Considering cloud downtime insurance?

Issue 7 2022 Information Security, Infrastructure, Security Services & Risk Management

Cloud downtime insurance has taken off in recent years, and with good reason. Downtime insurance providers cover clients for short-term cloud outages, network crashes and platform failures that last up to 24 hours. And they happen often.


Byron Horn-Botha.

Cloud insurance provider Parametrix notes that, on average, one of the three major public cloud providers – Microsoft Azure, AWS and Google Cloud – has an outage lasting at least 30 minutes every three weeks.

As cloud computing becomes ubiquitous, more companies are exposed to incidents that cause downtime, which can be disastrous. Gartner cites the average cost of IT downtime at a staggering $5600 a minute. Let’s also factor in the additional costs that don’t necessarily show up as monetary losses, such as the cost of an interruption that pulls IT people away from their regular work to get your company back up and running.

It is one reason why cloud downtime insurance can be a helpful safety net for businesses, but it is not a complete solution. It’s important to remember that this kind of insurance can’t guarantee that your business remains in operation during a period of downtime. Whilst it will cover any short-term losses you incur, it will not cover the loss of goodwill, damage to your brand reputation, and loss of customer loyalty when your business can’t deliver.

So, the bottom line is that instead of placing 100% reliance on cloud downtime insurance, businesses need to put strategies in place if they are to weather the cloud downtime storm and other unexpected events.

1: Have a sound recovery plan

Think your data is safe and secure when you move it to a cloud provider? Think again. Last year, a fire at the data centre of French web hosting service OVHcloud (Europe’s largest cloud provider) caused the loss of massive amounts of customer data. It impacted government agencies, e-commerce companies and banks, to name just some entities.

Backing up your data to the cloud or on-premise is a critical and cost-effective first step in any disaster recovery plan – but this is only the beginning. It would help if you also had a plan to recover your data in an emergency quickly. You must also test your recovery plan often. You should simulate disruptions and see how well your recovery plan works. You should also regularly test your backup images and address any problems.

2: Implement your backup and recovery solution

Cloud security is not solely the responsibility of your cloud provider. It’s your responsibility as well. Cloud providers usually promise to secure their infrastructure and services. But securing operating systems, platforms and data is your responsibility. Read the small print.

Cloud providers will not guarantee the safety of your data. No matter what cloud platform you use, the data is still owned by you, not the provider. Many cloud providers recommend that their customers use third-party software to protect their data.

You can comprehensively secure your data with a reliable cloud backup and recovery solution. You can also get the control you need. You should implement a cloud backup and recovery solution that protects your data by automatically backing up your information every 15 minutes, giving you multiple recovery points. It also guarantees that your data is continuously protected while providing quick access and visibility 24/7.

3: Be proactive: be data resilient

A lot of companies don’t test their data recovery plans. Many don’t even have a recovery plan, which is very short-sighted. It is crucial to be proactive, not reactive, and, above all, data-resilient.

A data resilience strategy ensures business continuity in the event of a disruption. It is built on recovery point objectives (RPOs) and recovery time objectives (RTOs), and you should regularly test to guarantee that the RPOs and RTOs can be achieved.

Your RPO determines your backup frequency. In essence, it’s your tolerance for data loss. Some organisations can tolerate a data loss of 24 hours, so they back up their data every 24 hours. Their RPO is 24. Other businesses, such as those in finance and healthcare, absolutely cannot tolerate a data loss of 24 hours. Their RPOs are set to milliseconds.

Your RTO measures the downtime you can accept between a data loss and recovery. It’s how long you can be down before your business incurs severe damages. Your RTO determines your disaster recovery plan investment. If your RTO is one hour, you need to invest in solutions that get you back up and running within that hour.

Establishing your RPO and RTO, and then implementing the solutions you need to achieve them, are the keys to data resilience.

Final takeaway

We live in a world of growing cybersecurity threats, more frequent natural disasters, and black swan events arriving in flocks. Every day, organisations are brought to their knees out of the blue. That’s why more of them are purchasing cloud downtime insurance. But it is critical to understand that this type of insurance alone does not constitute a data protection plan. It is best viewed as an accessory to your backup and recovery efforts. Never consider it a replacement.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
IoT-driven smart data to stay ahead
IoT & Automation Infrastructure AI & Data Analytics
In a world where uncertainty is constant, the real competitive edge lies in foresight. Businesses that turn real-time data into proactive strategies will not just survive, they will lead.

Read more...
Hydrogen is green but dangerous
Fire & Safety Infrastructure Power Management
Hydrogen infrastructure is developing quickly, but it comes with safety challenges. Hydrogen is flammable, and its small molecular size means it can leak easily. Additionally, fires caused by hydrogen are nearly invisible, making them difficult to detect and respond to.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.