Five Deadly Sins of Disaster Recovery Planning

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Previous Five Deadly Sins of Disaster Recovery Planning-1 Next

Click through for the five deadly sins of disaster recovery planning, as identified by Logicalis.

Downtime due to equipment or software failure, human error, viruses or natural disasters can all cause an even bigger data disaster if the IT staff has not properly prepared. In fact, just preparing for disaster isn’t enough of a strategy for most organizations. Technologists at Logicalis, an international provider of integrated information and communications technology (ICT) solutions and services, say that organizations must also develop a strategy for recovery. Failure to do so can extend the length of the original downtime well past the disaster that caused it.

“Business continuity is like lighting a building in the evening. You want to first make sure that the lights will work before it actually gets dark,” says Ed Oakes, a business continuity and disaster recovery expert at Logicalis. “Standing around in the dark with a flashlight is not the time to figure out where your wiring went wrong.”

To improve your ability to recover data and get your organization back on track and operational following a disaster, Logicalis experts say to avoid these common mistakes.

More Slideshows:

Five Online Routes to the Recruiters' Short List Make sure you make it to the short list when professional talent scouts are looking for candidates.

Business Etiquette: Professional Networking Sites, Including LinkedIn Tips to help you get the most out of your professional online networking.

Eight Presentation Tips to Make Your Eye Contact More Powerful Improve the impact of your presentations through "eye connection."


Related Topics : IPv6

More Slideshows

Holiday20-190x128 5 Ways to Protect Your Data Center from a 'Zombie' Server Attack

It's easy to forget about the ghosts of servers past that are hiding in the background, continuing to consume electricity and potentially exposing organizations to malicious attacks. ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.