“Always Be Testing:” Weekly Disaster Recovery System Testing Critical

“Always Be Testing:” Weekly Disaster Recovery System Testing Critical

“Always Be Testing:” Weekly Disaster Recovery System Testing Critical for Small to Mid-Sized Businesses

Statistics show that most small to mid-sized businesses will experience at least one instance of system downtime a year, at an average cost of $74,000 an hour, according to Aberdeen Group. Unfortunately, only a handful of small to mid-sized businesses have ever even tested their backup to find out if complete recovery of their data, applications and systems after a disaster is possible. For those that do test, it’s often conducted infrequently — a result of outdated thinking that DR testing is time- and cost-prohibitive or too complex an endeavor. Of course, if an organization is using tape or disk backup for disaster recovery or cloud backup alone, these complaints are not altogether unfounded. Hybrid cloud solutions are more reliable and less cumbersome, with on-demand and automatic testing that can be performed in minutes.

Regardless of your DR solution of choice, the fact remains that frequent changes in your environment make the case for “Always Be Testing” — weekly, full DR tests that account for every change that was made to a company’s system.

Common Pitfalls Emphasize Importance of Weekly Testing

Many organizations simply aren’t aware of everything that can go wrong when recovering emergency backups, and if you never actually try to restore a file, application or server, you don’t really know if you can. But because of the time and cost issues associated with tape, disk and cloud backup, IT professionals resort to some workarounds, such as performing a scaled- down version of a test in either a partial environment or in a partial format. The problem here is that an organization’s infrastructure is constantly changing. Servers, applications and systems are added, modified and removed, and your backup and recovery system must take these changes into account.

Microsoft’s Patch Tuesdays also introduce changes that could spell trouble if regular testing is ignored. These security patches are released once a month, but Microsoft also releases daily updates or extras on “extraordinary Patch Tuesdays.” And it doesn’t stop with Microsoft: SAP advises users to install security updates on “Security Patch Days,” which coincide with Microsoft’s Patch Tuesdays. Adobe Systems’ update schedule for its Flash Player joins the fray on Patch Tuesdays as well.

Changes in hardware, too, can be overlooked. When installed, new hardware is tested once. Regular testing after that seems superfluous, the argument being that the main DR software hasn’t changed, so the test results won’t change from the first time. But if any new hardware has been installed or upgraded and the DR software hasn’t been tested on the new platform, cracks can emerge.

Unfortunately, a common practice is to test a tape to ensure the data on it is good and that files can be recovered. After this type of test, IT professionals have the false sense of security that an entire server can be restored. But if the server itself hasn’t been tested regularly (let alone the drivers, RAID controllers or NICs), there is no way to know that everything will perform as expected.

Backup corruption is especially prevalent in tape environments. Tape media spins at a high speed, and over time, it becomes unusable. Because tapes are rarely switched out, there’s no way to know it’s corrupt until a data restoration is attempted. Corruption can also occur if a backup device has been damaged or incorrectly processed, or if the storage device has some sort of physical defect. Worse yet is if invalid data has been unknowingly backed up repeatedly over a long period of time. This means all backup copies have been corrupted.

While corruption with disk backup is far more infrequent, it has drawbacks that should be mentioned. Organizations are still limited by how much data they can retain for a long time. Disks may be added, but this approach still only allows for backup and recovery, not full DR testing.

Human error and flaws in the execution of backups occur frequently, especially in tape environments. If backups are set up correctly, tapes will be “locked” for a specific amount of time, preventing overriding of data. But if the backup was set up improperly and the tape was somehow not locked, data on that tape will be overridden.

Clearly, even a tiny change to your IT system increases the odds that something might go wrong later on. And if you wouldn’t feel comfortable erasing your hard disk right now and restoring it from your backups, it’s time to commit to a new weekly routine and adopt the “Always Be Testing” approach.

By Larry Lang, Chief Executive Officer

larry-lang

Larry Lang brings more than twenty years of global business-building experience to Quorum, which offers appliance and hybrid cloud solutions for one-click backup, recovery and continuity. His innovative views on business demands for rapid assured disaster recovery have been shared through industry forums like the International Legal Technology Association and the World Conference on Disaster Management and quoted in publications like the Wall Street Journal and Forbes. He has led Quorum through substantial revenue growth and several rounds of financing.

 

Contact us regarding contributing to our cloud community

 

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Martech In A Content Crazed World

Martech In A Content Crazed World

Content Crazed World Everywhere you look there are pop-up ads and offers, at times it can feel like overload. What used to be a few online ads on websites has now grown into a wild world of offers that consume your every device. These advancements in marketing technology can not only be overwhelming to the…

Hubgets – Advanced Collaboration, Enriched Communication

Hubgets – Advanced Collaboration, Enriched Communication

Advanced Collaboration Tool Sponsored series provided in collaboration with Hubgets Collaboration tools have advanced leaps and bounds with the advent of cloud technology, and the services available are only getting better. Promising features such as sophisticated group communication, productive management of tasks and meetings, and the ultimate dream, working remotely from some gorgeous island destination, innovative collaboration…

Verizon To Acquire Yahoo For $4.83 Billion

Verizon To Acquire Yahoo For $4.83 Billion

Verizon Communications Inc (VZ.N) said it had agreed to buy Yahoo Inc’s (YHOO.O) core internet business for $4.83 billion in cash, ending a lengthy sale process for the fading Web pioneer. Buying Yahoo’s operations will boost Verizon’s AOL internet business, which it bought last year for $4.4 billion, by giving it access to Yahoo’s advertising…

When Sci-Fi Predictions Come To Fruition

When Sci-Fi Predictions Come To Fruition

Evolution of Technologies To paraphrase science fiction author Arthur C. Clark, those who make predictions about the future are either “considered conservative now and mocked later, or mocked now and proved right when they are no longer around to enjoy the acclaim.” The one thing we can be sure about, Clark ventured, is that “[the…

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Inc (FB.O) said on Thursday it had completed a successful test flight of a solar-powered drone that it hopes will help it extend internet connectivity to every corner of the planet. Aquila, Facebook’s lightweight, high-altitude aircraft, flew at a few thousand feet for 96 minutes in Yuma, Arizona, Chief Executive Mark Zuckerberg wrote in…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…

How Big Data Is Influencing Web Design

How Big Data Is Influencing Web Design

How Big Data Is Influencing Web Design For all you non-techies… You’re probably wondering what big data is (I know I was….a few years back) so let’s get the definitions out of the way so we’re on the same page, okay? Big data is A LOT of data – really, it is. It is a…

Do Small Businesses Need Cloud Storage Service?

Do Small Businesses Need Cloud Storage Service?

Cloud Storage Services Not using cloud storage for your business yet? Cloud storage provides small businesses like yours with several advantages. Start using one now and look forward to the following benefits: Easy back-up of files According to Practicalecommerce, it provides small businesses with a way to back up their documents and files. No need…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…