IT Disaster Recovery For SMEs

IT Disaster Recovery For SMEs

IT Disaster Recovery For SMEs

According to credible estimates, an hour of outage may cost a medium sized company $70,000. Yes, that is accumulated losses when IT systems go offline. What’s interesting to note here is that in contrast to the popular belief that natural disasters constitute the primary reason for IT system failure, a recent study finds hardware failure to be the leading cause, by a big margin, of IT disasters and the losses, both financial and loss in credibility, which small and medium sized businesses have to incur. However, if SMEs take the right precautions, much of the loss can be quickly remedied, even if it occurs.

I do not need to argue about the importance of prompt recovery from IT disasters. Even if your business can burn through $70,000/hour of losses, the loss in customer confidence, especially for consumer facing enterprises may not be repaired, ever. A study by HP and Score also reveals that 1/4th of medium sized businesses go broke as a result of a major disaster. It shows the ROI for investing your time and money in contingency planning and executing dry runs to ensure your plan works.

image-graph

Among the four major types of disasters – Hardware failure, natural disasters, human error and software failure, only natural disasters are something which are not in human control, everything else, including human error can be tamed, if not controlled. The key however is to be prepared for extreme situations and make your plans based on disaster predictive studies available out there.

Unless your organization is unique, it’s very much likely that you have one SAN (Storage Area Network) or NAS (Network Attached Storage) which is being utilized across your organization. In order to keep storage simple and scalable, organizations tend to neglect the doomsday scenario which may trigger due to a slight failure of their SAN. On top of it, all data, including virtualized storage relies on this one big SAN. Now imagine this SAN failing for any reason – there are plenty. Since the whole IT environment is connected to the SAN, the whole IT infrastructure comes to a halt, all because of SAN failure. This is not a hypothetical scenario which I’m creating to drive my point home, rather, it’s one of the major causes of hardware failures which result in IT disasters. Let’s look at some of the measures organizations may take to mitigate risks. First comes redundancy but even with layers of redundancy, if your SAN is not diversified (separate systems and not one big unit), there are good chances those added layers of redundant storage will fall like a house of cards when disaster strikes. Next comes ensuring a standard data backup policy is made and followed to the letter and spirit. However, surveys suggest that it normally take tens of hours to recovery from SAN failure with tape and disk backups. Some studies draw an even starker picture by claiming that tape backups often fail.

Cloud backup seems to be an emerging trend, primarily driven by the idea to ‘physically’ diversify your storage network. Organizations which deeply embrace Cloud completely let go of any internal SAN and rely on the Cloud. This may not be a wise move considering that Cloud may also fail (remember the Amazon EC2 failure which brought down mega internet services like Reddit etc?). Using Cloud backup is a credible plan to recover from any storage related IT failures. Diversifying your Cloud backup pool only further strengthens your IT and mitigates failure risks.

No matter how strong your IT systems are, they’re prone to failure. This may happen because of your system administrator accidentally wiping out server file system or a hurricane sweeping through your data center. Preparation is the key.   Read The Full Quorum: Disaster Recovery Report 2013

By Salman Ul Haq

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

How Big Data Is Influencing Web Design

How Big Data Is Influencing Web Design

How Big Data Is Influencing Web Design For all you non-techies… You’re probably wondering what big data is (I know I was….a few years back) so let’s get the definitions out of the way so we’re on the same page, okay? Big data is A LOT of data – really, it is. It is a…

Cloud Computing Then & Now

Cloud Computing Then & Now

The Evolving Cloud  From as early as the onset of modern computing, the possibility of resource distribution has been explored. Today’s cloud computing environment goes well beyond what most could even have imagined at the birth of modern computing and innovation in the field isn’t slowing. A Brief History Matillion’s interactive timeline of cloud begins…

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for this is that so few small and mid-size businesses have ever contemplated the impact of a major disaster on their IT…

Cloud Computing Price War Rages On

Cloud Computing Price War Rages On

Cloud Computing Price War There’s little question that the business world is a competitive place, but probably no area in business truly defines cutthroat quite like cloud computing. At the moment, we are witnessing a heated price war pitting some of the top cloud providers against each other, all in a big way to attract…

5 Surprising Ways Cloud Computing Is Changing Education

5 Surprising Ways Cloud Computing Is Changing Education

Cloud Computing Education The benefits of cloud computing are being recognized in businesses and institutions across the board, with almost 90 percent of organizations currently using some kind of cloud-based application. The immediate benefits of cloud computing are obvious: cloud-based applications reduce infrastructure and IT costs, increase accessibility, enable collaboration, and allow organizations more flexibility…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…