How to Mitigate the Risk of Data Loss and Disruption in 2016

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next How to Mitigate the Risk of Data Loss and Disruption in 2016-6 Next

Define Your RPO, RTO and Testing Strategies

Now, you need to define your recovery point objective (RPO) — or the point in time you’d like to go back to and retrieve clean versions of your files. Important factors of RPO include how often important data changes at your organization, how often backups will be run and how much space is available to store your backups. You should also define your recovery time objective (RTO) — or the minimum amount of time it will take to get your business back up and running following a disaster. Important factors to determine RTO include the amount of downtime a business can absorb, how much revenue is lost while you rebuild your IT environment and what you’ll need to recover to get your business back up and running. In general, the more you’re willing to invest in your disaster recovery solution, the shorter your RPO and RTO will be.

Finally, practice, practice, practice. Employees may roll their eyes at the thought of an emergency drill, but be assured it will save you and them a lot of stress in the end.

As we plan for 2016, IT professionals should reexamine and re-evaluate disaster recovery plans for their companies. Assessing current programs provides IT professionals the opportunity to enact proper best practices to deal with emergencies related to data loss and downtime. Preventing downtime is particularly crucial for small to midsize businesses (SMBs), which can suffer losses as great as $8,220 to $25,600 an hour, according to new research from IDC. The U.S. Small Business Administration even reports that 40 to 60 percent of small businesses fail to reopen after a disaster.

What can SMB IT pros do to prevent this data and financial loss heading into 2016? They must prepare their IT plans ahead of time. From human error to a power outage or an earthquake that disrupts databases and servers, man-made and natural disasters are unavoidable. Thankfully, SMBs have the ability to avoid the loss of important business-critical data in the face of such circumstances.

In this slideshow, David Raissipour, SVP of Engineering, Carbonite, has outlined the top five best practices to follow in order to mitigate the risk of data loss or disruption.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.