Backup and Data Storage – Bizcom Networks Tue, 05 Feb 2019 19:28:21 +0000 en-US hourly 1 https://wordpress.org/?v=6.3.8 Disaster Recovery and Data Protection –Now More Than Ever https://www.bizcomnetworks.com/disaster-recovery-data-protection-now-ever/ Tue, 12 Sep 2017 19:23:28 +0000 https://www.bizcomnetworks.com/3gtelco/disaster-recovery-data-protection-now-ever/ Recent Hurricanes Harvey and Irma, along with major earthquakes in Mexico, remind us how vulnerable we can be to disasters, and underscore the importance of data protection. As businesses depend on access to a range of systems--including call center, communications and collaboration application, customer management, and more--having a solid data protection plan can help you in a disaster recovery scenario. Now more than ever, a range of options exist to help maintain business continuity. Here are a few options to consider.

The post Disaster Recovery and Data Protection –Now More Than Ever appeared first on Bizcom Networks.

]]>
Disaster Recovery PlanRecent Hurricanes Harvey and Irma, along with major earthquakes in Mexico, remind us how vulnerable we can be to disasters, and underscore the importance of data protection. As businesses depend on access to a range of systems–including call center, communications and collaboration application, customer management, and more–having a solid data protection plan can help you in a disaster recovery scenario. Now more than ever, a range of options exist to help maintain business continuity. Here are a few options to consider.

 

Review Your Data Protection Plan

Key to your data protection plan is identification of mission-critical systems. The most important systems should be redundant, with the ability for failover in the event of a disaster. Your data centers and failover options should be geographically dispersed and on different network backbones. This can minimize downtime and get you back up and running sooner. Having your data backup available in Cloud Storage can help you recover other important files and application data if you lose access to your on-premise systems.

SD-WAN for Business Continuity

Software-defined wide area networks (SD-WAN) can also provide you a highly reliable and redundant network. Having the ability to switch Wide Area Networks using SD-WAN as an alternative to more costly MPLS solutions can ensure connectivity during a natural disaster. What’s more, Software-Defined Wide Area Networking can save you money in the long run by giving you the flexibility of a multi-carrier solution.

Software as a Service for Disaster Recovery

More businesses are turning to the Cloud for a range of applications–hosted email, Voice over IP (VoIP), Call Center, and others–to keep communications flowing during a disaster. Using Software as a Service (SaaS) for these important communications and collaborations applications keeps your employees, customers and business partners connected even when you are unable to gain physical access to your facilities. Having these applications in the Cloud can help you ensure everyone on your team is present and accounted for.

Don’t wait until a disaster strikes to review your data protection and disaster recovery plans.  Contact your technology advisor today if you are unsure how well you will weather the storm.

The post Disaster Recovery and Data Protection –Now More Than Ever appeared first on Bizcom Networks.

]]>
The Importance of Maintaining Network Compliance https://www.bizcomnetworks.com/importance-maintaining-network-compliance/ Thu, 01 Jun 2017 21:21:48 +0000 https://www.bizcomnetworks.com/3gtelco/importance-maintaining-network-compliance/ With Cyber Threats on the rise, the importance of maintaining network compliance is top of mind with business owners and IT professionals alike.

The post The Importance of Maintaining Network Compliance appeared first on Bizcom Networks.

]]>
Network SecurityLast month’s blog provided information about ways to “Avoid Being Held Hostage by Ransomware.” Eight days later, on May 12, 2017, there was a global outbreak of the Wanna Cry Virus. With Cyber Threats on the rise, the importance of maintaining network compliance is top of mind with business owners and IT professionals alike. Industry compliance regulations, including PCI, HIPAA, and SOX, drive best practices in Network Compliance. However, most businesses today rely heavily on their systems to access Cloud Services, Voice, and Data Networks for mission-critical applications that run their business. What can you do to maintain network compliance?

Automate Your Network Administration

Keeping operating systems and network configurations up to date is a top priority for network compliance. Each device that connects to your network needs to have up-to-date operating system security patches, anti-virus definitions, and malware threat prevention in order avoid un- intended intrusion of your network. There are abundant tools and managed services to help your business stay up to date without adding to your internal labor cost.

Proactively Monitor Your Network

Monitor your network to identify any systems that are out of compliance. Proactive monitoring can also identify unauthorized devices connected to your network. You can monitor your network traffic to identify unusual use of network bandwidth. Aside from slowing down your systems, excessive bandwidth may be the result of a malware-infected device that is exploiting your network.

Documenting Your Network Security Controls

Achieving compliance with documented security procedures including password policy, systems maintenance, backup procedures, and compliance measures, is critical to following most industry compliance regulations. It is a  best practice to update these procedures annually. Reviewing your Network Compliance policies gives your business an opportunity to stay up to date and serves as a reminder of the importance of maintaining network compliance.

Contact your Technology Advisor if you have questions about maintaining network compliance or other concerns regarding ransomware and other related Cyber Threats.

The post The Importance of Maintaining Network Compliance appeared first on Bizcom Networks.

]]>
How to Avoid Being a Ransomware Hostage https://www.bizcomnetworks.com/avoid-ransomware-hostage/ Thu, 04 May 2017 22:54:54 +0000 https://www.bizcomnetworks.com/3gtelco/avoid-ransomware-hostage/ Ransomware, spyware, phishing schemes, and other Cyber attacks are commonplace in today's world of technology. According to a recent article in Forbes, ransomware attacks grew at an accelerated pace in 2016 with reports of 638 million attacks, almost 200 times more than the number of ransomware attacks in 2015. Most experts agree that Ransomware attacks will continue to occur--so what can you do to avoid being a ransomware hostage?

The post How to Avoid Being a Ransomware Hostage appeared first on Bizcom Networks.

]]>
RansomwareRansomware, spyware, phishing schemes, and other Cyber attacks are commonplace in today’s world of technology. According to a recent article in Forbes, ransomware attacks grew at an accelerated pace in 2016 with reports of 638 million attacks, almost 200 times more than the number of ransomware attacks in 2015. Most experts agree that Ransomware attacks will continue to occur–so what can you do to avoid being a ransomware hostage?

Not All Ransomware is Created Equal

Before you panic, find out what type of Ransomware you are up against. Scareware is a type of Ransomware that tricks you into thinking you have a bigger problem. A simple scan may quickly remove the pop from your browser cache and get you back on your way. Some ransomware is truly nasty — your entire system may be encrypted, meaning you will need to wipe your system and start over if you have a good backup. Otherwise, you may find yourself hostage to the cybercriminals to unlock your data.

An Ounce of Protection is Worth a Pound of Ransom

Data protection is an important element in minimizing the impact of Ransomware. Make sure your network security is fully compliant. Backup your data, update your antivirus definitions and make sure your security patches are up to date. Consider using Cloud Backup, Security as a Service, and Managed IT services to keep your network up to date. Having a strong offense to avoid ransomware is your best defense.

Don’t Forget the Human Element

Train your employees on a regular basis on the importance of staying vigilant against Cyberattacks and how to avoid being a hostage. There are many resources to get training for your team. Periodic updates about threats and security procedures serve as a reminder to your employees to ensure they adhere to best practices.

If you need security training or are interested in a review of your network, security vulnerability, or other technology infrastructure, contact your Technology Advisor today.

The post How to Avoid Being a Ransomware Hostage appeared first on Bizcom Networks.

]]>
Reducing Business Risk with Backup and Disaster Recovery https://www.bizcomnetworks.com/reducing-business-risk-backup-disaster-recovery/ Wed, 12 Apr 2017 15:10:42 +0000 https://www.bizcomnetworks.com/3gtelco/?p=4975 Does your business have a backup and disaster recovery plan? Businesses of any size should know which applications--and their associated data--they rely on and what the cost of interruption would be in the event of an unintended disruption.

The post Reducing Business Risk with Backup and Disaster Recovery appeared first on Bizcom Networks.

]]>
Business ContinuityDoes your business have a backup and disaster recovery plan? Businesses of any size should know which applications–and their associated data–they rely on and what the cost of interruption would be in the event of an unintended disruption. Cyber Threat, natural disasters, and systems failures may impact your business; however, human error is said to be the top cause of data breach (58%), ahead of technology errors. To avoid unnecessary downtime, here are some questions to ask to help assess your backup and disaster recovery plans.

Assess the Risks of Data Loss and System Downtime

With Backup and Disaster Recovery there is always a balance between cost and risk. To allocate your technology spending, it is important to focus on your areas of exposure. Maybe your business relies heavily on an order-processing and invoicing system, or perhaps a manufacturing and inventory control system. If these systems go down you may lose revenue and productivity from employee idle time.  

You may also have intellectual property that is important to your business. What would be the consequence if this data was lost and could not be recovered? You may also have compliance exposure, if you suffered a breach of privacy or other data that should be encrypted was exposed. Assessing your risks and ranking the exposure is an important step to evaluate your backup and disaster recovery plan priorities.

Not all Backup Plans are Alike

For systems you rely on heavily, you may consider having an offsite failover system in the event of a data loss. This can minimize your downtime by enabling you to rapidly cut over to a live system running in parallel to your production environment. Having daily (or even hourly) backups of these systems will minimize downtime for your mission-critical applications and their data.

Other information, including files and other productivity applications, may not need such rapid recovery. Many File Sync and Share applications also provide real-time recovery using Cloud Backup technologies. For productivity applications, this may provide a cost-effective way for you to keep your team productive in the event of a data loss. Some data that may not reside in the cloud, however, needs weekly backup. This regular backup would allow the information to be recovered on an as-needed basis, ensuring continuity in a cost-effective manner.

Testing your Backup and Disaster Recovery Plan

Periodic testing of your backup and disaster recovery plan is suggested to ensure things are working, in order to minimize downtime and related business disruption. Size of data, network capacity, and other variables could extend your backup window beyond your time requirements. In addition, data may get corrupted during the backup process. So it is important to verify and test your backups to provide confidence in your ability to recover from a disaster.

Every business is different and will have different disaster recovery needs. To ensure that your backup and disaster recovery plan meets your needs, contact your technology advisor for an assessment.

The post Reducing Business Risk with Backup and Disaster Recovery appeared first on Bizcom Networks.

]]>
Is Your Network Ready for Cloud Backup? https://www.bizcomnetworks.com/network-ready-cloud-backup/ Mon, 20 Mar 2017 23:00:42 +0000 https://www.bizcomnetworks.com/3gtelco/?p=4962 Ransomware, Privacy Breach, Compliance requirements and Business Continuity make the case to protect your company's data. Cloud backup and Disaster Recovery as a Service (DRaas) require reliable network access to ensure your IT assets are backed up and available for rapid recovery.

The post Is Your Network Ready for Cloud Backup? appeared first on Bizcom Networks.

]]>
Cloud BackupRansomware, Privacy Breach, Compliance requirements and Business Continuity make the case to protect your company’s data. Cloud backup and Disaster Recovery as a Service (DRaas) require reliable network access to ensure your IT assets are backed up and available for rapid recovery. Today’s networks also support a range of applications including Hosted Email, SaaS, VDI, VoIP and Call Center Solutions. Your network needs to be in top shape to accommodate these demands. Here are some tips to determine if your network is ready for Cloud Backup.

Assess Your Network for Cloud Backup Readiness

When adding Cloud Backup, it is important to understand possible points of failure on your network before they happen. Consider starting with a Network Assessment to stress your network in a controlled environment, in order to determine your backup window. Database and file information on a regular backup schedule may impact your network performance if not properly optimized. Make sure your initial backup and incremental backups run smoothly by simulating peak loads for voice and data on your network. In addition, test your backup and recovery scenarios to identify weaknesses in a controlled environment. Proactive network monitoring can identify potential packet loss and latency that can impact connection speed and uptime. This testing is critical to avoid failed backup and recovery.  

Proactively Monitor Your Network for Security and Compliance

In addition to network usage, Malware and other unauthorized network access can slow your network performance and disrupt your backup and recovery. Your backup may fail when you need it most. Worse, remediating malware during a recovery scenario may delay your ability to bring critical systems back online when restoring from a Cloud-Based Backup. Making sure your network is secure and in compliance may avoid unnecessary downtime.

Cost Effective Network Performance

Technological innovation consistently drives down costs to make systems more efficient. Software Defined (SD) solutions for Wide Area Network and Storage create affordable options to provide secure and reliable Network and Cloud Backup solutions. Software Defined Wide Area Network (SD-WAN) provides centralized management and policy-based enforcement, making it faster to deploy and easier to manage networks across multiple remote sites. This helps ensure all your locations are ready for Cloud Backup.
Your network is the backbone of your systems infrastructure. If you are unsure if your Network is ready for Cloud Backup, contact your technology advisor today to find out more.

The post Is Your Network Ready for Cloud Backup? appeared first on Bizcom Networks.

]]>
Cybersecurity is Everybody’s Business https://www.bizcomnetworks.com/cybersecurity-everybodys-business/ Tue, 13 Dec 2016 23:32:44 +0000 https://www.bizcomnetworks.com/3gtelco/cybersecurity-everybodys-business/ It is no surprise, technology flattens the world for many businesses. What’s more, nearly every business sector finds it necessary to collect, maintain, analyze, and monetize user data. Many think Cybersecurity risks only apply to highly regulated industries, such as legal, healthcare and financial services.

The post Cybersecurity is Everybody’s Business appeared first on Bizcom Networks.

]]>
Cyber SecurityIt is no surprise, technology flattens the world for many businesses. What’s more, nearly every business sector finds it necessary to collect, maintain, analyze, and monetize user data. Many think Cybersecurity risks only apply to highly regulated industries, such as legal, healthcare and financial services.

Cybersecurity Risks Go Beyond Borders

Factors outside industry, including geographic considerations and sensitive consumer data, can create cybersecurity risks that need to be managed. These factors run the gamut of domestic and international laws, regulatory bodies, and private-party business agreements. Cybersecurity compliance can touch every business to some degree.

Internet of Things (IoT) and Cybersecurity

Adding to the list of concerns are non-traditional technologies entering your businesses network. IP-enabled technology called Internet of Things (IoT) is rapidly being adopted in the workplace.  The Cybersecurity threat is moving beyond desktops, laptops and services. A new generation of mobile devices–Point of Sale (POS), IP video surveillance, embedded sensors, VoIP, and others–is just the first wave of emerging technologies that need to be secured.

How to Minimize Cybersecurity Risks

There are many things a business can do to reduce Cybersecurity threats. According to the Computing Technology Industry Association (CompTIA), the following elements are the building blocks for a cybersecurity program:

  • Documented policies, procedures & standards

  • Asset management

  • Identity & access controls

  • Risk management

  • Vendor management

  • Physical & environmental security

  • Compliance

  • Privacy

  • Remote access

  • Data backups

  • Data destruction

Cybersecurity threats are a reality of today’s world. The risks of data compromise and/or loss can cost more than dollars; such risks can cost your reputation. Your business is only as secure as your Network. If you have questions about your business needs, ask your technology advisor about how to manage Cybersecurity threats to your business.

The post Cybersecurity is Everybody’s Business appeared first on Bizcom Networks.

]]>
Can You Afford a Data Loss? https://www.bizcomnetworks.com/can-afford-data-loss/ Wed, 07 Dec 2016 15:19:25 +0000 https://www.bizcomnetworks.com/3gtelco/can-afford-data-loss/ According to the technology industry research firm Gartner Group, ninety percent of companies that experience data loss go out of business within two years. Countless studies indicate the longer the downtime, the greater the risk. More and more businesses are turning to Cloud Backup and collation to ensure their critical data is protected. But how long will it take to restore that data when a disaster strikes? Here are some points to consider to minimize the risk of downtime.

The post Can You Afford a Data Loss? appeared first on Bizcom Networks.

]]>
Business ContinuityAccording to the technology industry research firm Gartner Group, ninety percent of companies that experience data loss go out of business within two years. Countless studies indicate the longer the downtime, the greater the risk. More and more businesses are turning to Cloud Backup and collation to ensure their critical data is protected. But how long will it take to restore that data when a disaster strikes? Here are some points to consider to minimize the risk of downtime.

Identify Critical Data

If you are an online business or rely on retail systems to keep your registers ringing, you could easily calculate the hourly loss due to system downtime. Similarly, manufacturers, distributors, healthcare organizations, and financial services firms all rely on mission-critical systems to keep employees productive and customers happy. How long could your business survive without email? More than likely, not very long. While more difficult to quantify, communications and collaborations are mainstays to employee productivity and interactivity. In addition to direct financial impact, consider the public relations consequence related to data loss.

Other files and productivity applications are also important to ongoing operations. However, there is a cost to rapid recovery. Understanding the tradeoffs between costs and how much time it takes to recover will help you balance the risks with the financial constraints.

Bullet Proof Your Network

Your network is a critical component for data backup and recovery. Some systems may have a backup window of several hours. A high-performance network can reduce the time it takes for backup and recovery. What’s more, an optimized network has less chance of downtime and connection loss. A flaky connection may reduce the integrity of your backup and impede progress during data recovery.

By monitoring your network you can identify performance bottlenecks, bandwidth constraints, and poorly performing hardware. Keeping your network up to date also reduces unforeseen risks from intrusion that can also impact your recovery time.

Test Your Backups Periodically

Data loss can occur for a variety of reasons. Unprotected systems may be stolen or become corrupted from Malware. Natural disasters including fire, earthquake, tornados, cyclones, and hurricanes may make data unavailable. Your data may fall victim to human error or hardware failure. Regardless of the reason, recovering from a data loss isn’t something any business wants to face.

Backup is really about recovery. Testing your backup provides a number of benefits. Missing files or systems components could cause delays during the recovery process. Data corruption may occur, leaving your backup useless. Network failure during backup may also add to the time it takes for your business to fully recover. By periodically testing your backup you can identify these issues before they occur and avoid common pitfalls associated with disaster recovery scenarios.

If you feel you cannot afford a data loss, research indicates you are not alone. Take the time to consult your technology advisor to minimize business risks from losing your critical data.

The post Can You Afford a Data Loss? appeared first on Bizcom Networks.

]]>
Business Continuity Essentials https://www.bizcomnetworks.com/business-continuity-essentials/ Wed, 20 Jul 2016 15:11:27 +0000 https://www.bizcomnetworks.com/3gtelco/business-continuity-essentials/ Business owners know there are a number of threats to business continuity. Next to employees, your IT systems and their data may be your most valuable assets. Your business may fall prey to Cyber attack or Data breach. Other factors, including adverse weather, fire, or interruption to utility supply, may also cause business disruption. Can your company recover from a catastrophic data loss? Use this Business Continuity Essentials guide to reduce the risk of downtime:

The post Business Continuity Essentials appeared first on Bizcom Networks.

]]>
Business ContinuityBusiness owners know there are a number of threats to business continuity. Next to employees, your IT systems and their data may be your most valuable assets. Your business may fall prey to Cyber attack or Data breach. Other factors, including adverse weather, fire, or interruption to utility supply, may also cause business disruption. Can your company recover from a catastrophic data loss? Use this Business Continuity Essentials guide to reduce the risk of downtime:

Business Continuity: Understanding Cost of Downtime

How much data do you need to recover to bring your business back from a disaster? Not all data may be essential immediately. However, some systems–including email–support other mission-critical systems and processes within your company. It is also important to know how long it will take to recover your data. Factor in your employees’ wages, plus overhead and potential loss of revenue, to get a sense of the overall risk of not having a Business Continuity and Disaster Recovery plan.

Having a Business Continuity Plan May Avoid Violation of Industry Regulations

Depending on your industry, backup and disaster recovery might be the law. Sarbanes-Oxley (SOX) makes business continuity and disaster recovery an imperative. Failure to comply could mean fines and even jail time. Other industries, including health services, must comply with the Health Insurance Portability and Accountability Act (HIPAA), which requires backing up data and making sure it is consistently available, even in a disaster. Understand regulatory requirements placed on your business, to avoid unnecessary consequences of a business interruption and data loss.

Data Protection with Belts and Suspenders

Relying on a local backup is not enough. The risk to your business resulting from a data loss is too high to rely on one backup method alone. Complement your local backup with Cloud Backup to ensure rapid recovery. Offsite archives of tape backups may not recover fast enough to avoid business interruption. It is also important to ensure your network supports a timely backup from a local source as well as from a Cloud backup and recovery system.

Test Your Backup to Ensure Rapid Recovery

Backup is all about recovery. Verifying your backup in a timely manner, and ensuring it actually works, is a critical step in your business continuity and disaster recovery plan. You should verify your backup periodically and check to make sure all data needed is included. By testing the recovery, you can identify any corrupted data along with network bottlenecks to restore your business to full operation.

If you have any questions about your business continuity and disaster recovery plan, contact your trusted technology advisor. If you are uncertain about your cost of downtime, compliance with industry regulations, or your company’s ability to recovery from a disaster, do not delay but seek guidance today.

The post Business Continuity Essentials appeared first on Bizcom Networks.

]]>
New Year’s Resolutions for Your IT Systems https://www.bizcomnetworks.com/new-years-resolutions-systems/ Tue, 15 Dec 2015 01:36:24 +0000 https://www.bizcomnetworks.com/3gtelco/new-years-resolutions-systems/ Are your IT Systems on the naughty or nice list? Do you proactively monitor your networks for compliance, cyberthreat and performance? Are your data back ups up to date? Have you begun your migration to the Cloud? Are you getting the most from your broadband network? Have you trained your employees on the risks of cybersecurity attacks and do they change their passwords regularly? Here is a list of things to add to your list of New Year’s resolutions for 2016.

The post New Year’s Resolutions for Your IT Systems appeared first on Bizcom Networks.

]]>
shutterstock_326576246Are your IT Systems on the naughty or nice list? Do you proactively monitor your networks for compliance, cyberthreat and performance? Are your data back ups up to date? Have you begun your migration to the Cloud? Are you getting the most from your broadband network? Have you trained your employees on the risks of cybersecurity attacks and do they change their passwords regularly? Here is a list of things to add to your list of New Year’s resolutions for 2016.

Proactive Network Monitoring

Your networks should be periodically monitored to ensure application and operating system (O/S) patches are up to date. In addition, you should maintain your anit-virus definitions and keep your malware threat detection up to date. By doing so, you could prevent an unwanted cybersecurity breach and data loss. Worse, loss of reputation resulting from data leaks or loss.

Beyond Backup

There are a variety of remote back up and data protection solutions to ensure you can recover your systems to keep your business running. It is a good idea to test those backups periodically to ensure you can restore your data quickly. Many older tape backup solutions can be slow and unreliable. What’s more, there are many new file sync and sharing solutions allowing your employees to securely access information anywhere. We put more and more reliance on our applications to run our daily operations, so make sure your data is protected in 2016.

Lift Your Business to the Cloud

Cloud Solutions offer many advantages over premise based systems. Using subscription based services help ensure you are always on the latest version. What’s more, you can shift some of your IT costs from a capital expense (Capex)  to an operating expense (Opex). Starting with migrating email, which is an easy first step, to clean up inboxes, secure and encrypt your communications and take many hassles out of IT. Considering following on with files, applications, single sign on and other IT infrastructure to gain the full benefit of Cloud Computing.

Broadband Network Review

Business class Internet services are as affordable as they have ever been. Consider a telecom expense audit to see if you are getting the most bandwidth for the buck. You may not only save money, you may increase your bandwidth and network performance. With mobile computing, cloud computing and eCommerce on the rise, it is important to get the most from your Broadband network.

Cyber Security Training for Employees

Ensure your employees can identify malware threats, man in the middle attacks, phishing schemes and other Cyber Security hacks. Your employees should have a good understanding of what to do in the event of a data loss (for example lost mobile device) and change their passwords periodically. Your employees are your first line of defense against Cyber Attack, so take the time to remind them of their role in protecting your IT Systems.

This is the time of year to spend with family and friends and reflect on the past, while looking forward to the future. Resolve to be the best you can be in 2016 and ensure your IT Systems are ready for prosperity in the new year.

The post New Year’s Resolutions for Your IT Systems appeared first on Bizcom Networks.

]]>
Business Continuity Planning: How Much Downtime Can You Afford? https://www.bizcomnetworks.com/business-continuity-planning-much-downtime-can-afford/ Tue, 08 Dec 2015 22:25:47 +0000 https://www.bizcomnetworks.com/3gtelco/business-continuity-planning-much-downtime-can-afford/ Having a Business Continuity Plan is an important way to ensure your company can operate during and after a disaster. By assessing your business risk, you are able to protect your company and minimize downtime that may occur from unplanned business interruptions. Natural disasters including fire, earthquake, flooding and snowstorms can slow or halt operations. In addition, other threats including cyber attacks and data leaks can cause unplanned disruptions to your business. The impact of prolonged unplanned downtime can be reduced and or eliminated.

The post Business Continuity Planning: How Much Downtime Can You Afford? appeared first on Bizcom Networks.

]]>
DecidingOptionsHaving a Business Continuity Plan is an important way to ensure your company can operate during and after a disaster. By assessing your business risk, you are able to protect your company and minimize downtime that may occur from unplanned business interruptions. Natural disasters including fire, earthquake, flooding and snowstorms can slow or halt operations. In addition, other threats including cyber attacks and data leaks can cause unplanned disruptions to your business. The impact of prolonged unplanned downtime can be reduced and or eliminated, but at what cost? Here are three things to consider when developing your Business Continuity Plan.

What is Your Cost of Downtime?

To develop a Business Continuity and Disaster Recovery Plan it is imperative to evaluate your risk of loss from downtime and business interruption. There are many factors to consider when calculating the risk of loss due to downtime. How much revenue would you lose per hour, day or week if your business was off line and you were unable to process orders? Could your inventory lose value if your factory, warehouse or retail operation were shut down? If you suffered a privacy breach what would be the impact to your company’s reputation? The risks and costs are different for each company based on industry, size and other factors. Start by assessing the risk to determine how quickly you need to react during and after a disruption.

How Fast do You Need to Recover (RTO vs RPO)?

The cost of downtime to your business is expensive. It is important to evaluate which applications and data are critical to your operations. During or after a disaster do you need these systems available within minutes, hours or days? Primary Factors that can influence your ability to recover are the Recovery Point Objectives (RPO), which is the time between backups and the Recovery Time Objective (RTO), which is how long it takes to get your data back. If you backup weekly to offline media including tape backup, your business is at risk of losing one week of data and it may take days or weeks to get your systems operational. There are various ways to ensure failover and rapid restore if you suffer a system wide outage. Cloud Backup and Disaster Recovery, Infrastructure as a Service (Iaas) including application hosting and other remote data protection methods can ensure your systems are available within your RPO/RTO goals.

Human Element of a Business Continuity Plan

Don’t forget the human element in your business continuity plan. Ensure your employees are trained and understanding policy during and after a disaster. Have a plan for safe evacuation during a disaster will protect your employees and minimize business risk. Giving your employees the ability to access core communications and collaborations applications like email, file sharing, wide area networks, software as a service (SaaS) and other remote applications improve overall communications and could get your employees productive if they are unable to work on premise due to business interruption.

There are many other factors to consider when assessing risk and building a business continuity and disaster recovery plan. Take a holistic view of your business, systems and network security needs. If you feel your business may be at risk and your business continuity plan is out of date, contact your IT Service Professional for a Business Continuity and Disaster Recovery Risk Assessment.

 

The post Business Continuity Planning: How Much Downtime Can You Afford? appeared first on Bizcom Networks.

]]>