What Should You Do If Your Business Suffers Disasters?

August 17, 2022

Author: computit

Unexpected disaster interrupts your service delivery at any time and put you at uncertain risk.s.
Is Essential Eight Required by Law?

Is Essential Eight Required by Law?

              Main Point:             1. Essential Eight is a good baseline to prevent cyber threats from your business.             2. The benefits of implementing Essential Eight strategies include defence in depth, accessible to all,                ...

3 Differences between MSP and MSSP

3 Differences between MSP and MSSP

      Main points: Differences between managed IT services and managed security IT services include administration, commitment, and features. Cost is the deciding factor of stopping business leaders employing MSSPs (managed security service providers), but there are...

Oops, still few people think about managed IT services?

Oops, still few people think about managed IT services?

A management trend has developed since June 2022 as to whether enterprises should subscribe to managed IT services for their business IT support. Icon Water, which is the ACT’s water and wastewater utility, has partnered with a managed IT service company in a $15.5...

What Can A Company Learn From Twitter “Unmention”?

What Can A Company Learn From Twitter “Unmention”?

  Main points:    1. There are three types of data backups: full backup, incremental backup, and differential backup.    2. Small businesses that consistently deal with small amounts of data can find a full backup a good option as it doesn't take up their storage...

    Main points: 

  1. A potentially dangerous piece of functionality in Office 365 or Microsoft 365 allows ransomware to encrypt files stored on the cloud to make them unrecoverable. 
  2. Main disaster recovery plans include multiple backups (including offsite), encryption & security groups, backup power source, replacement, antivirus installed, data center disaster recovery, and virtualization. 
  3. In general, the dr plan will vary according to the specific disaster.

In the past weeks, it was reported that ResetData will have a collaborative project with Macquarie Data Centres in disaster recovery-as-a-service (DRaas).

ResetData is a company that is expertise within gaming and serves industries that rely heavily on data, while Macquarie Data Centres delivers services of organisational and/or personal cloud and internet security for business and government. The two technology companies work together for long-term mutual benefits of preventing data and systems from cybercrime, especially ransomware. 

Recently, it was found that ransomware is likely to encrypt files stored on the cloud to make them unrecoverable through a potentially dangerous piece of functionality in Office 365 or Microsoft 365.  The collaboration between ResetData and Macquarie Data Centres can reduce the risks of ransomware. Let’s get back to small companies, these risky cyber problems remain to be addressed by them. 

 

So, what is disaster recovery? 

Disaster recovery is a set of procedures for recovering vital technology infrastructure following natural and human-induced disasters. There are five common disasters and the related dr plan below: 

  1. Natural disaster (Multiple backups)
  2. Manual errors (Encryption & security groups)
  3. power/grid failure (Backup power source, such as generator, 
  4. Hardware failure (Replacement)
  5. Virus/Ransomware (Antivirus installed)

In general, the dr plan will vary according to the specific disaster. 

 

Disaster recovery (dr) planning:

There are five dr solutions below for the above five disasters:

1.Multiple backup:

This backup plan allows you to store the previous data in several different versions, including onsite and offsite. For example, IT service providers help store your same data in hardware and cloud. A mix of onsite and offsite data storage helps reduce risks of data loss. Even if both data of the system and data in the cloud are lost, you will still have data stored in the hardware. This plan also delivers the data backup encryption service and provides the password to the security groups of your company (more details show below).

2.Encryption & security groups:

First step, your system and ongoing data are encrypted in case cybercrime accesses your files. In the second step, the IT service provider will give your security group a password unencrypting your files and inform them what they have to do.

3.Backup power source:

This plan is to resolve the grid failure problem that can interrupt your business services. Backup power system is used to provide energy when your primary power source fails. Backup power source is very crucial since most devices need power for operations. There are two main power sources, including generators and uninterruptible power sources (UPS). The generators include a range of backup power generators, such as a portable generator and battery backup generator. Here, UPS is recommended as it has advantages of sustained overvoltage, sustained reduction in input voltage and so on.  What you must do is chosen by capacity and by the quality of power that is required by the equipment that is being supplied.

4.Replacement (immedidate):

Having backup replacement is used to address the problem of hardware failure. The IT service providers provide a solution for disaster recovery through backup replacement using router or disk drives.

5. Antivirus installed:

This solution is easy to understand. Antivirus installed is to prevent the damages from unexpected viruses and ransomware. 

 

Other dr solutions: 

  • Datacenter disaster recovery: This plan relies heavily on the physical infrastructure of a datacenter. It prevents data loss from certain types of disasters and helps faster disaster recovery. For example, a backup power source will help businesses sail through power outages without grinding operations to a halt. However, this plan doesn’t account for cyber attacks because these physical disaster recovery tools cannot prevent cyberattacks.
  • Virtualization disaster recovery: virtualization is an effective disaster recovery method. The difference from other plans is that it allows your business to automate DR processes, getting everything back online faster. Also, frequent transfers of data and workloads by the IT team are essential. 

If your business suffers two or more than two disasters, IT service providers may think about a plan mix. The disasters bring uncertain risks to your business. When a disaster strikes your business, don’t hesitate to contact IT service near you

 

          Not sure which dr solution is right for you? Please click on button below.

How do IT service providers plan for COVID-19 disaster recovery(disaster recovery backup)? 

In many western countries, many companies have pushed employees to work remotely due to COVID-19  and the global and/or regional weather event (Brisbane flooding). In order to keep remote work going well, employers have to rethink their disaster recovery and make business continuity strategies accordingly. 

Computit is an IT company in Brisbane which can provide a range of IT services and the staff are always friendly and communicate when needs to be done. This is what they will do for disasters. 

  1. Understand what disaster you suffer, and evaluate risks of COVID-19 and the relevant governmental policies. 
  2. Add the risk and potential consequences of infectious diseases to your disaster recovery plan. Making disaster recovery plans for emergencies will help ensure they are handled smoothly. 
  3. Do a post-service evaluation, make sure if one system suffers disasters, the business can still run. 

 

Additional resources: 

https://www.techbusinessnews.com.au/news/macquarie-and-resetdata-bring-leading-data-centre-tech-to-australia/

https://www.techbusinessnews.com.au/blog/microsoft-office-365-functionality-that-can-ransom-files-stored-on-sharepoint-and-onedrive/

https://www.qld.gov.au/health/conditions/health-alerts/coronavirus-covid-19

https://en.wikipedia.org/wiki/2022_eastern_Australia_floods

You May Also Like…

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *