Understanding business continuity

February 2014 Security Services & Risk Management

The endemic lack of understanding of what constitutes proper business continuity and disaster recovery is putting entire industries in South Africa at risk, says James Beaumont, CEO at iSquared.

“Many companies confuse equipment – such as tape backup devices – with business continuity (BC), without understanding the real business requirements of BC. And when disaster strikes, they are woefully unprepared; often with crippling consequences.”

A recent survey of 250 local IT professionals commissioned by EMC highlighted a lack of understanding of business continuity. 74% of those surveyed are not very confident they can fully recover from a disaster, with 52% saying they had suffered from lost data or system downtime in the past year, and 38% reporting a loss of revenue as a consequence. Worryingly, 39% reported an increase in spending on backup and recovery following a recent disruption, bringing the confusion over the respective roles of backup, archiving and business continuity into stark relief.

Beaumont puts it into context: “Backup is when a user works on a file, spills his coffee on the console and the file becomes corrupted. He needs to go back to an earlier version of the file – a backup.

“Archiving is chiefly a compliance issue. SARS, the Financial Services Board, FAIS, and legislation such as POPI, all require some form of regulatory compliance relating to specific aspects of data storage. For example, companies in the health and safety industries need to store data for an infinite period of time. This data needs to live somewhere; hence, archiving.”

Business continuity, however, is more complex and far more business-critical. “If I’m a factory owner running a manufacturing resource planning and enterprise resource planning system and the system fails, my factory stops functioning. You need business and IT systems custom-built, designed and tested to fully restore your operations; this is business continuity.”

According to Beaumont, companies need to start by determining two things: how much data they can afford to lose in case of a disaster – the recovery point objective (RPO) – and how long they can take before they’re up and running again – the recovery time objective (RTO).

“Some companies will lose R10m per day if they’re down; others might lose tens of millions per hour. In these cases, the RPO and RTO will be very low. For a financial services client running a trading platform, the cost of not being able to effect a trade due to interruption of services could amount to billions of rands. In this case, the RPO is 0.”

New technology does allow companies to meet these low RPOs with less complexity and lower cost than before. Faster and lower cost bandwidth, accessibility of fibre in the last mile, and the advent of virtualisation technology and cloud-based services all form part of modern, world-class business continuity solutions. However, many companies are still stuck using antiquated technology.

The same EMC report showed that 44% of respondents still use backup tape to recover from a disaster, but that 82% would like to move away from tape altogether. Beaumont says that the audit firms are perpetuating this lack of understanding of proper business continuity by making physical tape backups a key requirement for an unqualified audit.

“On the one hand it forces companies to use unsuitable solutions for their disaster recovery needs. More alarmingly, however, is that many IT professionals are lulled into a false sense of security that tape backups will fulfil their business continuity needs. We need a radical shift in how business continuity is seen in a broader business context if we want to build truly effective and robust solutions that will meet the stringent demands of today’s business environment.”

For more information contact iSquared, +27 (0)21 671 5778, james@isquared.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Africa’s opportunity to shape the future of human-centred AI
AI & Data Analytics Security Services & Risk Management
Across the Global South, countries are not yet locked into decades of legacy AI systems, energy-intensive infrastructure, or governance frameworks designed for a different technological era. That creates something rare in technology development: a cleaner slate.

Read more...
AURA appoints Taryn Winer as global head of people
News & Events Security Services & Risk Management
Following its €13,5 million Series B funding round last year and accelerating international expansion, particularly across the United States, AURA has appointed Taryn Winer as global head of people.

Read more...
95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...
Understanding the Shared Responsibility Model
Infrastructure Security Services & Risk Management
While the cloud can certainly be a growth enabler in many ways, it can also introduce new security risks. Companies want to have a clear understanding of where their security duties end and where their cloud service provider’s begin.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.