Is your business continuity and disaster recovery up to scratch?

1 August 2019 Security Services & Risk Management, Infrastructure

Business Continuity (BC) and Disaster Recovery (DR) have become imperative to ensure organisations can handle the many different elements that may affect their data and thus their ability to operate. However, while the terms are often used interchangeably they are not in fact the same thing. A DR plan is the domain of the IT department and forms part of the overall BC strategy, which needs to be championed by the business as a whole. There are many different elements that make up a DR and BC plan, which organisations need to ensure they have in place for adequate protection.

The first step is to understand and quantify requirements by prioritising business critical systems and identifying the relevant data locations, according to risk, dependencies and core value to business. Once this has been assessed, only then can the organisation understand whether the systems and data need to form part of the BC or DR plan. It is also important to consider the impact of a mobile workforce on the type and location of data that needs to be included in any plan or strategy.

Another element that needs to be considered, especially with South Africa’s power situation in a state of flux, is an alternate power source for mission critical systems. While these can be costly to obtain and maintain, should the power situation worsen they will be invaluable. In order to optimise the investment, the power supply needs to be driven by the extent of the business requirement and dependence on systems and data accessibility.

DR plans can turn out to be less than effective if they are not implemented correctly, or for that matter if they are not tested on a regular basis. Data management specialists will be able to help an organisation to evaluate its data so that only relevant data is backed up and protected, saving the business in storage and recovery costs. However, testing is the most important step in ensuring that there are no holes or problems in the BC and DR plan. Businesses need to ensure data recoverability and this process must be tested frequently – only doing successful backups means nothing if the data cannot be recovered and restored. Most organisations asses their backup plan annually, but this is not often enough, especially with businesses that are rapidly evolving and the exponential growth of business data and data reliance.

While technology is an important component of DR, it is also vital to take the bigger picture into account. Both DR and BC also involve the management of people and processes that will affect the technology. This means that business and IT need to work together to ensure that BC and DR are effective and up to date to meet the needs of the organisation.


Hemant Harie

Establishing proper reporting procedures is critical. In the event of a disaster, the last thing an organisation should be doing is trying to remember what needs to happen next in the BC or DR strategy or for that matter, who is accountable for executing which aspect of the strategy and for which business unit. Business and IT custodians also need to ensure access to the relevant resources is maintained. This must include regular reporting on any changes to requirements, which may be impacted during a disaster.

It is also key that businesses engage with the right service provider to ensure a proper analysis of their backup requirements and testing. Although conducting tests internally may seem more efficient, they are not always accurate and can be skewed. Organisations need to have peace of mind that their data is accessible, protected and available at all time, so that they can focus on maintaining business functionality when any sort of disaster impacts their operations.

For more information, contact Gabsten Technologies, +27 87 654 1615, nora@gabsten.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.