SlideShare une entreprise Scribd logo
1  sur  58
Télécharger pour lire hors ligne
“Irene, Sandy,
Tornadoes, Oh My!
How to make sure your
business can survive!”
Meet Lauren
• Needed a “Real” Job
• 3 ‘Down-sizes’ in a 5 year span
• 2005 Groff NetWorks was born
• 8 years later: 8 employees and
dedicated to 35 companies.
Introductions
• Tell us who you are and where you
are from.
• What is the one thing you would
like to learn during today’s
seminar?
Partnerships
What are we talking about?
“Irene, Sandy, Tornadoes, Oh My!
How to make sure your business can
survive!”
What you will learn today
• The differences between Backup, Disaster Recovery
and Business Continuity
• Types of disasters, their frequency and severity
• Why you should be afraid…very afraid
• The easiest way to insure your data isn’t lost
• How to put your backup on autopilot with complete
confidence that it works
SANDY
What’s the goal?
• Make sure you never lose critical data
• Minimize downtime
• Recover as quickly as possible in the
event of a disaster
Why is this important?
• Of companies
experiencing a major
loss of data
• 25% to 43% never
reopen
• 51% close within two
years of the loss
• A mere 6% survived over
the long term
Why is this important?
• Small businesses account for
• More than 99% of companies with employees
• 50% of all private sector workers
• Nearly 45% of the nation’s payroll
• Commitment to planning today will help support
employees, customers, the community, the
local economy and the country
Business Continuity
. . . An ongoing process to ensure that the necessary
steps are taken to identify the impact of potential
losses and maintain viable recovery strategies,
recovery plans, and continuity of services.
Special Guest
• Geoff Turner, Tech Valley
Continuity
What is Business Continuity Planning?
Ongoing process
designed to eliminate
or mitigate the
negative impact of
events that disrupt
normal business
activities.
NYS Disaster Declarations Since 2002
Disaster Type Count
Earthquake 1
Ice Storm 1
Power Outage 1
Severe Storms and Flooding 12
Severe Winter Storm 8
Tropical Storm / Hurricane 5
Tornadoes / High Winds 3
Grand Total 31
Most Disasters Are Not “DISASTERS”
• Power Outages
• Computer Failure
• Telephone Outages
• Water Pipe Leakage
• Facility Fire
• Information Breach
• Supply Chain Issues
NYS Information Breaches 2005-2012
• NYS = 11.4% of U.S. Breaches
20% Lost or Stolen Laptops
12% Unintentional Disclosure
12% Lost or Stolen Paper Documents
10% Stolen PCs or Hard Drives
10% Hacking
8% Insider Release of Information
Symphony of Multiple Plans
• Emergency Response Plan
• Incident Management Plan
• Mutual Aid / Assistance
• Business Recovery Plan
• Business Reconstitution
Plan
• Communications Plan
• Logistics Plan
• Training / TESTING /
Evaluation Plan
Source: Microsoft
General Continuity Planning Process
• Form a Senior Management Team
• Form a Business Continuity Planning Team
• Assess Risks / Impacts
• Design Solutions
• Implement Solutions
• Document Recovery Strategies
• Train Recovery Teams
• TEST – TEST - TEST
Areas of Focus
• Information Technology
• Primary Mission Essential Functions
• Key Staff and Vendors
• Vital Records and Resources
• Alternate Facilities:
– People
– Computer Systems
• Telecommunications: Data and Voice
• Notification to clients, employees, stakeholders
Business Continuity Planning
• Most Companies Start With:
• Protecting their data and technology
infrastructure
Not Just About IT Issues
• Plan for immediate disaster response – including
safety of employees
• Identification of critical processes
• Review insurance coverage
• Disaster prevention
• Key suppliers/service providers.
Where to Begin?
• Vulnerability Assessment
• Probability
• Potential Impact
• List potential threats considering
• History
• Geography
• Technology
• Building Characteristics
Human Errors
• Unintentional actions taken by
managers and employees acting in
good faith
• Most common causes
• Inadequate user training
• Fatigue
• Carelessness
Equipment Failures
• Malfunction or complete failure of office
machinery
• Servers
• Desktops or laptops
• Fax machines
• Phone systems
• Network components
• Expect this type of failure at some time
Third-Party Failures
• Service delivery failures
• Electrical power
• Phone service
• Internet service
• Financial disasters
• Default of large customer
• FDIC bank closure
Environmental Hazards
• Denial of access due to
• Smoke from nearby fire
• Hazardous substances in building
• Irritants such as
• Fresh paint
• Radioactive, biological or chemical
substances
Fires and Other Disasters
• Natural events
• Earthquakes
• Tornados, floods
and storms
• Man-made disasters
• Gas leaks
• Water pipe leaks
Joplin
Albany
Other Natural Disasters
• A close call for a lot of people
• What if this one hit?
Terrorism and Sabotage
• Intentional, systematic, planned and
organized
• Based on malicious intent
• Possibility of very concentrated damage with
relatively little effort
• Perpetrated by
• Terrorists
• Computer hackers
• Disgruntled employees
Understand Your Risks
Groff NetWorks-11 State Street, Troy NY
Evaluate Each Disaster Based on -
• Probability of occurrence
• Impact
• Human - possibility of death or injury
• Property – cost of repair/replacement
• Business – potential interruption of
operation
• Ability to respond
• Internal resources
• External resources
Vulnerability Assessment
0
1
2
3
4
5
6
7
8
9
10
Probability
Impact
Key Concepts
• Recovery Time Objective – RTO
• How long can your business survive before
you have to be operational to remain in
business?
• Recovery Point Objective – RPO
• How old can your data be and still have value?
Disaster Timeline
14 days 7 days 2 days 1 hour 1 day 2 days
Disaster Recovery
. . . Is the process, policies and
procedures of restoring operations
critical to the resumption of
business after a disaster.
Backup
• Copying your data to a safe medium
for recovery in the event of data loss
due to disaster
• Protection from some disasters, like
fire or flood, requires two-step
backup
• Backup (locally)
• Transfer (off-site)
Traditional Backup Methodology
• Backup is performed nightly
• Someone must remove the media and
replace it with tonight’s media
• Two-step backup accomplished by
‘sneakernet’
• Relies on your staff to make sure that
backup is working
• Single snapshot per day
Backup to Tape
• Slow
• Media degrades over time and is greatly
affected by the environment
• Tape drive is expensive
• Additional capacity is difficult to add
• Formats are typically proprietary – must
have same type of drive and same
software to restore
Move to Disk Based Backup
Removable Hard Drives
• Backup and restore times are much
faster
• Capacity is easily increased
• Solutions may use standard Windows
file systems
• Still requires user interaction
• Not as convenient to carry offsite
Offsite Backup
• Does not require user interaction
• Capacity easily increased
• Automated
BUT…
• Data only
• Slow recovery times
Here’s the problem…
We think a good backup
is good enough.
Criteria For A Solid Backup System
• Take the human element out of the equation
• Make sure ALL files are backed up
• Automated and easy
• Intra-day backups
• No impact on day-to-day operations
• Fast restores – and to dissimilar hardware
Criteria For Off-Site Backup
• Secure data transfer
• Secure data storage
• Ability to receive data overnight
• Ability to send initial backup on hard drive
• Geographically separate from you
• Low cost off-site storage
• Regulatory compliance – HIPAA, SOX, GLBA
Questions to ask
• How much revenue, gross AND net, do
you generate?
• How many employees do you have,
what is their cost?
• How much of that is facilitated, or even
dependent, on your IT infrastructure?
Questions to ask
• How will a failure – even a short lived
failure – be perceived by your customers
and your employees?
• How quickly can you recover lost files?
• If a server fails, how long will it be before
you are back up and running…how much
opportunity cost would this represent?
Could you survive . . . ?
Could you survive . . . ?
• I think she may be getting fired for this!
Does your backup do this?
• Meets multiple regulatory requirements
• Addresses the BC, DR and B
• Utilizes Server hardware
8 Reasons Why You Need To
Replace Your Current Backup
1. Near Real-Time Backups
– – As frequently as every 15 minutes
2. Complete Image
– – Backs up your entire server including
open files
3. Restores that are Intuitive, Flexible
and Fast
8 Reasons Why You Need To
Replace Your Current Backup
4. Secure Bandwidth Throttling
Transfer
5. Secure Remote Storage
6. Monitored and Verified 24x7
8 Reasons Why You Need To
Replace Your Current Backup
7. Virtualization
• Server Fails
• NAS Virtualizes Server
• One hour or less
• No reconfiguration necessary
• Backups Continue
8 Reasons Why You Need To
Replace Your Current Backup
8. Overnight Disaster Recovery
• Replacement appliance delivered with most
recent off-site image(s) of your server(s)
• Business can be back up and running within 24
hours
• And, now with Cloud server failover, you could
be running in the matter of hours if you were to
lose your facility!
How it works
Our Clients. . .
• “The Arsenal Partnership is very
pleased with Groff NetWorks. Groff
NetWorks’ staff is very helpful and the
technicians are extremely
knowledgeable. Their quick response
to address our various IT requests has
been refreshing.” – Doreen Dean,
Administrative Assistant, Arsenal
Business & Technology Partnership
Our Clients. . .
“Groff NetWorks is prompt, friendly,
and most importantly, honest. They
really do a great job.” - Donna
Gutzwiller, Office Manager, Audio
Visual Sales & Service
Questions?

Contenu connexe

Tendances

Designing Cloud Backup to reduce DR downtime for IT Professionals
Designing Cloud Backup to reduce DR downtime for IT ProfessionalsDesigning Cloud Backup to reduce DR downtime for IT Professionals
Designing Cloud Backup to reduce DR downtime for IT ProfessionalsStorage Switzerland
 
Runtime Protection in the Real World
Runtime Protection in the Real WorldRuntime Protection in the Real World
Runtime Protection in the Real WorldBrooks Garrett
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationAndrew Miller
 
Digitization solutions - A new breed of software
Digitization solutions - A new breed of softwareDigitization solutions - A new breed of software
Digitization solutions - A new breed of softwareUwe Friedrichsen
 
Solving 4 of Active Directory Management’s Biggest Problems with Simple Solut...
Solving 4 of Active Directory Management’s Biggest Problems with Simple Solut...Solving 4 of Active Directory Management’s Biggest Problems with Simple Solut...
Solving 4 of Active Directory Management’s Biggest Problems with Simple Solut...ScriptLogic
 
Do you have a DR plan in place: so, don't let a disaster defeat your business
Do you have a DR plan in place: so, don't let a disaster defeat your businessDo you have a DR plan in place: so, don't let a disaster defeat your business
Do you have a DR plan in place: so, don't let a disaster defeat your businessVelocity Technology Solutions
 
Mastering disaster e book Telehouse
Mastering disaster e book TelehouseMastering disaster e book Telehouse
Mastering disaster e book TelehouseTelehouse
 
Jan de Vries - Becoming antifragile is more important than ever in disruptive...
Jan de Vries - Becoming antifragile is more important than ever in disruptive...Jan de Vries - Becoming antifragile is more important than ever in disruptive...
Jan de Vries - Becoming antifragile is more important than ever in disruptive...matteo mazzeri
 
How do you create a more effective board?
How do you create a more effective board?How do you create a more effective board?
How do you create a more effective board?Computershare
 
Excavating the knowledge of our ancestors
Excavating the knowledge of our ancestorsExcavating the knowledge of our ancestors
Excavating the knowledge of our ancestorsUwe Friedrichsen
 
Deep Dive into Disaster Recovery in the Cloud
Deep Dive into Disaster Recovery in the CloudDeep Dive into Disaster Recovery in the Cloud
Deep Dive into Disaster Recovery in the CloudBluelock
 
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...TechSoup
 
Aice mar07 deming_workshop_master
Aice mar07 deming_workshop_masterAice mar07 deming_workshop_master
Aice mar07 deming_workshop_masterpaulgioia
 
Mastering disaster a data center checklist
Mastering disaster a data center checklistMastering disaster a data center checklist
Mastering disaster a data center checklistChris Wick
 
EDF2013: Invited Talk Daragh O'Brien: The Story of Maturity – How data in Bus...
EDF2013: Invited Talk Daragh O'Brien: The Story of Maturity – How data in Bus...EDF2013: Invited Talk Daragh O'Brien: The Story of Maturity – How data in Bus...
EDF2013: Invited Talk Daragh O'Brien: The Story of Maturity – How data in Bus...European Data Forum
 
Site Reliability Engineering: Harnessing (and redefining) it for ITSM
Site Reliability Engineering: Harnessing (and redefining) it for ITSMSite Reliability Engineering: Harnessing (and redefining) it for ITSM
Site Reliability Engineering: Harnessing (and redefining) it for ITSMJon Stevens-Hall
 
Webinar: Machine learning analytics for immediate resolution to the most chal...
Webinar: Machine learning analytics for immediate resolution to the most chal...Webinar: Machine learning analytics for immediate resolution to the most chal...
Webinar: Machine learning analytics for immediate resolution to the most chal...Melina Black
 
ICI Lunch and Learn Slides
ICI Lunch and Learn SlidesICI Lunch and Learn Slides
ICI Lunch and Learn SlidesTwinStrata, Inc
 

Tendances (20)

Designing Cloud Backup to reduce DR downtime for IT Professionals
Designing Cloud Backup to reduce DR downtime for IT ProfessionalsDesigning Cloud Backup to reduce DR downtime for IT Professionals
Designing Cloud Backup to reduce DR downtime for IT Professionals
 
Survivor - Disaster Recovery Edition
Survivor - Disaster Recovery EditionSurvivor - Disaster Recovery Edition
Survivor - Disaster Recovery Edition
 
Runtime Protection in the Real World
Runtime Protection in the Real WorldRuntime Protection in the Real World
Runtime Protection in the Real World
 
Varrow Madness 2014 DR Presentation
Varrow Madness 2014 DR PresentationVarrow Madness 2014 DR Presentation
Varrow Madness 2014 DR Presentation
 
Digitization solutions - A new breed of software
Digitization solutions - A new breed of softwareDigitization solutions - A new breed of software
Digitization solutions - A new breed of software
 
Solving 4 of Active Directory Management’s Biggest Problems with Simple Solut...
Solving 4 of Active Directory Management’s Biggest Problems with Simple Solut...Solving 4 of Active Directory Management’s Biggest Problems with Simple Solut...
Solving 4 of Active Directory Management’s Biggest Problems with Simple Solut...
 
Do you have a DR plan in place: so, don't let a disaster defeat your business
Do you have a DR plan in place: so, don't let a disaster defeat your businessDo you have a DR plan in place: so, don't let a disaster defeat your business
Do you have a DR plan in place: so, don't let a disaster defeat your business
 
Mastering disaster e book Telehouse
Mastering disaster e book TelehouseMastering disaster e book Telehouse
Mastering disaster e book Telehouse
 
Jan de Vries - Becoming antifragile is more important than ever in disruptive...
Jan de Vries - Becoming antifragile is more important than ever in disruptive...Jan de Vries - Becoming antifragile is more important than ever in disruptive...
Jan de Vries - Becoming antifragile is more important than ever in disruptive...
 
How do you create a more effective board?
How do you create a more effective board?How do you create a more effective board?
How do you create a more effective board?
 
Excavating the knowledge of our ancestors
Excavating the knowledge of our ancestorsExcavating the knowledge of our ancestors
Excavating the knowledge of our ancestors
 
Deep Dive into Disaster Recovery in the Cloud
Deep Dive into Disaster Recovery in the CloudDeep Dive into Disaster Recovery in the Cloud
Deep Dive into Disaster Recovery in the Cloud
 
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...
Webinar - Finding Local Tech Expertise and Support for Nonprofits and Librari...
 
Aice mar07 deming_workshop_master
Aice mar07 deming_workshop_masterAice mar07 deming_workshop_master
Aice mar07 deming_workshop_master
 
Mastering disaster a data center checklist
Mastering disaster a data center checklistMastering disaster a data center checklist
Mastering disaster a data center checklist
 
What if
What ifWhat if
What if
 
EDF2013: Invited Talk Daragh O'Brien: The Story of Maturity – How data in Bus...
EDF2013: Invited Talk Daragh O'Brien: The Story of Maturity – How data in Bus...EDF2013: Invited Talk Daragh O'Brien: The Story of Maturity – How data in Bus...
EDF2013: Invited Talk Daragh O'Brien: The Story of Maturity – How data in Bus...
 
Site Reliability Engineering: Harnessing (and redefining) it for ITSM
Site Reliability Engineering: Harnessing (and redefining) it for ITSMSite Reliability Engineering: Harnessing (and redefining) it for ITSM
Site Reliability Engineering: Harnessing (and redefining) it for ITSM
 
Webinar: Machine learning analytics for immediate resolution to the most chal...
Webinar: Machine learning analytics for immediate resolution to the most chal...Webinar: Machine learning analytics for immediate resolution to the most chal...
Webinar: Machine learning analytics for immediate resolution to the most chal...
 
ICI Lunch and Learn Slides
ICI Lunch and Learn SlidesICI Lunch and Learn Slides
ICI Lunch and Learn Slides
 

En vedette

แบบขอรับทุนการศึกษาสำหรับเด็กออทิสติกและเด็กที่มีความต้องการพิเศษมูลนิธิคุณพุ...
แบบขอรับทุนการศึกษาสำหรับเด็กออทิสติกและเด็กที่มีความต้องการพิเศษมูลนิธิคุณพุ...แบบขอรับทุนการศึกษาสำหรับเด็กออทิสติกและเด็กที่มีความต้องการพิเศษมูลนิธิคุณพุ...
แบบขอรับทุนการศึกษาสำหรับเด็กออทิสติกและเด็กที่มีความต้องการพิเศษมูลนิธิคุณพุ...KruKaiNui
 
работа с возрожениями
работа с возрожениямиработа с возрожениями
работа с возрожениямиFelix Morozovsky
 
Trade Certificate - Tafe
Trade Certificate - TafeTrade Certificate - Tafe
Trade Certificate - TafeTom Edgson
 
Broker Pattern Backbone of Distributed Processing
Broker Pattern Backbone of Distributed ProcessingBroker Pattern Backbone of Distributed Processing
Broker Pattern Backbone of Distributed ProcessingNilay Mishra
 
Daily mcx newsletter 25 july 2013
Daily mcx newsletter 25 july 2013Daily mcx newsletter 25 july 2013
Daily mcx newsletter 25 july 2013Richa Sharma
 
smAlbany 2013 cit, p&s, get linkedin or left behind 070913-1
smAlbany 2013 cit, p&s, get linkedin or left behind   070913-1smAlbany 2013 cit, p&s, get linkedin or left behind   070913-1
smAlbany 2013 cit, p&s, get linkedin or left behind 070913-1Liberteks
 

En vedette (14)

Tqm
TqmTqm
Tqm
 
Zooming In and Out: Explorations of HIV risk, Responsibility, Intimacy and Love
Zooming In and Out: Explorations of HIV risk, Responsibility, Intimacy and LoveZooming In and Out: Explorations of HIV risk, Responsibility, Intimacy and Love
Zooming In and Out: Explorations of HIV risk, Responsibility, Intimacy and Love
 
แบบขอรับทุนการศึกษาสำหรับเด็กออทิสติกและเด็กที่มีความต้องการพิเศษมูลนิธิคุณพุ...
แบบขอรับทุนการศึกษาสำหรับเด็กออทิสติกและเด็กที่มีความต้องการพิเศษมูลนิธิคุณพุ...แบบขอรับทุนการศึกษาสำหรับเด็กออทิสติกและเด็กที่มีความต้องการพิเศษมูลนิธิคุณพุ...
แบบขอรับทุนการศึกษาสำหรับเด็กออทิสติกและเด็กที่มีความต้องการพิเศษมูลนิธิคุณพุ...
 
Cengroup
CengroupCengroup
Cengroup
 
Challenges of Reproductive Health in Complex Emergencies
Challenges of Reproductive Health in Complex EmergenciesChallenges of Reproductive Health in Complex Emergencies
Challenges of Reproductive Health in Complex Emergencies
 
работа с возрожениями
работа с возрожениямиработа с возрожениями
работа с возрожениями
 
Safe, Legal, and Rare? An update on abortion around the world
Safe, Legal, and Rare? An update on abortion around the worldSafe, Legal, and Rare? An update on abortion around the world
Safe, Legal, and Rare? An update on abortion around the world
 
Legal Issues Regarding Safety of Performers in the Adult Film Industry
Legal Issues Regarding Safety of Performers in the Adult Film IndustryLegal Issues Regarding Safety of Performers in the Adult Film Industry
Legal Issues Regarding Safety of Performers in the Adult Film Industry
 
Trade Certificate - Tafe
Trade Certificate - TafeTrade Certificate - Tafe
Trade Certificate - Tafe
 
Broker Pattern Backbone of Distributed Processing
Broker Pattern Backbone of Distributed ProcessingBroker Pattern Backbone of Distributed Processing
Broker Pattern Backbone of Distributed Processing
 
Africa, the West and the Fight Against AIDS
Africa, the West and the Fight Against AIDSAfrica, the West and the Fight Against AIDS
Africa, the West and the Fight Against AIDS
 
Misconceptions about AIDS in Africa: Ours and Theirs
Misconceptions about AIDS in Africa: Ours and TheirsMisconceptions about AIDS in Africa: Ours and Theirs
Misconceptions about AIDS in Africa: Ours and Theirs
 
Daily mcx newsletter 25 july 2013
Daily mcx newsletter 25 july 2013Daily mcx newsletter 25 july 2013
Daily mcx newsletter 25 july 2013
 
smAlbany 2013 cit, p&s, get linkedin or left behind 070913-1
smAlbany 2013 cit, p&s, get linkedin or left behind   070913-1smAlbany 2013 cit, p&s, get linkedin or left behind   070913-1
smAlbany 2013 cit, p&s, get linkedin or left behind 070913-1
 

Similaire à smAlbany 2013 gn bdr pp

EarthLink Business - Business Continuity
EarthLink Business - Business ContinuityEarthLink Business - Business Continuity
EarthLink Business - Business ContinuityMike Ricca
 
Think You've Tested Your DR Plan? Think again!
Think You've Tested Your DR Plan? Think again!Think You've Tested Your DR Plan? Think again!
Think You've Tested Your DR Plan? Think again!Hostway|HOSTING
 
Business-Critical Backup: Preparing for a Disaster
Business-Critical Backup: Preparing for a DisasterBusiness-Critical Backup: Preparing for a Disaster
Business-Critical Backup: Preparing for a DisasterNetWize
 
Protect and Save your firm from data loses caused by disasters
Protect and Save your firm from data loses caused by disastersProtect and Save your firm from data loses caused by disasters
Protect and Save your firm from data loses caused by disastersJasmine Mawii
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planningAureusIT
 
DR in the Cloud: Finding the Right Tool for the Job
DR in the Cloud: Finding the Right Tool for the JobDR in the Cloud: Finding the Right Tool for the Job
DR in the Cloud: Finding the Right Tool for the JobHostway|HOSTING
 
Boca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game PlanBoca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game PlanErick Solms
 
End user business-continuity.pptx datto slide
End user business-continuity.pptx datto slideEnd user business-continuity.pptx datto slide
End user business-continuity.pptx datto slideLaura Breese
 
Simplitfy - Guarding your Data
Simplitfy - Guarding your DataSimplitfy - Guarding your Data
Simplitfy - Guarding your DataErick Solms
 
The Building Block for Business Continuity & Disaster Recovery
The Building Block for Business Continuity & Disaster RecoveryThe Building Block for Business Continuity & Disaster Recovery
The Building Block for Business Continuity & Disaster RecoveryCarbonite
 
[@IndeedEng] Redundant Array of Inexpensive Datacenters
[@IndeedEng] Redundant Array of Inexpensive Datacenters[@IndeedEng] Redundant Array of Inexpensive Datacenters
[@IndeedEng] Redundant Array of Inexpensive Datacentersindeedeng
 
Webinar: Microsoft Azure-2016-10-19
Webinar: Microsoft Azure-2016-10-19Webinar: Microsoft Azure-2016-10-19
Webinar: Microsoft Azure-2016-10-19TechSoup
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security OperationsSam Bowne
 
Cloud Based Disaster Recovery (DRaaS)
Cloud Based Disaster Recovery (DRaaS)Cloud Based Disaster Recovery (DRaaS)
Cloud Based Disaster Recovery (DRaaS)PT Datacomm Diangraha
 
E2 evc 3-2-1-rule - mikeresseler
E2 evc   3-2-1-rule - mikeresselerE2 evc   3-2-1-rule - mikeresseler
E2 evc 3-2-1-rule - mikeresselerMike Resseler
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationSylCotter
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsSam Bowne
 

Similaire à smAlbany 2013 gn bdr pp (20)

EarthLink Business - Business Continuity
EarthLink Business - Business ContinuityEarthLink Business - Business Continuity
EarthLink Business - Business Continuity
 
Think You've Tested Your DR Plan? Think again!
Think You've Tested Your DR Plan? Think again!Think You've Tested Your DR Plan? Think again!
Think You've Tested Your DR Plan? Think again!
 
Business-Critical Backup: Preparing for a Disaster
Business-Critical Backup: Preparing for a DisasterBusiness-Critical Backup: Preparing for a Disaster
Business-Critical Backup: Preparing for a Disaster
 
Protect and Save your firm from data loses caused by disasters
Protect and Save your firm from data loses caused by disastersProtect and Save your firm from data loses caused by disasters
Protect and Save your firm from data loses caused by disasters
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planning
 
Disaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planningDisaster Recover : 10 tips for disaster recovery planning
Disaster Recover : 10 tips for disaster recovery planning
 
DR in the Cloud: Finding the Right Tool for the Job
DR in the Cloud: Finding the Right Tool for the JobDR in the Cloud: Finding the Right Tool for the Job
DR in the Cloud: Finding the Right Tool for the Job
 
Boca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game PlanBoca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game Plan
 
End user business-continuity.pptx datto slide
End user business-continuity.pptx datto slideEnd user business-continuity.pptx datto slide
End user business-continuity.pptx datto slide
 
Simplitfy - Guarding your Data
Simplitfy - Guarding your DataSimplitfy - Guarding your Data
Simplitfy - Guarding your Data
 
The Building Block for Business Continuity & Disaster Recovery
The Building Block for Business Continuity & Disaster RecoveryThe Building Block for Business Continuity & Disaster Recovery
The Building Block for Business Continuity & Disaster Recovery
 
[@IndeedEng] Redundant Array of Inexpensive Datacenters
[@IndeedEng] Redundant Array of Inexpensive Datacenters[@IndeedEng] Redundant Array of Inexpensive Datacenters
[@IndeedEng] Redundant Array of Inexpensive Datacenters
 
BCI & Plan B DR best practice presentation 110914
BCI &  Plan B DR best practice presentation 110914BCI &  Plan B DR best practice presentation 110914
BCI & Plan B DR best practice presentation 110914
 
Webinar: Microsoft Azure-2016-10-19
Webinar: Microsoft Azure-2016-10-19Webinar: Microsoft Azure-2016-10-19
Webinar: Microsoft Azure-2016-10-19
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security Operations
 
Cloud Based Disaster Recovery (DRaaS)
Cloud Based Disaster Recovery (DRaaS)Cloud Based Disaster Recovery (DRaaS)
Cloud Based Disaster Recovery (DRaaS)
 
E2 evc 3-2-1-rule - mikeresseler
E2 evc   3-2-1-rule - mikeresselerE2 evc   3-2-1-rule - mikeresseler
E2 evc 3-2-1-rule - mikeresseler
 
Cloud computing - When is Deletion Deletion?
Cloud computing - When is Deletion Deletion?Cloud computing - When is Deletion Deletion?
Cloud computing - When is Deletion Deletion?
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing Presentation
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security Operations
 

Plus de Liberteks

Testing SAP Solutions for Dummies
Testing SAP Solutions for DummiesTesting SAP Solutions for Dummies
Testing SAP Solutions for DummiesLiberteks
 
System Engineering for Dummies
System Engineering for DummiesSystem Engineering for Dummies
System Engineering for DummiesLiberteks
 
Sales and use tax compliance for dummies
Sales and use tax compliance for dummiesSales and use tax compliance for dummies
Sales and use tax compliance for dummiesLiberteks
 
QuestionPro for dummies
QuestionPro for dummiesQuestionPro for dummies
QuestionPro for dummiesLiberteks
 
IT Policy Compliance for Dummies
IT Policy Compliance for DummiesIT Policy Compliance for Dummies
IT Policy Compliance for DummiesLiberteks
 
Point -of-Sale Security for Dummies
Point -of-Sale Security for DummiesPoint -of-Sale Security for Dummies
Point -of-Sale Security for DummiesLiberteks
 
Midmarket Collaboration for Dummies
Midmarket Collaboration for DummiesMidmarket Collaboration for Dummies
Midmarket Collaboration for DummiesLiberteks
 
Email Signatures for Dummies
Email Signatures for DummiesEmail Signatures for Dummies
Email Signatures for DummiesLiberteks
 
Custom Publishing for Dummies
Custom Publishing for DummiesCustom Publishing for Dummies
Custom Publishing for DummiesLiberteks
 
Cloud Service for Dummies
Cloud Service for DummiesCloud Service for Dummies
Cloud Service for DummiesLiberteks
 
B2B Online Display Advertising for Dummies
B2B Online Display Advertising for DummiesB2B Online Display Advertising for Dummies
B2B Online Display Advertising for DummiesLiberteks
 
APIs for dummies
APIs for dummiesAPIs for dummies
APIs for dummiesLiberteks
 
Website Threats for Dummies
Website Threats for DummiesWebsite Threats for Dummies
Website Threats for DummiesLiberteks
 
Software-Defined WAM for Dummies
Software-Defined WAM for DummiesSoftware-Defined WAM for Dummies
Software-Defined WAM for DummiesLiberteks
 
Vulnerability Management for Dummies
Vulnerability Management for DummiesVulnerability Management for Dummies
Vulnerability Management for DummiesLiberteks
 
Integrated Marketing For Dummies
Integrated Marketing For DummiesIntegrated Marketing For Dummies
Integrated Marketing For DummiesLiberteks
 
Hyper-Converged Appliances for Dummies
Hyper-Converged Appliances for DummiesHyper-Converged Appliances for Dummies
Hyper-Converged Appliances for DummiesLiberteks
 
Flash Array Deployment for Dummies
Flash Array Deployment for DummiesFlash Array Deployment for Dummies
Flash Array Deployment for DummiesLiberteks
 
Container Storage for Dummies
Container Storage for DummiesContainer Storage for Dummies
Container Storage for DummiesLiberteks
 
Cloud Security for Dumies
Cloud Security for DumiesCloud Security for Dumies
Cloud Security for DumiesLiberteks
 

Plus de Liberteks (20)

Testing SAP Solutions for Dummies
Testing SAP Solutions for DummiesTesting SAP Solutions for Dummies
Testing SAP Solutions for Dummies
 
System Engineering for Dummies
System Engineering for DummiesSystem Engineering for Dummies
System Engineering for Dummies
 
Sales and use tax compliance for dummies
Sales and use tax compliance for dummiesSales and use tax compliance for dummies
Sales and use tax compliance for dummies
 
QuestionPro for dummies
QuestionPro for dummiesQuestionPro for dummies
QuestionPro for dummies
 
IT Policy Compliance for Dummies
IT Policy Compliance for DummiesIT Policy Compliance for Dummies
IT Policy Compliance for Dummies
 
Point -of-Sale Security for Dummies
Point -of-Sale Security for DummiesPoint -of-Sale Security for Dummies
Point -of-Sale Security for Dummies
 
Midmarket Collaboration for Dummies
Midmarket Collaboration for DummiesMidmarket Collaboration for Dummies
Midmarket Collaboration for Dummies
 
Email Signatures for Dummies
Email Signatures for DummiesEmail Signatures for Dummies
Email Signatures for Dummies
 
Custom Publishing for Dummies
Custom Publishing for DummiesCustom Publishing for Dummies
Custom Publishing for Dummies
 
Cloud Service for Dummies
Cloud Service for DummiesCloud Service for Dummies
Cloud Service for Dummies
 
B2B Online Display Advertising for Dummies
B2B Online Display Advertising for DummiesB2B Online Display Advertising for Dummies
B2B Online Display Advertising for Dummies
 
APIs for dummies
APIs for dummiesAPIs for dummies
APIs for dummies
 
Website Threats for Dummies
Website Threats for DummiesWebsite Threats for Dummies
Website Threats for Dummies
 
Software-Defined WAM for Dummies
Software-Defined WAM for DummiesSoftware-Defined WAM for Dummies
Software-Defined WAM for Dummies
 
Vulnerability Management for Dummies
Vulnerability Management for DummiesVulnerability Management for Dummies
Vulnerability Management for Dummies
 
Integrated Marketing For Dummies
Integrated Marketing For DummiesIntegrated Marketing For Dummies
Integrated Marketing For Dummies
 
Hyper-Converged Appliances for Dummies
Hyper-Converged Appliances for DummiesHyper-Converged Appliances for Dummies
Hyper-Converged Appliances for Dummies
 
Flash Array Deployment for Dummies
Flash Array Deployment for DummiesFlash Array Deployment for Dummies
Flash Array Deployment for Dummies
 
Container Storage for Dummies
Container Storage for DummiesContainer Storage for Dummies
Container Storage for Dummies
 
Cloud Security for Dumies
Cloud Security for DumiesCloud Security for Dumies
Cloud Security for Dumies
 

Dernier

Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 

Dernier (20)

Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 

smAlbany 2013 gn bdr pp

  • 1. “Irene, Sandy, Tornadoes, Oh My! How to make sure your business can survive!”
  • 2. Meet Lauren • Needed a “Real” Job • 3 ‘Down-sizes’ in a 5 year span • 2005 Groff NetWorks was born • 8 years later: 8 employees and dedicated to 35 companies.
  • 3. Introductions • Tell us who you are and where you are from. • What is the one thing you would like to learn during today’s seminar?
  • 5. What are we talking about? “Irene, Sandy, Tornadoes, Oh My! How to make sure your business can survive!”
  • 6. What you will learn today • The differences between Backup, Disaster Recovery and Business Continuity • Types of disasters, their frequency and severity • Why you should be afraid…very afraid • The easiest way to insure your data isn’t lost • How to put your backup on autopilot with complete confidence that it works
  • 8. What’s the goal? • Make sure you never lose critical data • Minimize downtime • Recover as quickly as possible in the event of a disaster
  • 9. Why is this important? • Of companies experiencing a major loss of data • 25% to 43% never reopen • 51% close within two years of the loss • A mere 6% survived over the long term
  • 10. Why is this important? • Small businesses account for • More than 99% of companies with employees • 50% of all private sector workers • Nearly 45% of the nation’s payroll • Commitment to planning today will help support employees, customers, the community, the local economy and the country
  • 11. Business Continuity . . . An ongoing process to ensure that the necessary steps are taken to identify the impact of potential losses and maintain viable recovery strategies, recovery plans, and continuity of services.
  • 12. Special Guest • Geoff Turner, Tech Valley Continuity
  • 13. What is Business Continuity Planning? Ongoing process designed to eliminate or mitigate the negative impact of events that disrupt normal business activities.
  • 14. NYS Disaster Declarations Since 2002 Disaster Type Count Earthquake 1 Ice Storm 1 Power Outage 1 Severe Storms and Flooding 12 Severe Winter Storm 8 Tropical Storm / Hurricane 5 Tornadoes / High Winds 3 Grand Total 31
  • 15. Most Disasters Are Not “DISASTERS” • Power Outages • Computer Failure • Telephone Outages • Water Pipe Leakage • Facility Fire • Information Breach • Supply Chain Issues
  • 16. NYS Information Breaches 2005-2012 • NYS = 11.4% of U.S. Breaches 20% Lost or Stolen Laptops 12% Unintentional Disclosure 12% Lost or Stolen Paper Documents 10% Stolen PCs or Hard Drives 10% Hacking 8% Insider Release of Information
  • 17. Symphony of Multiple Plans • Emergency Response Plan • Incident Management Plan • Mutual Aid / Assistance • Business Recovery Plan • Business Reconstitution Plan • Communications Plan • Logistics Plan • Training / TESTING / Evaluation Plan Source: Microsoft
  • 18. General Continuity Planning Process • Form a Senior Management Team • Form a Business Continuity Planning Team • Assess Risks / Impacts • Design Solutions • Implement Solutions • Document Recovery Strategies • Train Recovery Teams • TEST – TEST - TEST
  • 19. Areas of Focus • Information Technology • Primary Mission Essential Functions • Key Staff and Vendors • Vital Records and Resources • Alternate Facilities: – People – Computer Systems • Telecommunications: Data and Voice • Notification to clients, employees, stakeholders
  • 20. Business Continuity Planning • Most Companies Start With: • Protecting their data and technology infrastructure
  • 21. Not Just About IT Issues • Plan for immediate disaster response – including safety of employees • Identification of critical processes • Review insurance coverage • Disaster prevention • Key suppliers/service providers.
  • 22. Where to Begin? • Vulnerability Assessment • Probability • Potential Impact • List potential threats considering • History • Geography • Technology • Building Characteristics
  • 23. Human Errors • Unintentional actions taken by managers and employees acting in good faith • Most common causes • Inadequate user training • Fatigue • Carelessness
  • 24. Equipment Failures • Malfunction or complete failure of office machinery • Servers • Desktops or laptops • Fax machines • Phone systems • Network components • Expect this type of failure at some time
  • 25. Third-Party Failures • Service delivery failures • Electrical power • Phone service • Internet service • Financial disasters • Default of large customer • FDIC bank closure
  • 26. Environmental Hazards • Denial of access due to • Smoke from nearby fire • Hazardous substances in building • Irritants such as • Fresh paint • Radioactive, biological or chemical substances
  • 27. Fires and Other Disasters • Natural events • Earthquakes • Tornados, floods and storms • Man-made disasters • Gas leaks • Water pipe leaks
  • 30. Other Natural Disasters • A close call for a lot of people • What if this one hit?
  • 31. Terrorism and Sabotage • Intentional, systematic, planned and organized • Based on malicious intent • Possibility of very concentrated damage with relatively little effort • Perpetrated by • Terrorists • Computer hackers • Disgruntled employees
  • 32. Understand Your Risks Groff NetWorks-11 State Street, Troy NY
  • 33. Evaluate Each Disaster Based on - • Probability of occurrence • Impact • Human - possibility of death or injury • Property – cost of repair/replacement • Business – potential interruption of operation • Ability to respond • Internal resources • External resources
  • 35. Key Concepts • Recovery Time Objective – RTO • How long can your business survive before you have to be operational to remain in business? • Recovery Point Objective – RPO • How old can your data be and still have value?
  • 36. Disaster Timeline 14 days 7 days 2 days 1 hour 1 day 2 days
  • 37. Disaster Recovery . . . Is the process, policies and procedures of restoring operations critical to the resumption of business after a disaster.
  • 38. Backup • Copying your data to a safe medium for recovery in the event of data loss due to disaster • Protection from some disasters, like fire or flood, requires two-step backup • Backup (locally) • Transfer (off-site)
  • 39. Traditional Backup Methodology • Backup is performed nightly • Someone must remove the media and replace it with tonight’s media • Two-step backup accomplished by ‘sneakernet’ • Relies on your staff to make sure that backup is working • Single snapshot per day
  • 40. Backup to Tape • Slow • Media degrades over time and is greatly affected by the environment • Tape drive is expensive • Additional capacity is difficult to add • Formats are typically proprietary – must have same type of drive and same software to restore
  • 41. Move to Disk Based Backup Removable Hard Drives • Backup and restore times are much faster • Capacity is easily increased • Solutions may use standard Windows file systems • Still requires user interaction • Not as convenient to carry offsite
  • 42. Offsite Backup • Does not require user interaction • Capacity easily increased • Automated BUT… • Data only • Slow recovery times
  • 43. Here’s the problem… We think a good backup is good enough.
  • 44. Criteria For A Solid Backup System • Take the human element out of the equation • Make sure ALL files are backed up • Automated and easy • Intra-day backups • No impact on day-to-day operations • Fast restores – and to dissimilar hardware
  • 45. Criteria For Off-Site Backup • Secure data transfer • Secure data storage • Ability to receive data overnight • Ability to send initial backup on hard drive • Geographically separate from you • Low cost off-site storage • Regulatory compliance – HIPAA, SOX, GLBA
  • 46. Questions to ask • How much revenue, gross AND net, do you generate? • How many employees do you have, what is their cost? • How much of that is facilitated, or even dependent, on your IT infrastructure?
  • 47. Questions to ask • How will a failure – even a short lived failure – be perceived by your customers and your employees? • How quickly can you recover lost files? • If a server fails, how long will it be before you are back up and running…how much opportunity cost would this represent?
  • 48. Could you survive . . . ?
  • 49. Could you survive . . . ? • I think she may be getting fired for this!
  • 50. Does your backup do this? • Meets multiple regulatory requirements • Addresses the BC, DR and B • Utilizes Server hardware
  • 51. 8 Reasons Why You Need To Replace Your Current Backup 1. Near Real-Time Backups – – As frequently as every 15 minutes 2. Complete Image – – Backs up your entire server including open files 3. Restores that are Intuitive, Flexible and Fast
  • 52. 8 Reasons Why You Need To Replace Your Current Backup 4. Secure Bandwidth Throttling Transfer 5. Secure Remote Storage 6. Monitored and Verified 24x7
  • 53. 8 Reasons Why You Need To Replace Your Current Backup 7. Virtualization • Server Fails • NAS Virtualizes Server • One hour or less • No reconfiguration necessary • Backups Continue
  • 54. 8 Reasons Why You Need To Replace Your Current Backup 8. Overnight Disaster Recovery • Replacement appliance delivered with most recent off-site image(s) of your server(s) • Business can be back up and running within 24 hours • And, now with Cloud server failover, you could be running in the matter of hours if you were to lose your facility!
  • 56. Our Clients. . . • “The Arsenal Partnership is very pleased with Groff NetWorks. Groff NetWorks’ staff is very helpful and the technicians are extremely knowledgeable. Their quick response to address our various IT requests has been refreshing.” – Doreen Dean, Administrative Assistant, Arsenal Business & Technology Partnership
  • 57. Our Clients. . . “Groff NetWorks is prompt, friendly, and most importantly, honest. They really do a great job.” - Donna Gutzwiller, Office Manager, Audio Visual Sales & Service