How to Mitigate the Risk of Data Loss and Disruption in 2016

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Next

Assemble an IT Team and Assess Your Situation 

First, businesses should assemble a team to build out a proper disaster recovery strategy. It's recommended that the team be comprised of the small business owner and at least one person assigned to budgeting, as well as any internal IT staff. If there is no internal IT staff, it’s very important to partner with an external IT solutions provider. This contractor can help SMBs overcome the multitude of challenges they face today, like needing to keep IT systems running with little or no downtime, while simultaneously evaluating new technologies.

With a team in place, it’s time to ask the hard questions to determine the types of events most likely to wipe out mission-critical business data. Do you live in Florida where hurricanes are a common occurrence, or New England where snowstorms can shut down cities for days? At this point, you will be able to determine which items are transportable so you can rapidly recover should any disaster scenarios come up.

As we plan for 2016, IT professionals should reexamine and re-evaluate disaster recovery plans for their companies. Assessing current programs provides IT professionals the opportunity to enact proper best practices to deal with emergencies related to data loss and downtime. Preventing downtime is particularly crucial for small to midsize businesses (SMBs), which can suffer losses as great as $8,220 to $25,600 an hour, according to new research from IDC. The U.S. Small Business Administration even reports that 40 to 60 percent of small businesses fail to reopen after a disaster.

What can SMB IT pros do to prevent this data and financial loss heading into 2016? They must prepare their IT plans ahead of time. From human error to a power outage or an earthquake that disrupts databases and servers, man-made and natural disasters are unavoidable. Thankfully, SMBs have the ability to avoid the loss of important business-critical data in the face of such circumstances.

In this slideshow, David Raissipour, SVP of Engineering, Carbonite, has outlined the top five best practices to follow in order to mitigate the risk of data loss or disruption.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.