Understanding business continuity

February 2014 Security Services & Risk Management

The endemic lack of understanding of what constitutes proper business continuity and disaster recovery is putting entire industries in South Africa at risk, says James Beaumont, CEO at iSquared.

“Many companies confuse equipment – such as tape backup devices – with business continuity (BC), without understanding the real business requirements of BC. And when disaster strikes, they are woefully unprepared; often with crippling consequences.”

A recent survey of 250 local IT professionals commissioned by EMC highlighted a lack of understanding of business continuity. 74% of those surveyed are not very confident they can fully recover from a disaster, with 52% saying they had suffered from lost data or system downtime in the past year, and 38% reporting a loss of revenue as a consequence. Worryingly, 39% reported an increase in spending on backup and recovery following a recent disruption, bringing the confusion over the respective roles of backup, archiving and business continuity into stark relief.

Beaumont puts it into context: “Backup is when a user works on a file, spills his coffee on the console and the file becomes corrupted. He needs to go back to an earlier version of the file – a backup.

“Archiving is chiefly a compliance issue. SARS, the Financial Services Board, FAIS, and legislation such as POPI, all require some form of regulatory compliance relating to specific aspects of data storage. For example, companies in the health and safety industries need to store data for an infinite period of time. This data needs to live somewhere; hence, archiving.”

Business continuity, however, is more complex and far more business-critical. “If I’m a factory owner running a manufacturing resource planning and enterprise resource planning system and the system fails, my factory stops functioning. You need business and IT systems custom-built, designed and tested to fully restore your operations; this is business continuity.”

According to Beaumont, companies need to start by determining two things: how much data they can afford to lose in case of a disaster – the recovery point objective (RPO) – and how long they can take before they’re up and running again – the recovery time objective (RTO).

“Some companies will lose R10m per day if they’re down; others might lose tens of millions per hour. In these cases, the RPO and RTO will be very low. For a financial services client running a trading platform, the cost of not being able to effect a trade due to interruption of services could amount to billions of rands. In this case, the RPO is 0.”

New technology does allow companies to meet these low RPOs with less complexity and lower cost than before. Faster and lower cost bandwidth, accessibility of fibre in the last mile, and the advent of virtualisation technology and cloud-based services all form part of modern, world-class business continuity solutions. However, many companies are still stuck using antiquated technology.

The same EMC report showed that 44% of respondents still use backup tape to recover from a disaster, but that 82% would like to move away from tape altogether. Beaumont says that the audit firms are perpetuating this lack of understanding of proper business continuity by making physical tape backups a key requirement for an unqualified audit.

“On the one hand it forces companies to use unsuitable solutions for their disaster recovery needs. More alarmingly, however, is that many IT professionals are lulled into a false sense of security that tape backups will fulfil their business continuity needs. We need a radical shift in how business continuity is seen in a broader business context if we want to build truly effective and robust solutions that will meet the stringent demands of today’s business environment.”

For more information contact iSquared, +27 (0)21 671 5778, james@isquared.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
From digital transformation to digital sovereignty
Security Services & Risk Management IoT & Automation
As cyberthreats grow, data regulations tighten, and AI becomes central to economic competitiveness, countries are recognising the need to control and protect their own digital assets.

Read more...
The age of Lean 4.0: Orchestrating intelligence and efficiency
Security Services & Risk Management
The convergence of Lean principles and AI (what we now call Lean 4.0) is no longer a theoretical exercise; it is the defining operational paradigm for survival and growth in a complex, data-intensive economy.

Read more...
Risks of open-source intelligence escalating in crime
Security Services & Risk Management Residential Estate (Industry) Smart Home Automation
CMS estimates that open-source intelligence has played a role in 20 - 30% of robberies over the past 12 months. In cybercrime, global research consistently shows that many offences rely on some form of open-source data exploitation.

Read more...
Seeing is no longer believing
Security Services & Risk Management
Fraud has shifted. It is no longer just about financial theft; it is about identity theft in the most visceral sense. The most effective control is often completely non-technical: the ‘pause and verify’ rule.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.