Five Deadly Sins of Disaster Recovery Planning - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Deadly Sins of Disaster Recovery Planning-6 Next

It’s not enough to have a plan and train the team; you must commit to running periodic disaster recovery exercises as well. “This is often the toughest challenge,” says Oakes. “Disaster recovery planning and testing doesn’t generate revenue, so it’s not viewed as an asset, but should be viewed as an insurance plan. Testing can help you discover ‘What did we miss?’ and ‘What will it cost?’ if it’s not covered.”

Downtime due to equipment or software failure, human error, viruses or natural disasters can all cause an even bigger data disaster if the IT staff has not properly prepared. In fact, just preparing for disaster isn’t enough of a strategy for most organizations. Technologists at Logicalis, an international provider of integrated information and communications technology (ICT) solutions and services, say that organizations must also develop a strategy for recovery. Failure to do so can extend the length of the original downtime well past the disaster that caused it.

“Business continuity is like lighting a building in the evening. You want to first make sure that the lights will work before it actually gets dark,” says Ed Oakes, a business continuity and disaster recovery expert at Logicalis. “Standing around in the dark with a flashlight is not the time to figure out where your wiring went wrong.”

To improve your ability to recover data and get your organization back on track and operational following a disaster, Logicalis experts say to avoid these common mistakes.

More Slideshows:


Five Online Routes to the Recruiters' Short List Make sure you make it to the short list when professional talent scouts are looking for candidates.

Business Etiquette: Professional Networking Sites, Including LinkedIn Tips to help you get the most out of your professional online networking.


Eight Presentation Tips to Make Your Eye Contact More Powerful Improve the impact of your presentations through "eye connection."

 

Related Topics : IPv6

 
More Slideshows

Remote wipe 10 Steps Your Organization Should Take to Keep Mobile Device Data Secure

In the wake of new reports of serious breaches of mobile devices and data, security professionals share their tips for securing mobile devices and their favorite security solutions. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IBM Watson How and Why Companies Are Incorporating the Power of IBM Watson

Watson continuously learns from previous interactions, gaining in value and knowledge over time. Learn how companies are harnessing that AI power to create and improve products and services. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.