Disaster recovery strategies for effective business continuity

Issue 3 2022 Infrastructure

Not having access to critical data for even a few hours can cause irreparable damage in the form of lost business, fines and reputational damage. According to Gartner, the average cost of IT downtime is US$5600 per minute.

Whether it’s ransomware, riots or the malicious behaviour of a disgruntled employee, for organisations to recover effectively from a disaster they first need to be sure all their critical data is backed up. However, given the complex nature of today’s multi and hybrid cloud IT environments, there’s every chance they won’t know they have everything valuable protected until it’s too late.

Keeping track of data on multiple different platforms and having visibility of it all is already a major headache for IT departments, never mind ensuring business-critical data is backed up. Therefore it’s important to deploy a backup and recovery solution with the widest coverage and the ability to identify gaps in protection.

Downtime is costly enough when it results from accidental failures in technology, but when it’s down to hackers or malicious behaviour, the monetary consequences can soar to an alarming, often business-ruining rate. The expansion of data across on-premises infrastructure, cloud infrastructure (public, private and multi-cloud), SaaS applications and endpoint devices has only increased the attack surface.

The potential vulnerabilities, arising from configuration weaknesses, are providing cyber-criminals with greater opportunities to wreak havoc.

Adopting a layered defence-in-depth approach with the latest anti-malware for backups enhances the ability to spot zero-day threats, which can make all the difference in avoiding encryption and downtime, as well as exfiltration and extortion. Deploying multiple methods to protect your environment also conforms with guidance recommended by leading government communications and cybersecurity agencies.

There’s no way of keeping on-premises, cloud or SaaS infrastructure or applications 100% safe from a ransomware attack, so it’s vital to protect backups. Whatever malware detection is deployed to scan live data, it makes no sense to use the same for backups. If the software simply checks for the same signatures, malicious files will be missed in both live and backup data.

Deploying a solution that harnesses artificial intelligence (AI) to police backups and detect threats not only verifies the health of backups, it provides yet another chance to spot ransomware before it encrypts everything.

Backup strategy to enable successful recoveries

Air gap: Guarantee that the primary and backup storage systems are physically separated. Bad actors won’t be able to access the backup data copies because of this physical break.

3-2-1-1 strategy: The most recent best practice provides three copies of data, two separate media for backup storage, one offsite backup storage location (online) plus an offsite backup storage location (offline/air gapped).

Backup data malware detection and removal: Ransomware frequently stays idle on a network for long periods of time before encrypting systems, ensuring that it is present in all backup versions, making malware-free recovery impossible. To effectively protect against ransomware, the capacity to detect and remove ransomware from backup data, as well as having an isolated location in which to restore data, has become critical.

Instant/rapid recovery flexibility: Downtime can be just as detrimental as data loss. To be effective, a backup strategy must allow users to get back to work quickly by allowing temporary access to data if needed and prioritising crucial data recovery if it is required.

Backups are the best last line of defence for ensuring a quick recovery, but critical to this is the ability to test those systems on a regular basis to ensure they are working correctly. Your solution should deliver access to files and information immediately in the event of a disaster and the technology exists that allows you to stream on demand whatever is required to keep employees working, while the rest of your data is restored in the background.

Establishing, refining and recording DR steps will improve your operational response and minimise disruption, should an incident occur. An efficient and cost-effective way to do this is to have your backed-up systems and data presented for temporary access as a virtual drive and for permanent recovery to a destination of your choice.

With a cloud-based backup and recovery platform you can also avoid the expense of duplicate data centres and failover infrastructure that sit idle most of the time. A good solution should allow you to start protecting multiple sites on day one with zero upfront costs and scale infinitely with total cost predictability, while regular testing of your disaster recovery processes should give you peace of mind and the confidence that you can respond rapidly in the event of a crisis.

Redstor, the MSP’s backup and recovery platform, offers the simplest, smartest way to serve customers and drive profitability. The solution unifies backup and recovery to protect modern, legacy and SaaS infrastructure with a single app. Streaming provides instant data access and fast recovery, with AI finding and automatically removing malware for safe restores.

Learn more at www.redstor.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.