classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


Six 'gotchas' of disaster recovery
February 2012, Security Services & Risk Management

The images and stories coming out of Japan following the devastating earthquake and tsunami and recently repeated in end-of-year reviews, inevitably lead to people wondering, “What would I do if the earth moved or water flooded my state, city or neighbourhood?”

The floods in Thailand in late 2011 that have resulted in hard drive shortages are another example of disasters that can affect business continuity.

From a business perspective, much of disaster planning revolves around all-important data backup and recovery processes. Whether a disruption is the result of a cataclysmic event or a hardware malfunction, real business continuity cannot be maintained in this digital age without off-site backup. However, offsite data backups are no magic solution for disaster recovery. There is a lot more to the story.

Many factors can complicate the recovery process if businesses are not careful. Here are six of the biggest issues organisations may face as they plan for continuity.

Philip Lieberman, CEO and president, Lieberman Software
Philip Lieberman, CEO and president, Lieberman Software

Backup activation keys and licensing

Application data is not much good if your company has not backed up the activation keys and licensing necessary to restore its software licences. Many organisations forget how important it is to keep duplicates of the activation and licensing information in safe and redundant locations to ensure a quick recovery after a disruption.

Securely store encryption keys

Similarly, encrypted backup tapes are about as useful as doorstops when an organisation loses its encryption key information. Recent public-sector data breaches have proven that organisations cannot get by with keeping backup data unencrypted. This makes it critical for you to plan and execute a key management strategy; you will need to think about how keys will be stored and recovered to assure a smooth data recovery process

Account for application customisations

Many organisations will spend millions of pounds on consulting fees to create customised modules and settings for enterprise software only to see it all go up in smoke following a disaster. A big mistake businesses often make is to back up all of the appropriate application data but forget about duplicating customisation information. Remembering to fill this gap ahead of time can not only save money, but also prevent prolonged business disruption following an incident.

What if a super user is incapacitated?

The saga of Terry Childs, the former San Francisco city network administrator who refused to divulge key infrastructure passwords to his bosses, should teach all organisations the lesson that it is never wise to entrust all of your critical account login information to one super user. This is a single point of failure in privileged identity that can be particularly painful if an individual who keeps critical login information in his or her head passes away.

Childs eventually saw the light after some jail time, but if the keeper of your organisation’s password secrets is no longer alive, intimidation will not solve your problem. This scenario highlights the importance of distributed, fault-tolerant processes and tools that allow you to replicate accounts. Doing so will give your organisation the peace of mind that it can recover systems and accounts in the event of a major catastrophe or should key staff become incapacitated – or simply out of reach.

Do not let VMs prevent partial recovery

The fact that most backup and recovery operations are all-or-nothing propositions did not pose much of a problem a few short years ago. But the wide-scale adoption of virtualisation has thrown a wrinkle into many disaster recovery plans. During the triage stage that often follows a disruption, organisations may need to immediately recover only a piece of the infrastructure – say, one critical virtualised server that handles e-mail messaging. But the nature of VMs makes it impossible to restore one machine without many others. As organisations think about business continuity, they really need to plan for partial recovery of the most critical business services first.

The cloud cannot save you

Disaster recovery is often at the top of the laundry list of benefits touted by public cloud vendors. True, the flexibility and resiliency of the cloud can promote continuity for data contained within that architecture. But that is the big catch. Much of your data is not contained in the cloud and never will move there.

In fact, if your organisation faces any of today’s prevailing regulatory compliance mandates it is likely that your most sensitive data will remain in-house. So, any but the smallest organisation that pins its disaster recovery hopes on the cloud may need to rethink those assumptions.

When laying out their disaster recovery plans, organisations should repeatedly seek out their worst-case scenarios. And they should be testing their recovery efforts. Businesses often struggle with recovering from a disaster because they have never actually practiced the procedures they have planned. Resource limitations and fear of downtime often keep organisations from achieving the ideal full recovery simulations, but at the very least organisations should perform repeat, limited recovery testing.

Doing so can not only streamline your future recovery, but can also test how well your IT vendors stand behind their promises. You could be surprised how some vendors struggle to meet their SLAs, while others bend over backwards – even if it is not spelled out in the contract.


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Combating the evolving threat of fraud
    May 2018, Technews Publishing, This Week's Editor's Pick, Security Services & Risk Management
    It is impossible to pin an exact number on how much fraud costs the South African economy, but analysis of leading research reports on the subject puts it easily in the billions of Rands per year.
  • Trust, but verify
    May 2018, iFacts, LexisNexis, Managed Integrity Evaluation, This Week's Editor's Pick, Security Services & Risk Management
    Employee screening is not a new discipline, but the options have grown to assist HR in making the right hiring decision.
  • Do more with security
    May 2018, Johnson Controls, This Week's Editor's Pick, Integrated Solutions, Security Services & Risk Management
    Current trends predict that companies do more with their security solutions than just secure their people, assets or data in the near future.
  • Active Track
    Securex 2018 Preview, Active Track, Asset Management, EAS, RFID, Security Services & Risk Management
    Active Track is a workforce management and reduction of payroll specialist. Its products optimise clients’ security services by ensuring that patrols and duties are carried out on time, every time. The ...
  • Martin Electronics
    Securex 2018 Preview, CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection, Security Services & Risk Management
    Martin Electronics will be showcasing a number of new products and solutions under the Sentry brand at Securex 2018. The company will also have some value-added additions and integrations on display, ...
  • HISSCO International
    Securex 2018 Preview, Hissco, Access Control & Identity Management, Asset Management, EAS, RFID, Security Services & Risk Management
    HISSCO International will be showcasing its range of security X-ray and detection systems at this year’s Securex. The company is currently seeking potential partners, distributors and representatives ...
  • Turnstar
    Securex 2018 Preview, Turnstar Systems, Perimeter Security, Alarms & Intruder Detection, Access Control & Identity Management, Security Services & Risk Management
    Africa’s largest manufacturer of physical access control products, Turnstar, is excited about its return to Securex this year. Craig Sacks, MD of Turnstar, says that the company will use the Securex platform ...
  • Tagtron Solutions
    Securex 2018 Preview, Quality Label Solutions t/a TagTron Solutions, Asset Management, EAS, RFID, Perimeter Security, Alarms & Intruder Detection, Security Services & Risk Management
    Tagtron Solutions will showcase a number of systems and innovations at Securex 2018. As specialists in display security, Tagtron supplies anti-theft products for protecting goods on open display. The ...
  • ZKTeco South Africa
    Securex 2018 Preview, ZKTeco, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection, Security Services & Risk Management, Products
    Solutions is what ZKTeco is all about for Securex 2018. ZKTeco South Africa will be offering clients an insight into how its products can be integrated into any platform and provide them with a solution ...
  • TeleEye South Africa
    Securex 2018 Preview, TeleEye (South Africa), CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection, Security Services & Risk Management
    It is well known that farm attacks and farm murders are increasing at an alarming rate in South Africa. According to Afriforum’s latest stats, 156 commercial farmers are murdered per 100 000 people. There ...
  • Trackforce
    Securex 2018 Preview, Security Services & Risk Management
    Trackforce offers an advanced security services management solution that increases workforce accountability, improves operational productivity and enables better communication between all stakeholders. ...
  • Seagate
    Securex 2018 Preview, Seagate Technology, CCTV, Surveillance & Remote Monitoring, Security Services & Risk Management, Products
    In line with its participation at Securex 2018, Seagate has announced that it will be showcasing the SkyHawk AI, the very first drive created specifically for artificial intelligence (AI)-enabled video ...

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.