BBC Tech

Are electric cars as ‘green’ as you think?

It's predicted that by 2030, over 125 million electric vehicles will be owned by people worldwide. But where's the lithium that powers their batteries coming from? Most of the world's stocks of this lightest of metals are found in brine deep beneath salt flats, high
/
New Global Research from Accenture Interactive Urges CMOs to Put People Before Data Collection

New Global Research from Accenture Interactive Urges CMOs to Put People Before Data Collection

Nearly 69% of consumers would stop doing business with a brand if data usage became too invasive NEW YORK; Oct. 16, 2019 – New global research released by Accenture Interactive offers guidance to chief marketing officers (CMOs) on strategies to use data respectfully and responsibly
/
Balaji Viswanathan

Disaster Management Checklist

Disaster Management Checklist

Last week I covered some aspects of disaster management on the cloud. I will continue where I left off and cover more details on the disaster planning part. Here is a checklist of things you must have for disaster planning and recovery.

  1. What are the emergency contact number and email addresse(s) of the cloud service provider (CSP)?
  2. Is there a backup account with another CSP? How soon can the backups be activated to restore services?
  3. Are the data and applications in the backup regularly updated?
  4. What is the minimum working subset that should be run until the system is fully restored? If this is an e-commerce website, then a tool to track customers’ existing purchases and a static page that states the website is down for maintenance could form the minimum working subset.
  5. Have you identified the contacts in various departments who will spearhead the disaster recovery process? For instance, the IT person identified in the list would start working on getting the backup servers activated, the HR contact would calm down the employees and appraise the situation, while the PR contact would start working on the press strategy in order to weather the storm. The people on this list should have undergone relevant training and should be able to handle the situation. This can reduce the chaos during major disruptions.
  6. Is there a stakeholder list that details who will be affected when each of the different cloud services goes down? For instance, if your email service goes down, then employees are the primary victims, while if your corporate website goes down, your customers are the primary victims. For each service, you need to prepare a list of stakeholders who will be impacted.
  7. Do you have a list of contacts at partner firms who must be alerted if the cloud service goes down? If you use multiple cloud services, have a separate contact list for each category of service.
  8. Are the customer service personnel prepared to handle such emergencies? The training could include providing standard responses without causing further panic, the ability to handle a barrage of questions from angry customers, and providing customers with alternative ways to do something, where applicable.
  9. Is the PR department ready for the emergency? Are they kept in the loop? Ideally, the PR team should work to calm down the atmosphere, by updating the press and customers, and dispelling any rumors.
  10. Are the communication tools to reach customers setup and maintained? It could be Twitter/Email/phone.

Do let us know what else would you have in your disaster planning checklist.

By Balaji Viswanathan

Balaji Viswanathan Contributor
CEO of Invento Robots
Balaji is the CEO of Invento Robots. Balaji has been writing about technology for several years and is currently featured in many publications around the globe.
Kris Lahri

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet ...
Cloud Services Are Vulnerable Without End-To-End Encryption

Cloud Services Are Vulnerable Without End-To-End Encryption

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, even the most popular cloud ...
Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Cloud-Enabled Managed Hosting Provider We are all familiar with the old saying “That's like comparing apples to oranges” and though we learned this lesson during ...
Daren Glenister

What’s Next In Cloud And Data Security?

Cloud and Data Security It has been a tumultuous year in data privacy to say the least – we’ve had a huge increase in data ...
George Foot

Your Biggest Data Security Threat Could Be….

Biggest Data Security Threat Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions ...
It Programs Compressor