How Small/ Mid Size Companies Can Protect Their Business. Introduction



Similar documents
Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business.

DISASTER RECOVERY PLANNING GUIDE

Business Continuity and Disaster Survival Strategies for the Small and Mid Size Business

Managed IT Services:

Read this guide and you ll discover:

Technology Solutions That Make Business Sense. The 10 Disaster Planning Essentials For A Small Business Network

ICT Disaster Recovery Plan

Program: Management Information Systems. David Pfafman 01/11/2006

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

Business Continuity and Disaster Recovery Planning from an Information Technology Perspective

MAXIMUM PROTECTION, MINIMUM DOWNTIME

Availability and Disaster Recovery: Basic Principles

Disaster Recovery Remote off-site Storage for single server environment

courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview f5 networks P

Aljex Software, Inc. Business Continuity & Disaster Recovery Plan. Last Updated: June 16, 2009

What You Should Know About Cloud- Based Data Backup

The 10 Disaster Planning Essentials For A Small Business Network

About Dorset Connects

FiVE FATAL MYTHS ABOUT DATA BACKUP. Businesses have become dependent upon their computers and the data residing on them. This data is their lifeblood.

10 STEPS TO BUSINESS CONTINUITY

Cloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud

Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 13 Business Continuity

One major business challenge is maintaining and improving the efficiency and effectiveness of a company s information technology. Wouldn t it be nice

Leverage The Cloud, Bulletproof Your Data, Manage Your Documents, Spare Your Wallets. Presented By Ilene Rosoff, CEO The Launch Pad

The 10 Disaster Planning Essentials For A Small Business Network

Westek Technology Snapshot and HA iscsi Replication Suite

Chapter 7 Information System Security and Control

Contract # Accepted on: March 29, Starling Systems. 711 S. Capitol Way, Suite 301 Olympia, WA 98501

HOW SAFE IS YOUR DATA??

This white paper describes the three reasons why backup is a strategic element of your IT plan and why it is critical to your business that you plan

Leveraging Virtualization for Disaster Recovery in Your Growing Business

Disaster Recovery for Small Businesses

Nine Steps to Smart Security for Small Businesses

Proactive. Professional. IT Support and Remote Network Monitoring.

Introduction. Read on and learn some facts about backup and recovery that could protect your small business.

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY

Desktop Solutions SolutioWhitepaper

SYMANTEC 2010 SMB INFORMATION PROTECTION SURVEY. Symantec 2010 SMB Information Protection Survey. Global Data

Birkenhead Sixth Form College IT Disaster Recovery Plan

Information Security Management: Business Continuity Planning. Presentation by Stanislav Nurilov March 9th, 2005 CS 996: Info. Sec. Mgmt.

Ensure Absolute Protection with Our Backup and Data Recovery Services. ds-inc.com (609)

12 Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service

THE NEXT GENERATION OF DATA INSURANCE

Disaster Recovery Planning Procedures and Guidelines

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Let s Build a Better Backup

12 Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service

Expecting the Unexpected. Disaster Preparedness Strategies for Small Business

Data Protection History, Evolution, Best Practices By Global Data Vault

Chapter 15: Computer Security and Privacy

Interactive-Network Disaster Recovery

The 7 Disaster Planning Essentials

Disaster Recovery: Helping Non-Profits to Plan, Prepare & Recover. By: Lynn Do

KEEPING PATIENT INFORMATION SAFE AND SECURE IN THE CLOUD

Constructing a successful business continuity plan

What is the Cloud, and why should it matter?

GOVERNMENT FINANCE OFFICERS ASSOCIATION OF MISSOURI SPRING 2012 CONFERENCE IT DISASTER PLAN

Main Reference : Hall, James A Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

EMERGENCY PREPAREDNESS PLAN Business Continuity Plan

WHAT IS DISASTER RECOVERY

FORMULATING YOUR BUSINESS CONTINUITY PLAN

TOP TEN TIPS FOR IT DISASTER RECOVERY PLANNING

How To Choose An Online Backup Solution

Draft ICT Disaster Recovery Plan

EXIN Information Security Foundation based on ISO/IEC Sample Exam

Disaster Recovery Plan (DRP) / Business Continuity Plan (BCP)

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

7 Critical Facts Every Business Owner Must Know About Protecting Their Computer Network From Downtime, Data Loss, Viruses, Hackers and Disasters

MaximumOnTM. Bringing High Availability to a New Level. Introducing the Comm100 Live Chat Patent Pending MaximumOn TM Technology

HA / DR Jargon Buster High Availability / Disaster Recovery

Business Continuity Planning in IT

Don't Wait Until It's Too Late: Choose Next-Generation Backup to Protect Your Business from Disaster

Can Your Business Survive Application Downtime?

12 Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service

IF DISASTER STRIKES IS YOUR BUSINESS READY?


WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

REMOTE BACKUP-WHY SO VITAL?

12 Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service

5 DEADLY MISTAKES THAT BUSINESS OWNERS MAKE WITH THEIR COMPUTER NETWORKS AND HOW TO PROTECT YOUR BUSINESS

Managed IT Services. Eliminating technology pains for small businesses

Identifying & Managing IT Risks to Your Business

Q uick Guide to Disaster Recovery Planning An ITtoolkit.com White Paper

Managing business risk

A Study on Cloud Computing Disaster Recovery

The Essential Guide for Protecting Your Legal Practice From IT Downtime

Guardian365. Managed IT Support Services Suite

BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS. Disasters happen. Don t wait until it s too late.

Frequently Asked Questions about Cloud and Online Backup

Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its

Security Basics: A Whitepaper

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them

Webrecs IT infrastructure. The Webrecs IT backend explained and how we store, backup, protect and deliver your documents to you

Managed IT Services. Eliminating technology pains for small businesses

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

How To Understand Cloud Computing

How to Design and Implement a Successful Disaster Recovery Plan

Planning and Deploying a Disaster Recovery Solution

Transcription:

Be Prepared How Small/ Mid Size Companies Can Protect Their Business By Sean W. O Donnell, President, Datacor, Inc. Introduction Recent disasters have brought the need for organizations to focus on business continuity plans. Although, many businesses recognize the need for a disaster recovery program, they don't always know where to begin or who to turn to for expertise. The key is to prepare a strategy before a disaster happens so that you have a program in place when calamity occurs. As Duke Basketball Coach Mike Krzyzewski tells it in his new book, Beyond Basketball: Coach K s Keywords for Success, If you plan to manage a crisis when the time comes, it is already too late to establish the communication and trust that should already exist among members of your team. Most people tend to think of disasters in terms of major catastrophic events such as hurricanes, floods, or terrorist attacks but many smaller events can interrupt your business and be equally as devastating. We characterize a disaster as any event that causes destruction or distress of any kind to your business. In this white paper, we will focus on the impact of these disasters on your technological infrastructure. We will detail the steps you should consider to ensure your business is prepared and secure in case of a disaster.

Planning How do we successfully prepare for a disaster? Smart companies recover quickly from disasters because they plan for them before they happen. Effective recovery focuses on business continuity planning or how do I keep making money and running my business when events interfere with my normal operations? A couple of the fundamental functions that you need to do are: take orders, enter them into your computer system, pick them, print Bills of Lading, put the products on the trucks, and invoice customers. Key Considerations: 1. What do you do when your entire network and system goes down because your server is failing? 2. How do you minimize the time between recognition of the problem and either fixing it or deploying an alternative option? 3. What are the types of disasters that cause these problems? Disasters come in two different categories: ones that are out of our control and others that are self-inflicted. Disasters such as hurricanes, terrorist attacks, or faulty equipment are beyond our control. Our recovery plan involves responding to the disaster so that we get our business up and running quickly. Disasters such as viruses are self-inflicted; we bring them on ourselves by not installing virus and spy ware filters. These kinds of disasters can be anticipated and prevented through advance planning. In devising a disaster plan, five factors should be used in your evaluation: type, probability, impact, risk and cost. Determining the type of disaster influences your response. Localized disasters that only impact one person or department are considered minor. While disasters that impact the entire organization are major. Spilling water on your laptop is a minor type problem while a network or application outage or computer virus can cause a major disruption to your business affecting profitability and customer satisfaction. A disaster s probability should also be considered. Many of the likely occurrences, such as a hard drive failing, have a high probability, while major catastrophes such entire network failures occur less frequently. Understanding how the disaster will impact your ability to continue your operations and make money is critical. If your e-mail system goes down for a few hours, it is an inconvenience. On the other hand, if your communications and applications are down, the impact is more severe. Be sure to assign a priority level on business processes that are mission critical, important or minor in devising your plan. Another key factor is the amount of risk you are willing to absorb and the amount of money you are willing to pay to offset this risk. The goal is to create a plan where your business is reasonably protected without overspending. Perform a cost-risk analysis on every possible disaster-recovery scenario. You need to reach an equilibrium level between the risk and cost/benefit of each solution.

Possible Targets and Solutions The next task is to identify specific areas within your business with disaster potential and focus on possible solutions. Some examples include: stealth data breaches, parts malfunction/machine failure, and destruction of environment. 1. Stealth breaches occur when data is stolen, destroyed, or altered, and include events such as worms, viruses, and spy ware. These types of disasters can be prevented and have a range of low-cost solutions including installation of anti-virus and anti-spy ware software. While stealth disasters can be caused by external intruders, most attacks on security originate from within the network. Stolen data is a major concern for companies and the trend is growing. More than 75 percent of hacking is perpetrated from inside, and for this reason, internal security should be tight and up-to-date. Tactics such as forced password changes, user identity, limited server access, and network restrictions, are inexpensive solutions. Other inexpensive solutions to breaches are firewalls, to protect you from hackers, and spam filters to prevent clogged email and servers. 2. Parts malfunction and machine failure should also be addressed because computer disk drives contain moving parts and carry a high probability of failure. A variety of solutions are available with a range of associated costs. The low-cost answer is backing up data using tapes, CDs, or other hard drives, while a medium-priced solution is mirrored drives where data is written to two drives simultaneously. If one drive fails, then you can continue to operate. You can change the failed hard drive without taking down the server. Disk space is relatively cheap. Another medium cost possibility is a third party back up service. Your data will be backed up by a third party every 15 minutes. It transfers only the data that has changed in the last 15 minutes reducing the amount of data going across the wire. For about $100 per month, you get five gigs of storage space and your hard drive is backed up frequently by an off-site third party. The high cost option is to have replication to another machine either within your local network or remotely to another machine giving you complete redundancy.

Possible Targets and Solutions 3. Another potential disaster is destruction of your business environment. Though the probability is low, the impact is enormous. About 93 percent of companies who lose their data center access for ten days or more file bankruptcy within a year. Resurrecting your data center and continuing your operations is paramount to your company s survival. Many solutions to this problem are available: you need to decide how much risk you are willing to absorb and how much you can afford to spend. Off-site storage of both data and applications and a plan to procure machines is the least costly plan. The medium priced solution involves utilizing spare machines combined with third party back up of data and applications. The medium-high priced solution is the realtime replication of applications and data where the network is duplicated across sites. The most expensive option is a third-party hot site. This scenario replicates your environment allowing you to cut over to their site if your site goes down. Other Critical Issues Many disaster recovery plans focus on the data center and fail to consider remote sites, sales force computers, email servers, and people. Make sure that your plan is comprehensive and not restricted to only one segment of your business. For instance, people are our most treasured resource. When disaster strikes, you should have a plan in place to get in touch with employees, make sure your staff is safe, and ensure personnel return to work. Outline the responsibilities of each person during the disaster and ascertain that they have the knowledge and the proper security to bring your system back in operation. A common mistake is putting all responsibility and knowledge about your network in the hands of one person. As owners of the company, make sure that your id and password have administrative rights.

Implementation How do you go about implementing your company s disaster recovery plan? 1. Review your infrastructure and network for possible weaknesses. 2. Perform an accurate inventory of your equipment and versions of your software. Since most companies use a variety of software products and depend on them all working together, version accuracy can make or break the recovery. 3. Identify possible disasters, and analyze type, probability, impact, risk, and cost. Use common sense to create a plan for each disaster. If you have a plan that is reasonable, you will be able to sleep at night. As Coach K points out, Luck favors those who have spent their preparation time building effective systems. ABOUT THE AUTHOR This article was written by Sean W. O Donnell, President of Datacor, Inc., a company specializing in software, services, and business solutions for the chemical industry since 1981. Using more than 26 years of experience, Datacor has developed a range of software products, including Chempax, echempax, Traveler, and Labelpax, to meet the unique requirements that exist within the chemical industry arena. The company s CTS division services customer infrastructure requirements such as hardware, networking, and disaster recovery. Visit www.datacor.com, phone 973-822-1551, or email swodonnell@datacor.com for more details.