How to Mitigate the Risk of Data Loss and Disruption in 2016

1 | 2 | 3 | 4 | 5 | 6 | 7
Next How to Mitigate the Risk of Data Loss and Disruption in 2016-6 Next

Define Your RPO, RTO and Testing Strategies

Now, you need to define your recovery point objective (RPO) — or the point in time you’d like to go back to and retrieve clean versions of your files. Important factors of RPO include how often important data changes at your organization, how often backups will be run and how much space is available to store your backups. You should also define your recovery time objective (RTO) — or the minimum amount of time it will take to get your business back up and running following a disaster. Important factors to determine RTO include the amount of downtime a business can absorb, how much revenue is lost while you rebuild your IT environment and what you’ll need to recover to get your business back up and running. In general, the more you’re willing to invest in your disaster recovery solution, the shorter your RPO and RTO will be.

Finally, practice, practice, practice. Employees may roll their eyes at the thought of an emergency drill, but be assured it will save you and them a lot of stress in the end.

As we plan for 2016, IT professionals should reexamine and re-evaluate disaster recovery plans for their companies. Assessing current programs provides IT professionals the opportunity to enact proper best practices to deal with emergencies related to data loss and downtime. Preventing downtime is particularly crucial for small to midsize businesses (SMBs), which can suffer losses as great as $8,220 to $25,600 an hour, according to new research from IDC. The U.S. Small Business Administration even reports that 40 to 60 percent of small businesses fail to reopen after a disaster.

What can SMB IT pros do to prevent this data and financial loss heading into 2016? They must prepare their IT plans ahead of time. From human error to a power outage or an earthquake that disrupts databases and servers, man-made and natural disasters are unavoidable. Thankfully, SMBs have the ability to avoid the loss of important business-critical data in the face of such circumstances.

In this slideshow, David Raissipour, SVP of Engineering, Carbonite, has outlined the top five best practices to follow in order to mitigate the risk of data loss or disruption.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.