How to Mitigate the Risk of Data Loss and Disruption in 2016

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next How to Mitigate the Risk of Data Loss and Disruption in 2016-6 Next

Define Your RPO, RTO and Testing Strategies

Now, you need to define your recovery point objective (RPO) — or the point in time you’d like to go back to and retrieve clean versions of your files. Important factors of RPO include how often important data changes at your organization, how often backups will be run and how much space is available to store your backups. You should also define your recovery time objective (RTO) — or the minimum amount of time it will take to get your business back up and running following a disaster. Important factors to determine RTO include the amount of downtime a business can absorb, how much revenue is lost while you rebuild your IT environment and what you’ll need to recover to get your business back up and running. In general, the more you’re willing to invest in your disaster recovery solution, the shorter your RPO and RTO will be.

Finally, practice, practice, practice. Employees may roll their eyes at the thought of an emergency drill, but be assured it will save you and them a lot of stress in the end.

As we plan for 2016, IT professionals should reexamine and re-evaluate disaster recovery plans for their companies. Assessing current programs provides IT professionals the opportunity to enact proper best practices to deal with emergencies related to data loss and downtime. Preventing downtime is particularly crucial for small to midsize businesses (SMBs), which can suffer losses as great as $8,220 to $25,600 an hour, according to new research from IDC. The U.S. Small Business Administration even reports that 40 to 60 percent of small businesses fail to reopen after a disaster.

What can SMB IT pros do to prevent this data and financial loss heading into 2016? They must prepare their IT plans ahead of time. From human error to a power outage or an earthquake that disrupts databases and servers, man-made and natural disasters are unavoidable. Thankfully, SMBs have the ability to avoid the loss of important business-critical data in the face of such circumstances.

In this slideshow, David Raissipour, SVP of Engineering, Carbonite, has outlined the top five best practices to follow in order to mitigate the risk of data loss or disruption.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.