SlideShare ist ein Scribd-Unternehmen logo
1 von 29
BUSINESS-CRITICAL BACKUP:
PREPARING FOR DISASTER

Justin Winzenried
NetWize - Account Executive
jwinzenried@netwize.net
801-716-5354

Mike Fullmer
NetWize – Director of Sales
mfullmer@netwize.net
801-716-5344
Why Plan Disaster Recovery?
“A company that experiences a computer
outage lasting more than 10 days will
never fully recover financially. 50% will
be out of business within 5 years.”
"Disaster Recovery Planning: Managing Risk & Catastrophe in Information Systems" by Jon Toigo

• The #1 reason for implementing a disaster recovery

solution is to keep from going out of business when
disaster strikes.
The ULTIMATE Disaster!
ZOMBIES!!!
Natural Disaster
EARTHQUAKE

FLOOD

WILDFIRE

ELECTRICAL STORM
Community Disruption
STRIKE
POWER OUTAGE

HAZARDOUS MATERIALS SPILL
Office Malfunctions
Man-made Disruptions
• Deleted Files
• Corrupted Data
• Compliance Whistleblowing
• Theft

Could your business
survive if your file
server was stolen?
DISGRUNTLED EMPLOYEES
Technology-Related Disruption
NETWORK DISRUPTION

COMPUTER DOWNTIME
Technology-Related Disruption
CYBER TERRORISM
Disaster Causes
Definitions:
• Business Continuity (BC) - The ability to

continue your critical business functions during
and immediately after a disaster
• Disaster Recovery (DR) - the long-term ability to

rebuild your business capabilities after a disaster
Understanding Cost Considerations
Disaster Recovery Timeline - Offsite Backup is Only Part of the Story

48hr

Lower Cost

24hr

1hr

Disaster

High Cost

1hr

High Cost

24hr

48hr

Lower Cost

RPO

RTO

Recovery Point Objective

Recovery Time Objective

How old is your data backup?
How much can you afford to lose?

How long will it take to restore your
business? How long can you last before
you don’t have customers?
True Cost of Ownership (TCO)
• Identifying all the costs associated with DR and BC
• What is the cost of my DR service?
• What costs are incurred during an emergency?
• How much revenue will my company lose while systems

are being restored?
• How often am I testing, and what is the cost associated

with that?
Risk – Natural Disasters
• Earthquake, fire, flood, hurricanes, tornadoes, etc.
• Is your data stored far enough offsite where it won’t be

affected?
• How far of a reach will the natural disaster have that your

trying to protect against?
• Will power and network be available to execute your DR

plan?
Risk – Man-made disaster
“According to analyst firm IDC, about 70% of
all successful attacks on computer networks
were carried out by employees and insiders”
(http://iosafe.com/industry-stats)
Risk – Man-made disaster
To protect against internal threats, are you:
• Implementing permission controls?
• Implementing group policies?
• Do you have the ability to monitor and control employee’s

access?
• Training users about acceptable computer use policies?
Risk – Man-made disaster
To protect against external threats ask yourself:
• What security is currently in place?
• Passwords, encryption, firewalls, etc.
• What physical security do I have?
• Door locks, key cards, laptop locks, bezel locks, etc.
• Do I have regular security reviews or audits?
Disaster Declaration
• A specific event that starts your disaster recovery plan.
• This needs to be defined and written down. Although not

all situations can be accounted for, basic guidelines and
rules can clarify when a disaster should be declared, and
when it should not
Implementation

“Strategy without tactics is the
slowest route to victory”
-Sun Tzu
The NetWize Approach
How we approach disaster recovery:
1. Protect the File – First and foremost, is there a solid

backup solution in place?
2. Protect the Server – Is there solid equipment installed

with proper warranties? Do we need onsite failover,
virtualization, and shared storage to mitigate hardware
failure?
3. Protect the Company – Do we have offsite failover,

offsite storage, and high availability implemented?
Review
Ask yourself the following about DR:
•

Do I have a written plan in place to address emergency
situations?

•

Are my backups working? Do I really know how long it takes
to restore from backup?

•

Do I know all the costs associated with being down, and
bringing my systems back up?

•

Are there policies or regulations that require my business to
have a disaster recovery plan?
Top Five List - Backup Gotcha’s
5. No test restores
4. Backup timing – when was your last backup
3. Only one copy of backup
2. No offsite backup
1. Do not backup local workstations
Understanding Cost Considerations
Disaster Recovery Timeline - Offsite Backup is Only Part of the Story

48hr

Lower Cost

24hr

1hr

Disaster

High Cost

1hr

High Cost

24hr

48hr

Lower Cost

RPO

RTO

Recovery Point Objective

Recovery Time Objective

How old is your data backup?
How much can you afford to lose?

How long will it take to restore your
business? How long can you last before
you don’t have customers?
Traditional Backups - Tape
Backup to disk
Disk to Disk to Tape
Cloud Backup
Hybrid Cloud
Offsite Replication

Weitere ähnliche Inhalte

Was ist angesagt?

You Will Be Breached
You Will Be BreachedYou Will Be Breached
You Will Be BreachedMike Saunders
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsInfonaligy
 
Intro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security DefenseIntro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security DefenseRoger Grimes
 
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...Robi Sen
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1misecho
 
Cultivating security in the small nonprofit
Cultivating security in the small nonprofitCultivating security in the small nonprofit
Cultivating security in the small nonprofitRoger Hagedorn
 
Security initiatives here and down under
Security initiatives here and down underSecurity initiatives here and down under
Security initiatives here and down underRoger Hagedorn
 
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatData Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatResilient Systems
 
ISM and its impact on Government Project Delivery
ISM and its impact on Government Project DeliveryISM and its impact on Government Project Delivery
ISM and its impact on Government Project DeliveryKevin Landale
 
You will be breached
You will be breachedYou will be breached
You will be breachedMike Saunders
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorSandra (Sandy) Dunn
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightResilient Systems
 
Getting Started with Business Continuity
Getting Started with Business ContinuityGetting Started with Business Continuity
Getting Started with Business ContinuityStephen Cobb
 
Why implement a robust cyber security policy?
Why implement a robust cyber security policy?Why implement a robust cyber security policy?
Why implement a robust cyber security policy?Jisc
 
Webinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWebinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWithum
 
Phil Grimes - Penetrating the Perimeter: Tales from the Battlefield
Phil Grimes - Penetrating the Perimeter: Tales from the BattlefieldPhil Grimes - Penetrating the Perimeter: Tales from the Battlefield
Phil Grimes - Penetrating the Perimeter: Tales from the Battlefieldcentralohioissa
 

Was ist angesagt? (20)

You Will Be Breached
You Will Be BreachedYou Will Be Breached
You Will Be Breached
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
 
Intro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security DefenseIntro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security Defense
 
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
 
Mind the gap
Mind the gapMind the gap
Mind the gap
 
Mis
MisMis
Mis
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Cultivating security in the small nonprofit
Cultivating security in the small nonprofitCultivating security in the small nonprofit
Cultivating security in the small nonprofit
 
Security initiatives here and down under
Security initiatives here and down underSecurity initiatives here and down under
Security initiatives here and down under
 
NCET Tech
NCET Tech NCET Tech
NCET Tech
 
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatData Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
 
ISM and its impact on Government Project Delivery
ISM and its impact on Government Project DeliveryISM and its impact on Government Project Delivery
ISM and its impact on Government Project Delivery
 
You will be breached
You will be breachedYou will be breached
You will be breached
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It Right
 
Getting Started with Business Continuity
Getting Started with Business ContinuityGetting Started with Business Continuity
Getting Started with Business Continuity
 
Why implement a robust cyber security policy?
Why implement a robust cyber security policy?Why implement a robust cyber security policy?
Why implement a robust cyber security policy?
 
Incident Response in the wake of Dear CEO
Incident Response in the wake of Dear CEOIncident Response in the wake of Dear CEO
Incident Response in the wake of Dear CEO
 
Webinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWebinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the Trenches
 
Phil Grimes - Penetrating the Perimeter: Tales from the Battlefield
Phil Grimes - Penetrating the Perimeter: Tales from the BattlefieldPhil Grimes - Penetrating the Perimeter: Tales from the Battlefield
Phil Grimes - Penetrating the Perimeter: Tales from the Battlefield
 

Andere mochten auch

Human Response To Earthquake
Human Response To EarthquakeHuman Response To Earthquake
Human Response To Earthquaketudorgeog
 
Haiti earthquake - Adjustments and Responses (Correct Ver)
Haiti earthquake - Adjustments and Responses (Correct Ver) Haiti earthquake - Adjustments and Responses (Correct Ver)
Haiti earthquake - Adjustments and Responses (Correct Ver) Tom McLean
 
Evaluating Vulnerability in the 2011 Japan Earthquake and the 2010 Haiti Eart...
Evaluating Vulnerability in the 2011 Japan Earthquake and the 2010 Haiti Eart...Evaluating Vulnerability in the 2011 Japan Earthquake and the 2010 Haiti Eart...
Evaluating Vulnerability in the 2011 Japan Earthquake and the 2010 Haiti Eart...Tom McLean
 
Hurricane Katrina Adjustments & Responses
Hurricane Katrina Adjustments & ResponsesHurricane Katrina Adjustments & Responses
Hurricane Katrina Adjustments & ResponsesTom McLean
 

Andere mochten auch (6)

Computer network
Computer networkComputer network
Computer network
 
Human Response To Earthquake
Human Response To EarthquakeHuman Response To Earthquake
Human Response To Earthquake
 
Vulnerability
VulnerabilityVulnerability
Vulnerability
 
Haiti earthquake - Adjustments and Responses (Correct Ver)
Haiti earthquake - Adjustments and Responses (Correct Ver) Haiti earthquake - Adjustments and Responses (Correct Ver)
Haiti earthquake - Adjustments and Responses (Correct Ver)
 
Evaluating Vulnerability in the 2011 Japan Earthquake and the 2010 Haiti Eart...
Evaluating Vulnerability in the 2011 Japan Earthquake and the 2010 Haiti Eart...Evaluating Vulnerability in the 2011 Japan Earthquake and the 2010 Haiti Eart...
Evaluating Vulnerability in the 2011 Japan Earthquake and the 2010 Haiti Eart...
 
Hurricane Katrina Adjustments & Responses
Hurricane Katrina Adjustments & ResponsesHurricane Katrina Adjustments & Responses
Hurricane Katrina Adjustments & Responses
 

Ähnlich wie Business-Critical Backup: Preparing for a Disaster

Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planningAureusIT
 
Simplitfy - Guarding your Data
Simplitfy - Guarding your DataSimplitfy - Guarding your Data
Simplitfy - Guarding your DataErick Solms
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNorth Texas Chapter of the ISSA
 
End user business-continuity.pptx datto slide
End user business-continuity.pptx datto slideEnd user business-continuity.pptx datto slide
End user business-continuity.pptx datto slideLaura Breese
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Innovators
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber SecurityAllen Zhang
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Claus Cramon Houmann
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItResilient Systems
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016Tudor Damian
 
smAlbany 2013 gn bdr pp
smAlbany 2013 gn bdr ppsmAlbany 2013 gn bdr pp
smAlbany 2013 gn bdr ppLiberteks
 
Bab 7 (assuring reliable and secure it services)
Bab 7 (assuring reliable and secure it services)Bab 7 (assuring reliable and secure it services)
Bab 7 (assuring reliable and secure it services)Siti Mustiani
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksResilient Systems
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Claus Cramon Houmann
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesAll Covered
 

Ähnlich wie Business-Critical Backup: Preparing for a Disaster (20)

Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planning
 
Simplitfy - Guarding your Data
Simplitfy - Guarding your DataSimplitfy - Guarding your Data
Simplitfy - Guarding your Data
 
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin DunnNetworking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
Networking 2016-06-14 - The Dirty Secrets of Enterprise Security by Kevin Dunn
 
End user business-continuity.pptx datto slide
End user business-continuity.pptx datto slideEnd user business-continuity.pptx datto slide
End user business-continuity.pptx datto slide
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for Nonprofits
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber Security
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
 
Disaster Proof
Disaster ProofDisaster Proof
Disaster Proof
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
 
smAlbany 2013 gn bdr pp
smAlbany 2013 gn bdr ppsmAlbany 2013 gn bdr pp
smAlbany 2013 gn bdr pp
 
Bab 7 (assuring reliable and secure it services)
Bab 7 (assuring reliable and secure it services)Bab 7 (assuring reliable and secure it services)
Bab 7 (assuring reliable and secure it services)
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber Attacks
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security Services
 
DCNCBC
DCNCBCDCNCBC
DCNCBC
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 

Kürzlich hochgeladen

Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsGOKUL JS
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryWhittensFineJewelry1
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 

Kürzlich hochgeladen (20)

Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebs
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 

Business-Critical Backup: Preparing for a Disaster

  • 1. BUSINESS-CRITICAL BACKUP: PREPARING FOR DISASTER Justin Winzenried NetWize - Account Executive jwinzenried@netwize.net 801-716-5354 Mike Fullmer NetWize – Director of Sales mfullmer@netwize.net 801-716-5344
  • 2. Why Plan Disaster Recovery? “A company that experiences a computer outage lasting more than 10 days will never fully recover financially. 50% will be out of business within 5 years.” "Disaster Recovery Planning: Managing Risk & Catastrophe in Information Systems" by Jon Toigo • The #1 reason for implementing a disaster recovery solution is to keep from going out of business when disaster strikes.
  • 7. Man-made Disruptions • Deleted Files • Corrupted Data • Compliance Whistleblowing • Theft Could your business survive if your file server was stolen? DISGRUNTLED EMPLOYEES
  • 11. Definitions: • Business Continuity (BC) - The ability to continue your critical business functions during and immediately after a disaster • Disaster Recovery (DR) - the long-term ability to rebuild your business capabilities after a disaster
  • 12. Understanding Cost Considerations Disaster Recovery Timeline - Offsite Backup is Only Part of the Story 48hr Lower Cost 24hr 1hr Disaster High Cost 1hr High Cost 24hr 48hr Lower Cost RPO RTO Recovery Point Objective Recovery Time Objective How old is your data backup? How much can you afford to lose? How long will it take to restore your business? How long can you last before you don’t have customers?
  • 13. True Cost of Ownership (TCO) • Identifying all the costs associated with DR and BC • What is the cost of my DR service? • What costs are incurred during an emergency? • How much revenue will my company lose while systems are being restored? • How often am I testing, and what is the cost associated with that?
  • 14. Risk – Natural Disasters • Earthquake, fire, flood, hurricanes, tornadoes, etc. • Is your data stored far enough offsite where it won’t be affected? • How far of a reach will the natural disaster have that your trying to protect against? • Will power and network be available to execute your DR plan?
  • 15. Risk – Man-made disaster “According to analyst firm IDC, about 70% of all successful attacks on computer networks were carried out by employees and insiders” (http://iosafe.com/industry-stats)
  • 16. Risk – Man-made disaster To protect against internal threats, are you: • Implementing permission controls? • Implementing group policies? • Do you have the ability to monitor and control employee’s access? • Training users about acceptable computer use policies?
  • 17. Risk – Man-made disaster To protect against external threats ask yourself: • What security is currently in place? • Passwords, encryption, firewalls, etc. • What physical security do I have? • Door locks, key cards, laptop locks, bezel locks, etc. • Do I have regular security reviews or audits?
  • 18. Disaster Declaration • A specific event that starts your disaster recovery plan. • This needs to be defined and written down. Although not all situations can be accounted for, basic guidelines and rules can clarify when a disaster should be declared, and when it should not
  • 19. Implementation “Strategy without tactics is the slowest route to victory” -Sun Tzu
  • 20. The NetWize Approach How we approach disaster recovery: 1. Protect the File – First and foremost, is there a solid backup solution in place? 2. Protect the Server – Is there solid equipment installed with proper warranties? Do we need onsite failover, virtualization, and shared storage to mitigate hardware failure? 3. Protect the Company – Do we have offsite failover, offsite storage, and high availability implemented?
  • 21. Review Ask yourself the following about DR: • Do I have a written plan in place to address emergency situations? • Are my backups working? Do I really know how long it takes to restore from backup? • Do I know all the costs associated with being down, and bringing my systems back up? • Are there policies or regulations that require my business to have a disaster recovery plan?
  • 22. Top Five List - Backup Gotcha’s 5. No test restores 4. Backup timing – when was your last backup 3. Only one copy of backup 2. No offsite backup 1. Do not backup local workstations
  • 23. Understanding Cost Considerations Disaster Recovery Timeline - Offsite Backup is Only Part of the Story 48hr Lower Cost 24hr 1hr Disaster High Cost 1hr High Cost 24hr 48hr Lower Cost RPO RTO Recovery Point Objective Recovery Time Objective How old is your data backup? How much can you afford to lose? How long will it take to restore your business? How long can you last before you don’t have customers?
  • 26. Disk to Disk to Tape

Hinweis der Redaktion

  1. Justin Winzenried, with Netwize an MSP based out of Murray Utah.Been in the IT Industry since I was 17. I started out as a technician and moved up from there. The last 2 years I have been in an advisory role, managing our customers accounts.Today we would like to discuss what happens when a disaster hits and how you can plan ahead to ensure your business is up and running.My first run in with data loss was when I was about 13, the hard drive crashed in my computer and I lost all of my data which equated to roughly 500mb of songs and pictures. I was devistated.How many of you know of a client who has lost data?Obviously data has grown at a crazy rate, having a backup and recovery plan has become crucial to our business.
  2. The #1 reason for having a disaster recovery solution is to keep from going out of business when disaster strikes.Reports show, A company that has an outage lasting more than 10 will never fully recover finacially, 50% will be out of business within 5 years.
  3. The ULTIMATE DISASTER!There are a few disasters that if they happened, we most likely would no be concerned about getting our data back but, lets look at some examples that would concern our business.
  4. In Utah, we are pretty far removed from many of the common Natural Disasters. The big one for us on this list is an earthquake and it seems to be a matter of when, not if. What will happen to you business when an earthquake happens?Do you have a plan in place so that your business can be back to functional in a timely manner?Is your data far enough offsite that it would not be damaged?
  5. Hazardous spills or Gas leaks can cause evacuations that can last for hours, sometimes days.Are you set up to work from home?
  6. Most Disasters are not dramatic or newsworthyThey are mundane and may only affect a single companyTalk about water line breaks and flood. LJ Cooper flooded, RotoAire Flooded. Servers sitting on the ground.Air conditioner leaking, multiple clients.
  7. If you have ever seen Office Space, you will get what this slide is showing. That movie may have been a bit dramatic but, sometimes not so far from the truth.Mark Steel, Employee uses fire extinguisher on server.Having a locked server room and a process for employees to save client documentation on the server could save you from a big headache.
  8. Nova – Internet line was cutA secondary internet line is becoming a standard for businesses.
  9. Many people do not associate a virus with a disaster situation.What we see here is a form of RansomWare called CryptoLocker. This has been showcased on several news stories lately.A piece of Malware that generally comes in through email, if opened it will encrypt any file it can find.If the user has mapped drives to the server, it will encrypt those as well. If this infects your servers and you do not have a backup, this would certainly be a disaster.This little virus has wreaked havoc on companies without a backup.Having a backup that is properly monitored and tested could mean the success or failure of your business
  10. Disasters big and small occur daily.How many of you know your business has a disaster recovery plan
  11. RTOHow long will it take until data is usable, and you are back to normal?RPOAfter the disaster, what point in time will my company be operating at? 1 hour prior to the disaster? 1 day? 1 week?The maximum tolerable period in which data might be lost from an IT service due to a major incidentCan my backup solution support my RPO?
  12. How much am I loosing with employee salaries?How much revenue am I loosing?How much am I paying to get the system up and running?Is there an additional charge for testing? When I’m testing, is business effected (downtime, lost potential revenue, etc.)
  13. Disaster Reach:For example, a typical fire won’t have as much of a reach as an earthquake or hurricane – Great Chicago Fire, 1871 -- 3.3 milesIf the disaster hits, how will you communicate between employees?
  14. This is interesting……. 70% of attacks on computer networks were executed internally.
  15. Some events that might trigger a disaster declaration:Downtime exceeds 1 hourA warning is issued from the government about a natural disasterA natural disaster strikes with no advanced warningServer or data gets compromisedProduction hardware failureIt might also be helpful to define what would not trigger a disaster declaration
  16. Having a good strategy is great, but without implementing it you’ll never get off the ground. What do we need to do to implement our strategy?
  17. Protect the file – Do we have a backup in place that we know is doing its job?Are the backups successful?Are test being run to ensure recovery?Protect the Server – Is our hardware Reliable and under warranty? Do we need to have an onsite failover? If so we virtualization and possibly shared storage would be needed.Protect the company – Do we have a failover site that can run our current operation? If so, how often are we testing that it will work in the event of a disaster?
  18. Obviously there are many more questions you need to ask yourself about DR, but answering these questions will help you identify DR improvements from a business perspective
  19. RTOHow long will it take until data is usable, and you are back to normal?RPOAfter the disaster, what point in time will my company be operating at? 1 hour prior to the disaster? 1 day? 1 week?The maximum tolerable period in which data might be lost from an IT service due to a major incidentCan my backup solution support my RPO?