse comes to worst that when such unfortunate events arise and everything is lost and may seem to be unrecoverable, there is only one thing that you can cling on. This would be your database backup server. But then again, a good thing to point though is that the database backup server should be kept on another site or location. This could be outside building premises or perimeters or it could also be inside the business facility but is kept on a more secure room or building. This is to ensure the safety of valuable information that would lead to business continuity as well.
18 18 Business Continuity and Disaster Recovery Roles Intertwined Business continuity relies on disaster recovery. In difficult and inevitable times when business continuity is at stake due to hindrances and threats by internal and external forces, a wellplanned disaster recovery process is the answer. Such incidents happen commonly on computer systems as the demand to supply IT solutions to most business operations has been apparent over the past several years. Though there is a high level of reliability compared to using the good old manual way of doing things, still there is a need to have business continuity plan or disaster recovery plan. Such systems have their own boundaries or limitations as well, no matter how advanced or complex they are. There will come a time when certain risks will be presented. Therefore constant maintenance and cautious analysis are needed to support such systems. Here are certain precautionary measures that will help ease the pain of losing vital information for larger and more critical computer systems. First is to develop a well written business continuity plan (BCP) or disaster recovery plan (DRP). These processes are essential in making sure that it will be business as usual amidst of encountering a disruptive event. Second is to properly delegate a team of individuals with specific duties and responsibilities, with an accompanying backup plan to support others in carrying out specific tasks. Highly trainable individuals with a vast understanding on how computer system works are definitely an advantage. And lastly, determine the software systems and hardware devices that are susceptible to replacements when disaster strikes. A backup location for database use should also be identified to ensure business continuity.
Outsourcing Workbook Page 1 Copyright 2008 Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by any means, electronic, mechanical, photocopying, recording,
ISMS User s Guide for Medical Organizations Guidance on the Application of ISMS Certification Criteria (Ver.2.0) ISMS: Information Security Management System 8 November 2004 Japan Information Processing
Common Sense Guide to Cyber Security for Small Businesses Recommended Actions for Information Security 1 st Edition March 2004 Internet Security Alliance Officers Dr. Bill Hancock, Chairman, ISAlliance
The Data Recovery Solution A White Paper by ONTRACK Data Recovery, Inc. Contents Data Loss Dangers... one Critical Data Risks... two Challenges and Responsibilities... three Protection, Detection, Correction...
V 1.0 November, 2010 CYBERSECURITY The protection of data and systems in networks that connect to the Internet 10 Best Practices For The Small Healthcare Environment Your Regional Extension Center Contact
5-02-15 INFORMATION MANAGEMENT: STRATEGY, SYSTEMS, AND TECHNOLOGIES CONTINGENCY PLANNING FOR SMALL- TO MEDIUM-SIZED BUSINESSES Andres Llana, Jr. INSIDE Upper Management s Role; Delegating Responsibilities;
Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:
Credit value:? Unit 3 Information systems 3 Information systems Organisations can exploit information to do better at planning, monitoring and controlling their business activity. However, it is easy to
CHAPTER 7 Information and communications technology (ICT) in small business WHY IT IS IMPORTANT We are currently living through a massive revolution in communications. Even in your lifetime so far, you
SYMANTEC ServiceDesk Customization Guide 7.0 Symantec ServiceDesk 7 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
Standards for Internal Control in New York State Government October 2007 Thomas P. DiNapoli State Comptroller A MESSAGE FROM STATE COMPTROLLER THOMAS P. DINAPOLI My Fellow Public Servants: For over twenty
Internet service provider 24 Success Secrets - 24 Most Asked Questions On Internet service provider - What You Need To Know Copyright by Dennis Wilkinson Notice of rights All rights reserved. No part of
BEST PRACTICES: EVENT LOG MANAGEMENT FOR SECURITY AND COMPLIANCE INITIATIVES IN THE EUROPEAN UNION By Ipswitch, Inc. Network Managment Division www.whatsupgold.com July 2010 Table of Contents Executive
HIPAA Security Risk Analysis Toolkit In January of 2013, the Department of Health and Human Services Office for Civil Rights (OCR) released a final rule implementing a wide range of HIPAA privacy and security
2008 by Bundesamt für Sicherheit in der Informationstechnik (BSI) Godesberger Allee 185-189, 53175 Bonn Contents Contents 1 Introduction 1.1 Version History 1.2 Objective 1.3 Target group 1.4 Application
ICC CYBER SECURITY GUIDE FOR BUSINESS ICC CYBER SECURITY GUIDE FOR BUSINESS Acknowledgements The ICC Cyber security guide for business was inspired by the Belgian Cyber security guide, an initiative of
Cyber-Security Essentials for State and Local Government Best Practices in Policy and Governance Operational Best Practices Planning for the Worst Case Produced by with content expertise provided by For
White Paper Implementing Your Help Desk A Practical Guide Implementing A Help Desk Implementing a Help Desk may sound either remarkably easy or terribly difficult, depending on who is pitching the solution.
Business Succession Planning Guide NOTE: This book provides only a basic overview on the subject of succession planning and the publisher makes no warranties as to the accuracy of information as it relates
Cloud Computing: Public, Private, and Hybrid You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds. And you ve got questions:» What are the differences between Public
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Operation Outsourcing By Andrew J. Levinson www.operationoutsourcing.com Copyright 2010 Operation Outsourcing Disclaimer Legal Notice: - The author and publisher of this report and the accompanying materials
Things you need to know and do to operate safely online An initiative of the Australian Government that brings together existing resources, tools and websites to help small businesses understand and manage
The Small Business The First Steps to Doing Business Online Joe Ebner he first question often asked by small business owners just like you who want to go online with their business is what do I need to
Internet Security Essentials for Business 2.0 U.S. CHAMBER OF COMMERCE 1615 H Street, NW, Washington, DC 20062 www.uschamber.com firstname.lastname@example.org The STOP. THINK. CONNECT. messaging convention