Questions? Contact Us


Latest News

Featured News & Events

Five must-haves in any disaster recovery plan

In January the United States saw some of the coldest temperatures on record, an earthquake outside of San Francisco, and mudslides in California. Those Mother Nature events probably didn't affect anyone's computer up time, but they could have. Cold temps produce ice which can break trees and cause damage to equipment; earthquakes can topple buildings; and mudslides can destroy everything in its path. These are just a few reasons why every business needs a disaster recovery plan.

You may say, "but I back up my data and I already have a business continuity plan." 

A disaster recovery plan (DRP) works with backed up data and is typically part of a business continuity plan. A DRP is a business plan that outlines how an organization can resume work quickly after a disaster.

While a lot can go into a DRP, there are several key elements that are must-haves if a company is to succeed in quickly getting back to business after a debilitating incident. Those include:

  • A Business Impact Assessment (including recovery point objective and recovery time objective). The best way to prepare for a disaster is to understand the effect it might have on your business. An assessment includes concrete items such as loss of sales and income, increased expenses, lowered customer satisfaction and delayed business plan execution. When assessing the impact, you also need to consider elements outside your control that will affect how quickly you are functioning again, such as your supply chain, utility and telecommunications interruption, or restricted building access. As you do your impact assessment, you also need to identify a point of recovery and how long it will take to get there. In IT, this could be the last time the server was backed up. How long it takes will depend. For example, an IT system may be back up and running in a short period of time compared to the physical re-opening of a building if there is damage.
  • Knowing vendor policies. Be aware and understand what any of your service provides have in their contracts regarding up-time and response time. It may seem like you're the only one affected in the time of disaster, but we all know that's never the case. As noted above, vendors and partners that help make your business run also could be affected. Make sure you understand your contracted up-time and the response time of your service providers. This will directly play into your own DRP.
  • Clear step-by-step instruction. A DRP is not a document that should leave any questions or room for interpretation. It should be painstakingly detailed and very clear. Testing the plan (see below) will help to determine if you have accounted for the clarity required so that everyone knows his or her responsibility and expected action or reaction to the situation.
  • Outlining communications processes. Knowing how and to whom to communicate should be clearly outlined in a DRP. Being proactive here can help. For example, if there is a storm coming, you could advise employees and customers a day or two before the storm hits that the office will be open or closed. For disasters where there is no warning, there should be clear instructions in the DRP for what employees should. The guidance could be to meet at a predetermined spot. If it's to check in on Facebook or dial a hotline, it will require employees to get connected electronically as soon as possible. Company websites also should be updated (potentially on the backup servers) to reflect the status of the office. When communicating with the media in a disaster situation, limit your spokespeople to just one or two executives. No one else should be speaking publicly about the company during a disaster scenario.
  • Testing your plan. A disaster is not the time to see if your DRP works. Organizations must regularly and fully test their plan end-to-end to ensure recovery operations are fulfilled and everyone knows his or her role and responsibility.

Finally, review the plan often. The corporate pace of change is rapid and it's easy to outgrow a DRP within a year or less. As your organization changes, you must update your DRP to reflect the changes to your business.

As a service provider, ZZ Servers does everything possible to keep its customers up and running in times of disaster. From backup generators to cots and MREs for employees who might have to support the operation 24x7, ZZ Servers is committed to your business during normal operations and when there are emergencies. 

Can your business pass the data privacy test?
Tips for Optimizing PCI Compliance

Related Posts


Tag Cloud

intrusion detection computer networks National Cyber Security Awareness Month openssl windows 7 Health Insurance Portability computer security eCommerce Solutions sender policy Internet Corporation employee training qsa Online Business Credit Cards physical IT password trends Credit Card Security apache compliance support data breach anti virus compliant hosting Internet infrastructure spf multi-factor authentication blackberry ICANN HIPAA Solutions dss assesment OSSEC search cyber monday vps vyatta router firewall filter security PCI HIPAA Sysadmin QSA Continuous Monitoring business solitions cyber monitoring command line SSL BSides PCI Data Security Standards healthcare solutions Car Hacking backup solutions Business Solutions shared hosting network GDPR dsbl shared secure hosting arduino physical security TLS cyber protection motivation Assigned Names logical security Cybersecurity Business Solutions Xen World Backup Day cli businesses Domani Names Medical Records InterWorx information technology spam VPS Servers data protection Presentation IT security Cybersecurity business solutions PCI compliance hosting control panel two factor authentication business community members area smartphone email accounts pci complliant hosting black friday shared server Business Planning security Small Business IT services follow.The HIPAA Privacy Rule caller-id HIPAA solutions PCI DSS 3.2 shared folders passwords credit card Linux permissions PCI Audit Geekend PCI Solutions health care providers safe computing credit cards stolen Home Depot Breach Debian PCI Hosting Payment Card Industry IT solutions bash amazon ec2 cloud Firetalk DEF CON personal information infrastructure Security security circles video ipad cell phone email Control Panel HIDS David Zendzian IT Services Interworx-CP protect data social engineering cybersecurity Accountability Act phishing attacks cyber security Hosting embedded HIPAA CentOs change PCI TiaraCon ZZ Servers Medical Solutions Information Technology education kerio PCI Compliance Health Care Cybersecurity spoofing Compliance data privacy ZZ Servers Co-Founder Email mail server Cloud Computing Windows phishing activesync credit card payment Ubuntu Disaster Recovery Plan business small business Web Hosting cyber recovering data cyber liability insurance INFOSEC IT Solutions exchange Shmoocon log files PCI Service Provider lamp Server Mangement management Las Vegas DRP Healthcare Records Reports vulnerability scanning Announcement HIPPA Internet teensy eCommerce Alarm malicious software Charleston Hackers computing in the cloud iphone Vulnerability Zendzian