Considering cloud downtime insurance?

Issue 7 2022 Information Security, Infrastructure, Security Services & Risk Management

Cloud downtime insurance has taken off in recent years, and with good reason. Downtime insurance providers cover clients for short-term cloud outages, network crashes and platform failures that last up to 24 hours. And they happen often.


Byron Horn-Botha.

Cloud insurance provider Parametrix notes that, on average, one of the three major public cloud providers – Microsoft Azure, AWS and Google Cloud – has an outage lasting at least 30 minutes every three weeks.

As cloud computing becomes ubiquitous, more companies are exposed to incidents that cause downtime, which can be disastrous. Gartner cites the average cost of IT downtime at a staggering $5600 a minute. Let’s also factor in the additional costs that don’t necessarily show up as monetary losses, such as the cost of an interruption that pulls IT people away from their regular work to get your company back up and running.

It is one reason why cloud downtime insurance can be a helpful safety net for businesses, but it is not a complete solution. It’s important to remember that this kind of insurance can’t guarantee that your business remains in operation during a period of downtime. Whilst it will cover any short-term losses you incur, it will not cover the loss of goodwill, damage to your brand reputation, and loss of customer loyalty when your business can’t deliver.

So, the bottom line is that instead of placing 100% reliance on cloud downtime insurance, businesses need to put strategies in place if they are to weather the cloud downtime storm and other unexpected events.

1: Have a sound recovery plan

Think your data is safe and secure when you move it to a cloud provider? Think again. Last year, a fire at the data centre of French web hosting service OVHcloud (Europe’s largest cloud provider) caused the loss of massive amounts of customer data. It impacted government agencies, e-commerce companies and banks, to name just some entities.

Backing up your data to the cloud or on-premise is a critical and cost-effective first step in any disaster recovery plan – but this is only the beginning. It would help if you also had a plan to recover your data in an emergency quickly. You must also test your recovery plan often. You should simulate disruptions and see how well your recovery plan works. You should also regularly test your backup images and address any problems.

2: Implement your backup and recovery solution

Cloud security is not solely the responsibility of your cloud provider. It’s your responsibility as well. Cloud providers usually promise to secure their infrastructure and services. But securing operating systems, platforms and data is your responsibility. Read the small print.

Cloud providers will not guarantee the safety of your data. No matter what cloud platform you use, the data is still owned by you, not the provider. Many cloud providers recommend that their customers use third-party software to protect their data.

You can comprehensively secure your data with a reliable cloud backup and recovery solution. You can also get the control you need. You should implement a cloud backup and recovery solution that protects your data by automatically backing up your information every 15 minutes, giving you multiple recovery points. It also guarantees that your data is continuously protected while providing quick access and visibility 24/7.

3: Be proactive: be data resilient

A lot of companies don’t test their data recovery plans. Many don’t even have a recovery plan, which is very short-sighted. It is crucial to be proactive, not reactive, and, above all, data-resilient.

A data resilience strategy ensures business continuity in the event of a disruption. It is built on recovery point objectives (RPOs) and recovery time objectives (RTOs), and you should regularly test to guarantee that the RPOs and RTOs can be achieved.

Your RPO determines your backup frequency. In essence, it’s your tolerance for data loss. Some organisations can tolerate a data loss of 24 hours, so they back up their data every 24 hours. Their RPO is 24. Other businesses, such as those in finance and healthcare, absolutely cannot tolerate a data loss of 24 hours. Their RPOs are set to milliseconds.

Your RTO measures the downtime you can accept between a data loss and recovery. It’s how long you can be down before your business incurs severe damages. Your RTO determines your disaster recovery plan investment. If your RTO is one hour, you need to invest in solutions that get you back up and running within that hour.

Establishing your RPO and RTO, and then implementing the solutions you need to achieve them, are the keys to data resilience.

Final takeaway

We live in a world of growing cybersecurity threats, more frequent natural disasters, and black swan events arriving in flocks. Every day, organisations are brought to their knees out of the blue. That’s why more of them are purchasing cloud downtime insurance. But it is critical to understand that this type of insurance alone does not constitute a data protection plan. It is best viewed as an accessory to your backup and recovery efforts. Never consider it a replacement.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
The role of drones in farm protection
Agriculture (Industry) Security Services & Risk Management
Laurence Palmer reminds us of the role drones play in agricultural security and offers a free security risk assessment template for downloading (link at the end of the article).

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...
Credential theft surges in South Africa
NEC XON Information Security
NEC XON issues a critical cybersecurity warning about the dual threat of massive credential theft and AI-powered cyberattacks sweeping across the region, with an increasing number of incidents and evolving threat tactics.

Read more...
Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.