Is your business continuity and disaster recovery up to scratch?

1 August 2019 Security Services & Risk Management, Infrastructure

Business Continuity (BC) and Disaster Recovery (DR) have become imperative to ensure organisations can handle the many different elements that may affect their data and thus their ability to operate. However, while the terms are often used interchangeably they are not in fact the same thing. A DR plan is the domain of the IT department and forms part of the overall BC strategy, which needs to be championed by the business as a whole. There are many different elements that make up a DR and BC plan, which organisations need to ensure they have in place for adequate protection.

The first step is to understand and quantify requirements by prioritising business critical systems and identifying the relevant data locations, according to risk, dependencies and core value to business. Once this has been assessed, only then can the organisation understand whether the systems and data need to form part of the BC or DR plan. It is also important to consider the impact of a mobile workforce on the type and location of data that needs to be included in any plan or strategy.

Another element that needs to be considered, especially with South Africa’s power situation in a state of flux, is an alternate power source for mission critical systems. While these can be costly to obtain and maintain, should the power situation worsen they will be invaluable. In order to optimise the investment, the power supply needs to be driven by the extent of the business requirement and dependence on systems and data accessibility.

DR plans can turn out to be less than effective if they are not implemented correctly, or for that matter if they are not tested on a regular basis. Data management specialists will be able to help an organisation to evaluate its data so that only relevant data is backed up and protected, saving the business in storage and recovery costs. However, testing is the most important step in ensuring that there are no holes or problems in the BC and DR plan. Businesses need to ensure data recoverability and this process must be tested frequently – only doing successful backups means nothing if the data cannot be recovered and restored. Most organisations asses their backup plan annually, but this is not often enough, especially with businesses that are rapidly evolving and the exponential growth of business data and data reliance.

While technology is an important component of DR, it is also vital to take the bigger picture into account. Both DR and BC also involve the management of people and processes that will affect the technology. This means that business and IT need to work together to ensure that BC and DR are effective and up to date to meet the needs of the organisation.


Hemant Harie

Establishing proper reporting procedures is critical. In the event of a disaster, the last thing an organisation should be doing is trying to remember what needs to happen next in the BC or DR strategy or for that matter, who is accountable for executing which aspect of the strategy and for which business unit. Business and IT custodians also need to ensure access to the relevant resources is maintained. This must include regular reporting on any changes to requirements, which may be impacted during a disaster.

It is also key that businesses engage with the right service provider to ensure a proper analysis of their backup requirements and testing. Although conducting tests internally may seem more efficient, they are not always accurate and can be skewed. Organisations need to have peace of mind that their data is accessible, protected and available at all time, so that they can focus on maintaining business functionality when any sort of disaster impacts their operations.

For more information, contact Gabsten Technologies, +27 87 654 1615, nora@gabsten.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
The year of machine deception
Security Services & Risk Management AI & Data Analytics
The AU10TIX Global Fraud Report, Signals for 2026, warns of the looming agentic AI and quantum risk, leading to a surge in adaptive, self-learning fraud, and outlines how early warning systems are fighting back.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
Beagle Watch named best security company in Johannesburg
News & Events Security Services & Risk Management
Beagle Watch Armed Response has been named Johannesburg’s Best Security Company in the 2025 Best of Joburg Awards, surpassing about 26 nominated private security firms in the greater Johannesburg region, thanks to overwhelming public support.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
The HR Trap
Security Services & Risk Management Training & Education
When human resources becomes a risk factor. Andre du Venage examines why your CCTV security and other technology risks are covered, but human resources are often overlooked.

Read more...
AI rewrites financial crime
Security Services & Risk Management Financial (Industry)
Criminals are exploiting South Africa’s high connectivity and still-maturing regulation to scale attacks faster than we can defend them. The speed and sophistication of these scams are outpacing the systems designed to stop them.

Read more...
Strengthening organisational integrity in 2026 and beyond
iFacts Security Services & Risk Management
In 2026, the risks facing organisations, whether in the corporate sector or government, will be more complex and far-reaching. Employee screening will have to be more complex and comprehensive.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.