SlideShare une entreprise Scribd logo
1  sur  38
Télécharger pour lire hors ligne
IMAGINE….
…if you were one of
these businesses in New
Orleans, after Hurricane
Katrina

11/3/2011

www.kinarainsights.com
Even closer to home…
Springfield MA
June 1, 2011 tornado

11/3/2011

www.kinarainsights.com
STOP FLIRTING WITH DISASTER!
BE PREPARED.

Sameer Sule
Business Technology Consultant
KINARA | INSIGHTS
Objectives



Understand the importance of having a disaster
recovery plan for a business as relates to its
computer systems, applications and data.



Reduce Business Downtime-Technologies currently
available to SMBs

11/3/2011

www.kinarainsights.com
2011: Year of Disasters in Massachusetts








October 29th Snowstorm: More than 600,000
people without power. Outage likely to last a few
days.
Springfield Tornado : June 1, 2011
Hurricane Irene: > 500,000 people lost power.
Some for as long as a week.
Earthquake
January blizzard

Millions in damages and lost business
11/3/2011

www.kinarainsights.com
October 29th Snow Storm
According to National Grid:
 671,594 customers or 28 percent of the state’s 2.4
million electric customers lost power
 By late Oct 31st, 459,809 customers were still
without power
 Harvard :100 percent were without power
 Wrentham: 93 percent in the dark
 Foxboro:91 percent powerless
 Andover: 74 percent unplugged
11/3/2011

www.kinarainsights.com
Eye Opener
“A Company that experiences a computer outage lasting
more than 10 days will never fully recover financially. 50
percent will be out of business within five years.”






70 percent of small firms that experience a major data loss go
out of business within a year.
Companies that aren’t able to resume operations within ten days
(of a disaster hit) are not likely to survive.
Of those businesses that experience a disaster and have no
emergency plan, 43 percent never reopen; of those that do
reopen, only 29 percent are still operating two years later.
SCORE: Counselors to America’s Small Businesses

11/3/2011

www.kinarainsights.com
More Eye Openers


15-40% businesses fail following a natural or man-made disaster*



35% SMBs have a comprehensive disaster recovery plan**



94% small business owners believe a disaster could seriously
disrupt their business within the next two years***



51% Americans have experienced at least one emergency
situation involving lost utilities for at least 3 days, evacuation from
their home or office, loss of communications with family members
or had to provide first aid to others****
*Insurance Information Institute, **Gartner, ***American Red Cross and FedEx Small Business
Survey, 2007, ****American Red Cross/Harris Poll Survey, 2009.

11/3/2011

www.kinarainsights.com
Most common business disruptive events


Power outage



Internet outage



Server crash



Viruses, hacks and breaches



Location based issues like building evacuation due to
fire, hazardous spill, burst pipes, theft etc

11/3/2011

www.kinarainsights.com
What is the actual cost in $$$$$$ to
your business if you were down for
a day?

11/3/2011

www.kinarainsights.com
Median cost of downtime

Small business: $3000 per day
Medium size business: $23,000 per day

Symantec 2011 SMB Disaster Preparedness Survey - Global: January 2011

11/3/2011

www.kinarainsights.com
Real cost of business downtime





Loss in labor
Loss in revenue
Loss in service

All are cascade effects. Total loss total is
larger than you think.

11/3/2011

www.kinarainsights.com
SMB Data on Disaster Preparedness


Despite warnings, most SMBs are still
not prepared for disaster
50% don’t have a BDR plan in place
41% never thought about putting a plan in place

Symantec 2011 SMB Disaster Preparedness Survey - Global: January 2011

11/3/2011

www.kinarainsights.com
SMB Data on Disaster Preparedness


SMBs are at risk
- 40% said disaster recovery is not a priority
- <50% of SMBs back up their data weekly or
more frequently
- 23% back up data daily

Symantec 2011 SMB Disaster Preparedness Survey - Global: January 2011

11/3/2011

www.kinarainsights.com
SMB Data on Disaster Preparedness


SMBs do not act until it is too late

- 50% of SMBs that implemented a BDR plan did
so after experiencing an outage and/or data loss
- 28% actually tested their recovery plan
Symantec 2011 SMB Disaster Preparedness Survey - Global: January 2011

11/3/2011

www.kinarainsights.com
Business Continuity Planning


Describes the processes and procedures an
organization puts in place to ensure that
essential functions can continue during and
after a disaster.
Seeks to prevent interruption of mission-critical services,
and to re-establish full functioning as swiftly and
smoothly as possible.

11/3/2011

www.kinarainsights.com
Disaster Recovery Planning


The processes, policies and procedures
related to preparing for recovery or
continuation of technology infrastructure
critical to an organization after a disruptive
event
Subset of business continuity that focuses on the IT or
technology systems that support business functions.

11/3/2011

www.kinarainsights.com
Assess your business risk







What types of emergencies have you
experienced in in the past?
What could result from a process or system
failure?
What threats does your business location have?
Will you be affected if your neighbor is hit by a
disaster?

11/3/2011

www.kinarainsights.com
BDR: Common SMB Mistakes
Lack of:








A formal written BDR plan
Offsite data protection
Policy on data retention
Testing of restores/DR plan on a regular basis
Ensuring critical data protection
Focus on recovery
Designated accountable BDR person

11/3/2011

www.kinarainsights.com
Backup and Disaster Recovery (BDR)
Planning


Backup

Backup with no recovery planning is pointless


Disaster Recovery

Recovery without backup is impossible

11/3/2011

www.kinarainsights.com
Backup


What should be backed up?



What type of backup?



What is the backup frequency?

11/3/2011

www.kinarainsights.com
Backup


Build multiple layers of backup for greater
reliability and faster restores



Local RAID based backup, off-site tapes, or
cloud based storage



Technology deployed should meet your data
backup and recovery needs

11/3/2011

www.kinarainsights.com
Backup: Points to consider


How long can your business run without critical data
available to your employees, clients, partners etc?



What data is extremely important in order to get back
up and running after an unforeseen disruptive event?



What type of backup solution (local/ offsite cloud
based) do you need to address your needs?



What level of data backup (files, whole image) do you
need and what is the backup frequency?



Which desktops/laptops/mobile devices need to be
backed up?

11/3/2011

www.kinarainsights.com
Disaster Recovery



No Plan= No recovery



Disaster Recovery without proper planning is
a recipe for disaster

11/3/2011

www.kinarainsights.com
Recovery Planning


During the recovery process, what is the
order in which systems, applications and data
will be brought back on line?



How are your employees going to access the
applications and data in the event that the
regular work location cannot be accessed?

11/3/2011

www.kinarainsights.com
RTO and RPO
RTO (Recovery Time Objective)
The maximum tolerable duration of time that a computer system, network or application

can be down after a failure or the length of time it takes to restore the system.

RPO

Disaster occurrence

R
T
O

time

RPO (Recovery Point Objective)
Is the age of files or state of data that must be recovered from backup storage for
normal operations to resume if a computer system, network or application goes down.
The RPO is expressed backward in time (that is, into the past) from the instant at which
the failure occurs,

11/3/2011

www.kinarainsights.com
Cloud Based BDR Systems


Automatic backup



Secure and offsite



Easy to access and restore



Faster recovery



Reduced downtime



Competitive pricing

11/3/2011

www.kinarainsights.com
Virtualization and Reduced Downtime








Backup image of physical server to the cloud
Can launch a virtual machine in the cloud
Allows technicians to fix the physical server
while regular business is run from the virtual
server
Allows server migrations to be carried out in the
cloud
Test upgrades/patches in cloud before
production deployment

11/3/2011

www.kinarainsights.com
BDR Solutions




Turnkey solutions: for a monthly fee providing
everything from power, technology, mobile
offices and connectivity
Software providers: cloud based BDR solutions,
each with its own value proposition

11/3/2011

www.kinarainsights.com
What to expect from your BDR vendor


Experience with required federal and state compliance
and regulatory requirements for your industry



Strong encryption methods



RTOs and RPOs planning with skilled engineers



Redundancy of data over 2 geographically dispersed
data centers

11/3/2011

www.kinarainsights.com
What to expect..continued


Designated point of contact (engineer) who knows your
BDR plan and can monitor and respond immediately to
any emergencies



Vendor technology should be scalable and flexible to
your company needs



Service and support



References

11/3/2011

www.kinarainsights.com
Prevention is always better than cure


Be Proactive



Use Remote Monitoring and Management (RMM)
services to ensure that your server and workstations are
running properly, updated, backed up daily, and
protected from viruses with latest definitions



Keep inventory of all your IT systems up-to-date



Keep system passwords and contact info of important

personnel readily available in case of emergency
11/3/2011

www.kinarainsights.com
BDR Plan: Bare minimum


Designate a BDR person/team



Details of your computing environment: description of
what you own, its location, date purchased, warranty
information, number of licenses



Contact info for your hardware and software
vendors



User names and Passwords for critical systems



Different channels of communication: phone, email, text,
social media

11/3/2011

www.kinarainsights.com
Real World Examples
River Valley Community Federal CU: Camden, Arkansas






During initial test of recovery plan, they collected all
critical info, such as technical information for server
configuration, data recovery steps, setup information,
etc.
Found that simple phone numbers for key contacts at
data backup locations were missing
Updated their printed plan and online repository of key
contact data
Small Business Administration

11/3/2011

www.kinarainsights.com
Real World Examples


A Desaur & Co. ( accounting company) was using a
tape-based solution when the server failure occurred in
April 2007. The tape restore failed entirely because its IT
support company had not carried out trial data restores,
which would have revealed that the backups were not
working. After an expensive and time costly hard disk
data restore, only 80% of the data was able to be
restored. Permanently lost valuable data.



Now employ a cloud based backup and recovery
software, which also backs up laptops when connected
to the network and can immediately begin remotely
restoring all of the data to the systems if the server fails.

11/3/2011

www.kinarainsights.com
Real World Examples
400‐Person Call Center: Nashville, Tennessee







Building located in floodplain, extensive planning was
made to help alleviate risk
Took steps to elevate IT equipment storage, establish
redundant facilities, and institute a fail-safe phone
system.
During 2010 Nashville floods, entire facility was lost
Chose to recover locally in mobile offices rather than lay
off or transfer employees

11/3/2011

www.kinarainsights.com
BDR





PLAN IT
IMPLEMENT IT
TEST IT REGULARLY

DON’T LEAVE YOUR BUSINESS
TO CHANCE!!

11/3/2011

www.kinarainsights.com
THANK YOU
CONTACT
Sameer Sule
Healthcare Technology Consultant
Author: “Protecting Electronic Health Information: A Practical Approach
to Patient Data Security in Your Healthcare Practice”
Amazon: http://www.amazon.com/author/sameersule
Blog: http://www.kinarainsights.com/blog.html
Linkedin: http://www.linkedin.com/pub/sameer-sule/7/b1b/511
Twitter:@sameersule

10/1/2013

www.kinarainsights.com

40

Contenu connexe

Tendances

Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
Bit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_printBit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_printjames morris
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak PreventionTanvir Hashmi
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykEryk Budi Pratama
 
Simplifying the data privacy governance quagmire building automated privacy ...
Simplifying the data privacy governance quagmire  building automated privacy ...Simplifying the data privacy governance quagmire  building automated privacy ...
Simplifying the data privacy governance quagmire building automated privacy ...Avinash Ramineni
 
Netreo whitepaper 5 ways to avoid it management becoming shelfware
Netreo whitepaper   5 ways to avoid it management becoming shelfwareNetreo whitepaper   5 ways to avoid it management becoming shelfware
Netreo whitepaper 5 ways to avoid it management becoming shelfwarePeter Reynolds
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsSolarWinds
 
Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Samuel Loomis
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceSolarWinds
 
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)Tripwire
 
Cybersmart_buildings_securing your investment in connectivity and automation
Cybersmart_buildings_securing your investment in connectivity and automationCybersmart_buildings_securing your investment in connectivity and automation
Cybersmart_buildings_securing your investment in connectivity and automationIron Mountain
 
Bring your own-computer_to work
Bring your own-computer_to workBring your own-computer_to work
Bring your own-computer_to workNetIQ
 
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the TreesTunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the TreesEnterprise Management Associates
 
TysonStargelDocumentManagementManagedITServices
TysonStargelDocumentManagementManagedITServicesTysonStargelDocumentManagementManagedITServices
TysonStargelDocumentManagementManagedITServicesTyson Stargel
 

Tendances (19)

Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Bit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_printBit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_print
 
Secuntialesse
SecuntialesseSecuntialesse
Secuntialesse
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - Eryk
 
Simplifying the data privacy governance quagmire building automated privacy ...
Simplifying the data privacy governance quagmire  building automated privacy ...Simplifying the data privacy governance quagmire  building automated privacy ...
Simplifying the data privacy governance quagmire building automated privacy ...
 
Netreo whitepaper 5 ways to avoid it management becoming shelfware
Netreo whitepaper   5 ways to avoid it management becoming shelfwareNetreo whitepaper   5 ways to avoid it management becoming shelfware
Netreo whitepaper 5 ways to avoid it management becoming shelfware
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
 
Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
 
Sec4
Sec4Sec4
Sec4
 
)k
)k)k
)k
 
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
 
Cybersmart_buildings_securing your investment in connectivity and automation
Cybersmart_buildings_securing your investment in connectivity and automationCybersmart_buildings_securing your investment in connectivity and automation
Cybersmart_buildings_securing your investment in connectivity and automation
 
Bring your own-computer_to work
Bring your own-computer_to workBring your own-computer_to work
Bring your own-computer_to work
 
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the TreesTunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
 
TysonStargelDocumentManagementManagedITServices
TysonStargelDocumentManagementManagedITServicesTysonStargelDocumentManagementManagedITServices
TysonStargelDocumentManagementManagedITServices
 
Information security.pptx
Information security.pptxInformation security.pptx
Information security.pptx
 

Similaire à Disaster Recovery Essentials for SMBs

V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...VMware_EMEA
 
Integra: Attack of the Business Killing Monster (Infographic)
Integra: Attack of the Business Killing Monster (Infographic)Integra: Attack of the Business Killing Monster (Infographic)
Integra: Attack of the Business Killing Monster (Infographic)Jessica Legg
 
ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise"
ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise"  ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise"
ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise" ESEI
 
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperWill You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperChristian Caracciolo
 
Mastering disaster a data center checklist
Mastering disaster a data center checklistMastering disaster a data center checklist
Mastering disaster a data center checklistChris Wick
 
Fulcrum Group- Layer Your DR/BC
Fulcrum Group- Layer Your DR/BCFulcrum Group- Layer Your DR/BC
Fulcrum Group- Layer Your DR/BCSteve Meek
 
Mastering disaster e book Telehouse
Mastering disaster e book TelehouseMastering disaster e book Telehouse
Mastering disaster e book TelehouseTelehouse
 
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud ComputingIRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud ComputingIRJET Journal
 
Whitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructureWhitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructureJake Weaver
 
Earthlink Business Cloud Disaster Recovery
Earthlink Business Cloud Disaster RecoveryEarthlink Business Cloud Disaster Recovery
Earthlink Business Cloud Disaster RecoveryMike Ricca
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planningAureusIT
 
EarthLink Business - Business Continuity
EarthLink Business - Business ContinuityEarthLink Business - Business Continuity
EarthLink Business - Business ContinuityMike Ricca
 
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud ApplicationCloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud ApplicationKeynote Mobile Testing
 
Disaster Recovery Planning
Disaster Recovery Planning   Disaster Recovery Planning
Disaster Recovery Planning Keystone IT
 
Disaster Planning What Organizations Need To Know To Protect Their Tech
Disaster Planning What Organizations Need To Know To Protect Their TechDisaster Planning What Organizations Need To Know To Protect Their Tech
Disaster Planning What Organizations Need To Know To Protect Their TechTechSoup
 
End user business-continuity.pptx datto slide
End user business-continuity.pptx datto slideEnd user business-continuity.pptx datto slide
End user business-continuity.pptx datto slideLaura Breese
 
A guide to modern it disaster recovery
A guide to modern it disaster recoveryA guide to modern it disaster recovery
A guide to modern it disaster recoveryJohn Brouillard
 

Similaire à Disaster Recovery Essentials for SMBs (20)

V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...
 
Integra: Attack of the Business Killing Monster (Infographic)
Integra: Attack of the Business Killing Monster (Infographic)Integra: Attack of the Business Killing Monster (Infographic)
Integra: Attack of the Business Killing Monster (Infographic)
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise"
ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise"  ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise"
ESEI White Paper-Disaster Recovery "A Risk Assessment Exercise"
 
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperWill You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
 
Mastering disaster a data center checklist
Mastering disaster a data center checklistMastering disaster a data center checklist
Mastering disaster a data center checklist
 
Fulcrum Group- Layer Your DR/BC
Fulcrum Group- Layer Your DR/BCFulcrum Group- Layer Your DR/BC
Fulcrum Group- Layer Your DR/BC
 
Mastering disaster e book Telehouse
Mastering disaster e book TelehouseMastering disaster e book Telehouse
Mastering disaster e book Telehouse
 
Ies Axcient E Ufocuspreso[1]
Ies Axcient E Ufocuspreso[1]Ies Axcient E Ufocuspreso[1]
Ies Axcient E Ufocuspreso[1]
 
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud ComputingIRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
 
Whitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructureWhitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructure
 
Earthlink Business Cloud Disaster Recovery
Earthlink Business Cloud Disaster RecoveryEarthlink Business Cloud Disaster Recovery
Earthlink Business Cloud Disaster Recovery
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planning
 
EarthLink Business - Business Continuity
EarthLink Business - Business ContinuityEarthLink Business - Business Continuity
EarthLink Business - Business Continuity
 
Business Disaster Recovery by Clients First
Business Disaster Recovery by Clients FirstBusiness Disaster Recovery by Clients First
Business Disaster Recovery by Clients First
 
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud ApplicationCloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
Cloud Performance Monitoring: Medtronic's CareLink(R) Cloud Application
 
Disaster Recovery Planning
Disaster Recovery Planning   Disaster Recovery Planning
Disaster Recovery Planning
 
Disaster Planning What Organizations Need To Know To Protect Their Tech
Disaster Planning What Organizations Need To Know To Protect Their TechDisaster Planning What Organizations Need To Know To Protect Their Tech
Disaster Planning What Organizations Need To Know To Protect Their Tech
 
End user business-continuity.pptx datto slide
End user business-continuity.pptx datto slideEnd user business-continuity.pptx datto slide
End user business-continuity.pptx datto slide
 
A guide to modern it disaster recovery
A guide to modern it disaster recoveryA guide to modern it disaster recovery
A guide to modern it disaster recovery
 

Dernier

Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 

Dernier (20)

Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 

Disaster Recovery Essentials for SMBs

  • 1. IMAGINE…. …if you were one of these businesses in New Orleans, after Hurricane Katrina 11/3/2011 www.kinarainsights.com
  • 2. Even closer to home… Springfield MA June 1, 2011 tornado 11/3/2011 www.kinarainsights.com
  • 3. STOP FLIRTING WITH DISASTER! BE PREPARED. Sameer Sule Business Technology Consultant KINARA | INSIGHTS
  • 4. Objectives  Understand the importance of having a disaster recovery plan for a business as relates to its computer systems, applications and data.  Reduce Business Downtime-Technologies currently available to SMBs 11/3/2011 www.kinarainsights.com
  • 5. 2011: Year of Disasters in Massachusetts      October 29th Snowstorm: More than 600,000 people without power. Outage likely to last a few days. Springfield Tornado : June 1, 2011 Hurricane Irene: > 500,000 people lost power. Some for as long as a week. Earthquake January blizzard Millions in damages and lost business 11/3/2011 www.kinarainsights.com
  • 6. October 29th Snow Storm According to National Grid:  671,594 customers or 28 percent of the state’s 2.4 million electric customers lost power  By late Oct 31st, 459,809 customers were still without power  Harvard :100 percent were without power  Wrentham: 93 percent in the dark  Foxboro:91 percent powerless  Andover: 74 percent unplugged 11/3/2011 www.kinarainsights.com
  • 7. Eye Opener “A Company that experiences a computer outage lasting more than 10 days will never fully recover financially. 50 percent will be out of business within five years.”    70 percent of small firms that experience a major data loss go out of business within a year. Companies that aren’t able to resume operations within ten days (of a disaster hit) are not likely to survive. Of those businesses that experience a disaster and have no emergency plan, 43 percent never reopen; of those that do reopen, only 29 percent are still operating two years later. SCORE: Counselors to America’s Small Businesses 11/3/2011 www.kinarainsights.com
  • 8. More Eye Openers  15-40% businesses fail following a natural or man-made disaster*  35% SMBs have a comprehensive disaster recovery plan**  94% small business owners believe a disaster could seriously disrupt their business within the next two years***  51% Americans have experienced at least one emergency situation involving lost utilities for at least 3 days, evacuation from their home or office, loss of communications with family members or had to provide first aid to others**** *Insurance Information Institute, **Gartner, ***American Red Cross and FedEx Small Business Survey, 2007, ****American Red Cross/Harris Poll Survey, 2009. 11/3/2011 www.kinarainsights.com
  • 9. Most common business disruptive events  Power outage  Internet outage  Server crash  Viruses, hacks and breaches  Location based issues like building evacuation due to fire, hazardous spill, burst pipes, theft etc 11/3/2011 www.kinarainsights.com
  • 10. What is the actual cost in $$$$$$ to your business if you were down for a day? 11/3/2011 www.kinarainsights.com
  • 11. Median cost of downtime Small business: $3000 per day Medium size business: $23,000 per day Symantec 2011 SMB Disaster Preparedness Survey - Global: January 2011 11/3/2011 www.kinarainsights.com
  • 12. Real cost of business downtime    Loss in labor Loss in revenue Loss in service All are cascade effects. Total loss total is larger than you think. 11/3/2011 www.kinarainsights.com
  • 13. SMB Data on Disaster Preparedness  Despite warnings, most SMBs are still not prepared for disaster 50% don’t have a BDR plan in place 41% never thought about putting a plan in place Symantec 2011 SMB Disaster Preparedness Survey - Global: January 2011 11/3/2011 www.kinarainsights.com
  • 14. SMB Data on Disaster Preparedness  SMBs are at risk - 40% said disaster recovery is not a priority - <50% of SMBs back up their data weekly or more frequently - 23% back up data daily Symantec 2011 SMB Disaster Preparedness Survey - Global: January 2011 11/3/2011 www.kinarainsights.com
  • 15. SMB Data on Disaster Preparedness  SMBs do not act until it is too late - 50% of SMBs that implemented a BDR plan did so after experiencing an outage and/or data loss - 28% actually tested their recovery plan Symantec 2011 SMB Disaster Preparedness Survey - Global: January 2011 11/3/2011 www.kinarainsights.com
  • 16. Business Continuity Planning  Describes the processes and procedures an organization puts in place to ensure that essential functions can continue during and after a disaster. Seeks to prevent interruption of mission-critical services, and to re-establish full functioning as swiftly and smoothly as possible. 11/3/2011 www.kinarainsights.com
  • 17. Disaster Recovery Planning  The processes, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a disruptive event Subset of business continuity that focuses on the IT or technology systems that support business functions. 11/3/2011 www.kinarainsights.com
  • 18. Assess your business risk     What types of emergencies have you experienced in in the past? What could result from a process or system failure? What threats does your business location have? Will you be affected if your neighbor is hit by a disaster? 11/3/2011 www.kinarainsights.com
  • 19. BDR: Common SMB Mistakes Lack of:        A formal written BDR plan Offsite data protection Policy on data retention Testing of restores/DR plan on a regular basis Ensuring critical data protection Focus on recovery Designated accountable BDR person 11/3/2011 www.kinarainsights.com
  • 20. Backup and Disaster Recovery (BDR) Planning  Backup Backup with no recovery planning is pointless  Disaster Recovery Recovery without backup is impossible 11/3/2011 www.kinarainsights.com
  • 21. Backup  What should be backed up?  What type of backup?  What is the backup frequency? 11/3/2011 www.kinarainsights.com
  • 22. Backup  Build multiple layers of backup for greater reliability and faster restores  Local RAID based backup, off-site tapes, or cloud based storage  Technology deployed should meet your data backup and recovery needs 11/3/2011 www.kinarainsights.com
  • 23. Backup: Points to consider  How long can your business run without critical data available to your employees, clients, partners etc?  What data is extremely important in order to get back up and running after an unforeseen disruptive event?  What type of backup solution (local/ offsite cloud based) do you need to address your needs?  What level of data backup (files, whole image) do you need and what is the backup frequency?  Which desktops/laptops/mobile devices need to be backed up? 11/3/2011 www.kinarainsights.com
  • 24. Disaster Recovery  No Plan= No recovery  Disaster Recovery without proper planning is a recipe for disaster 11/3/2011 www.kinarainsights.com
  • 25. Recovery Planning  During the recovery process, what is the order in which systems, applications and data will be brought back on line?  How are your employees going to access the applications and data in the event that the regular work location cannot be accessed? 11/3/2011 www.kinarainsights.com
  • 26. RTO and RPO RTO (Recovery Time Objective) The maximum tolerable duration of time that a computer system, network or application can be down after a failure or the length of time it takes to restore the system. RPO Disaster occurrence R T O time RPO (Recovery Point Objective) Is the age of files or state of data that must be recovered from backup storage for normal operations to resume if a computer system, network or application goes down. The RPO is expressed backward in time (that is, into the past) from the instant at which the failure occurs, 11/3/2011 www.kinarainsights.com
  • 27. Cloud Based BDR Systems  Automatic backup  Secure and offsite  Easy to access and restore  Faster recovery  Reduced downtime  Competitive pricing 11/3/2011 www.kinarainsights.com
  • 28. Virtualization and Reduced Downtime      Backup image of physical server to the cloud Can launch a virtual machine in the cloud Allows technicians to fix the physical server while regular business is run from the virtual server Allows server migrations to be carried out in the cloud Test upgrades/patches in cloud before production deployment 11/3/2011 www.kinarainsights.com
  • 29. BDR Solutions   Turnkey solutions: for a monthly fee providing everything from power, technology, mobile offices and connectivity Software providers: cloud based BDR solutions, each with its own value proposition 11/3/2011 www.kinarainsights.com
  • 30. What to expect from your BDR vendor  Experience with required federal and state compliance and regulatory requirements for your industry  Strong encryption methods  RTOs and RPOs planning with skilled engineers  Redundancy of data over 2 geographically dispersed data centers 11/3/2011 www.kinarainsights.com
  • 31. What to expect..continued  Designated point of contact (engineer) who knows your BDR plan and can monitor and respond immediately to any emergencies  Vendor technology should be scalable and flexible to your company needs  Service and support  References 11/3/2011 www.kinarainsights.com
  • 32. Prevention is always better than cure  Be Proactive  Use Remote Monitoring and Management (RMM) services to ensure that your server and workstations are running properly, updated, backed up daily, and protected from viruses with latest definitions  Keep inventory of all your IT systems up-to-date  Keep system passwords and contact info of important personnel readily available in case of emergency 11/3/2011 www.kinarainsights.com
  • 33. BDR Plan: Bare minimum  Designate a BDR person/team  Details of your computing environment: description of what you own, its location, date purchased, warranty information, number of licenses  Contact info for your hardware and software vendors  User names and Passwords for critical systems  Different channels of communication: phone, email, text, social media 11/3/2011 www.kinarainsights.com
  • 34. Real World Examples River Valley Community Federal CU: Camden, Arkansas    During initial test of recovery plan, they collected all critical info, such as technical information for server configuration, data recovery steps, setup information, etc. Found that simple phone numbers for key contacts at data backup locations were missing Updated their printed plan and online repository of key contact data Small Business Administration 11/3/2011 www.kinarainsights.com
  • 35. Real World Examples  A Desaur & Co. ( accounting company) was using a tape-based solution when the server failure occurred in April 2007. The tape restore failed entirely because its IT support company had not carried out trial data restores, which would have revealed that the backups were not working. After an expensive and time costly hard disk data restore, only 80% of the data was able to be restored. Permanently lost valuable data.  Now employ a cloud based backup and recovery software, which also backs up laptops when connected to the network and can immediately begin remotely restoring all of the data to the systems if the server fails. 11/3/2011 www.kinarainsights.com
  • 36. Real World Examples 400‐Person Call Center: Nashville, Tennessee     Building located in floodplain, extensive planning was made to help alleviate risk Took steps to elevate IT equipment storage, establish redundant facilities, and institute a fail-safe phone system. During 2010 Nashville floods, entire facility was lost Chose to recover locally in mobile offices rather than lay off or transfer employees 11/3/2011 www.kinarainsights.com
  • 37. BDR    PLAN IT IMPLEMENT IT TEST IT REGULARLY DON’T LEAVE YOUR BUSINESS TO CHANCE!! 11/3/2011 www.kinarainsights.com
  • 38. THANK YOU CONTACT Sameer Sule Healthcare Technology Consultant Author: “Protecting Electronic Health Information: A Practical Approach to Patient Data Security in Your Healthcare Practice” Amazon: http://www.amazon.com/author/sameersule Blog: http://www.kinarainsights.com/blog.html Linkedin: http://www.linkedin.com/pub/sameer-sule/7/b1b/511 Twitter:@sameersule 10/1/2013 www.kinarainsights.com 40