SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
7 key elements of business continuity

It’s no fun to think about all the ways your business can be disrupted—hurricanes,
tsunamis, snow storms, epidemics, earthquakes, tornados, terrorism, floods, fires, even
relatively minor incidents like a failed water main or a planned event like an office
relocation. It’s the kind of thing that keeps business execs and IT leaders up at night.
The best remedy: a solid business continuity strategy you can count on to minimize the
impact and keep your business running through thick or thin.
The following seven elements are essential parts of any effective business continuity
strategy.

1. A clearly defined team
In an emergency, people shouldn’t have to wonder who’s in charge. Create a business
continuity team with members in every part of your organization, in every location
where you operate. These individuals will lead the local response to local events as well
as the organization-wide response for both local and broader-based emergencies. They
should stay involved in planning and testing throughout the year to keep the plan upto-date and gain the familiarity they’ll need to perform under the pressure of an actual
emergency. High-level support is crucial to make sure business continuity gets the
attention and resources it should.
2. A detailed plan
Think through the kind of disruptions that could occur in each place where you do
business. Assume the worst, then figure out what you’d need to do to maintain your
most important operations. Rank your recovery priorities in business terms such as
revenue, regulatory implications, brand concerns, customer protection—whatever
matters most to your organization—then map these to applications, people, facilities
and equipment. Once your business continuity team has come to an agreement on this
analysis (which isn’t always easy), it can start to identify recovery strategies and costs
around each process. This will also help IT make sure that the most critical applications
will be available to the business within an established recovery time objective (RTO)
and recovery point objective (RPO).

3. Effective testing
An out-of-date or ineffective business continuity plan can be worse than none at all,
giving you a false sense of security and leaving you to scramble when things go wrong.
Review and update your plan at least once a year, and ideally more often than that, to
reflect changes in your IT environment, business priorities, operational structure and
other factors. Conduct full simulations at least annually as well, covering everything
from application recoverability to crisis communications. Supplement these with
frequent tabletop exercises that introduce new twists into disaster scenarios to keep
you on your toes.

4. Crisis communications
Effective communications can make the difference between panic and smooth
emergency response. Create a toolkit that encompasses the full range of
communications channels, including telecom, email, public address, intranet, IM,
texting and the company website. Draft sample emergency messages in advance so they
can be updated quickly during an actual emergency, and make sure you’re prepared to
deliver a consistent message to the public as well through press releases, social media
updates and interviews with spokespeople.
5. Employee safety
Nothing is more important than keeping people safe. Local agencies such as the Red
Cross, fire department and police department, as well as federal entities, such as the
FEMA Community Emergency Response Teams (CERT), can provide emergency
response training and other guidance for your program. Tailor your procedures to your
workforce, facilities and locations, and review and test them regularly with all
employees.

6. Uninterrupted access to business resources
It’s important to keep people working—not just to maintain productivity, but to protect
data and make sure your customers aren’t left hanging. Remote access technologies
make it possible for people to work wherever it’s safe and convenient, whether at
home, in a hotel conference room, at a friend’s house or anywhere else. Organizations
that already enable mobile workstyles are way ahead of the game in this scenario.
Instead of having to get used to disaster mode as an entirely different way of working,
people just keep using the same remote access tools they always do, just in a different
physical setting.

7. Continuous IT operations
Datacenter continuity is the final element. Most large organizations already have more
than one datacenter for scale and redundancy. If one comes offline for any reason—
planned or unplanned—people should be able to switch seamlessly to another to access
the same apps and data. Make sure your infrastructure can support this response in
terms of rapid, automated failover, load balancing and network capacity.
Citrix offers many technologies and best practices to help your business through
disruptions of all kinds. You can learn more here:
www.citrix.com/businesscontinuity[1].
1. http://www.citrix.com/solutions/business-continuity/overview.html
7 key elements of business continuity

Weitere ähnliche Inhalte

Mehr von Vision Concepts Infrastructure Services Solution

Mehr von Vision Concepts Infrastructure Services Solution (20)

Citrix Application Lifecycle Management
Citrix Application Lifecycle ManagementCitrix Application Lifecycle Management
Citrix Application Lifecycle Management
 
Using Windows Azure as a SharePoint Disaster Recovery Environment
Using Windows Azure as a SharePoint Disaster Recovery EnvironmentUsing Windows Azure as a SharePoint Disaster Recovery Environment
Using Windows Azure as a SharePoint Disaster Recovery Environment
 
Delivery-on-Demand Company Raises $16 Million, Questions About Safety and Out...
Delivery-on-Demand Company Raises $16 Million, Questions About Safety and Out...Delivery-on-Demand Company Raises $16 Million, Questions About Safety and Out...
Delivery-on-Demand Company Raises $16 Million, Questions About Safety and Out...
 
Security Testing Using Infrastructure-As-Code
Security Testing Using Infrastructure-As-CodeSecurity Testing Using Infrastructure-As-Code
Security Testing Using Infrastructure-As-Code
 
Could Google end sweatshop labor?
Could Google end sweatshop labor?Could Google end sweatshop labor?
Could Google end sweatshop labor?
 
How to Change the IT Architect Hiring Practice
How to Change the IT Architect Hiring PracticeHow to Change the IT Architect Hiring Practice
How to Change the IT Architect Hiring Practice
 
NetApp To Offer Integrated Storage Array And Virtualization Software
NetApp To Offer Integrated Storage Array And Virtualization SoftwareNetApp To Offer Integrated Storage Array And Virtualization Software
NetApp To Offer Integrated Storage Array And Virtualization Software
 
Big Data - Security Concerns
Big Data - Security ConcernsBig Data - Security Concerns
Big Data - Security Concerns
 
Apple adding hundreds of new engineers and operations staff in China to speed...
Apple adding hundreds of new engineers and operations staff in China to speed...Apple adding hundreds of new engineers and operations staff in China to speed...
Apple adding hundreds of new engineers and operations staff in China to speed...
 
Data Analytics and the Ubiquitous Internet of Things
Data Analytics and the Ubiquitous Internet of ThingsData Analytics and the Ubiquitous Internet of Things
Data Analytics and the Ubiquitous Internet of Things
 
Citrix UniPrint NetGain Case Study
Citrix UniPrint NetGain Case StudyCitrix UniPrint NetGain Case Study
Citrix UniPrint NetGain Case Study
 
Uniprint Infinity Citrix Printing Solution
Uniprint Infinity Citrix Printing SolutionUniprint Infinity Citrix Printing Solution
Uniprint Infinity Citrix Printing Solution
 
The CIO Pocket MBA
The CIO Pocket MBAThe CIO Pocket MBA
The CIO Pocket MBA
 
Citrix Top 10 Trends
Citrix Top 10 Trends Citrix Top 10 Trends
Citrix Top 10 Trends
 
Citrix and Samsung Deliver Android Enterprise Security on Latest Samsung Gala...
Citrix and Samsung Deliver Android Enterprise Security on Latest Samsung Gala...Citrix and Samsung Deliver Android Enterprise Security on Latest Samsung Gala...
Citrix and Samsung Deliver Android Enterprise Security on Latest Samsung Gala...
 
Learn KVM and Receive Exclusive Invitation to Linux Foundation Collaboration ...
Learn KVM and Receive Exclusive Invitation to Linux Foundation Collaboration ...Learn KVM and Receive Exclusive Invitation to Linux Foundation Collaboration ...
Learn KVM and Receive Exclusive Invitation to Linux Foundation Collaboration ...
 
Using Concurrent Multipath Transmission for Transport Virtualization
Using Concurrent Multipath Transmission for Transport VirtualizationUsing Concurrent Multipath Transmission for Transport Virtualization
Using Concurrent Multipath Transmission for Transport Virtualization
 
GuideIT - Virtual Economies of Scale
GuideIT - Virtual Economies of Scale GuideIT - Virtual Economies of Scale
GuideIT - Virtual Economies of Scale
 
Build Your 2008R2 2-Node Cluster
Build Your 2008R2 2-Node ClusterBuild Your 2008R2 2-Node Cluster
Build Your 2008R2 2-Node Cluster
 
How to Change the IT Architect Hiring Practice so Companies and End-Users Win...
How to Change the IT Architect Hiring Practice so Companies and End-Users Win...How to Change the IT Architect Hiring Practice so Companies and End-Users Win...
How to Change the IT Architect Hiring Practice so Companies and End-Users Win...
 

Kürzlich hochgeladen

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

7 key elements of business continuity

  • 1. 7 key elements of business continuity It’s no fun to think about all the ways your business can be disrupted—hurricanes, tsunamis, snow storms, epidemics, earthquakes, tornados, terrorism, floods, fires, even relatively minor incidents like a failed water main or a planned event like an office relocation. It’s the kind of thing that keeps business execs and IT leaders up at night. The best remedy: a solid business continuity strategy you can count on to minimize the impact and keep your business running through thick or thin. The following seven elements are essential parts of any effective business continuity strategy. 1. A clearly defined team In an emergency, people shouldn’t have to wonder who’s in charge. Create a business continuity team with members in every part of your organization, in every location where you operate. These individuals will lead the local response to local events as well as the organization-wide response for both local and broader-based emergencies. They should stay involved in planning and testing throughout the year to keep the plan upto-date and gain the familiarity they’ll need to perform under the pressure of an actual emergency. High-level support is crucial to make sure business continuity gets the attention and resources it should.
  • 2. 2. A detailed plan Think through the kind of disruptions that could occur in each place where you do business. Assume the worst, then figure out what you’d need to do to maintain your most important operations. Rank your recovery priorities in business terms such as revenue, regulatory implications, brand concerns, customer protection—whatever matters most to your organization—then map these to applications, people, facilities and equipment. Once your business continuity team has come to an agreement on this analysis (which isn’t always easy), it can start to identify recovery strategies and costs around each process. This will also help IT make sure that the most critical applications will be available to the business within an established recovery time objective (RTO) and recovery point objective (RPO). 3. Effective testing An out-of-date or ineffective business continuity plan can be worse than none at all, giving you a false sense of security and leaving you to scramble when things go wrong. Review and update your plan at least once a year, and ideally more often than that, to reflect changes in your IT environment, business priorities, operational structure and other factors. Conduct full simulations at least annually as well, covering everything from application recoverability to crisis communications. Supplement these with frequent tabletop exercises that introduce new twists into disaster scenarios to keep you on your toes. 4. Crisis communications Effective communications can make the difference between panic and smooth emergency response. Create a toolkit that encompasses the full range of communications channels, including telecom, email, public address, intranet, IM, texting and the company website. Draft sample emergency messages in advance so they can be updated quickly during an actual emergency, and make sure you’re prepared to deliver a consistent message to the public as well through press releases, social media updates and interviews with spokespeople.
  • 3. 5. Employee safety Nothing is more important than keeping people safe. Local agencies such as the Red Cross, fire department and police department, as well as federal entities, such as the FEMA Community Emergency Response Teams (CERT), can provide emergency response training and other guidance for your program. Tailor your procedures to your workforce, facilities and locations, and review and test them regularly with all employees. 6. Uninterrupted access to business resources It’s important to keep people working—not just to maintain productivity, but to protect data and make sure your customers aren’t left hanging. Remote access technologies make it possible for people to work wherever it’s safe and convenient, whether at home, in a hotel conference room, at a friend’s house or anywhere else. Organizations that already enable mobile workstyles are way ahead of the game in this scenario. Instead of having to get used to disaster mode as an entirely different way of working, people just keep using the same remote access tools they always do, just in a different physical setting. 7. Continuous IT operations Datacenter continuity is the final element. Most large organizations already have more than one datacenter for scale and redundancy. If one comes offline for any reason— planned or unplanned—people should be able to switch seamlessly to another to access the same apps and data. Make sure your infrastructure can support this response in terms of rapid, automated failover, load balancing and network capacity. Citrix offers many technologies and best practices to help your business through disruptions of all kinds. You can learn more here: www.citrix.com/businesscontinuity[1]. 1. http://www.citrix.com/solutions/business-continuity/overview.html