![]() ![]() These sites are fully configured data centers with commonly used hardware and software products. There are vendors that can provide “hot sites” for IT disaster recovery. Assuming data is backed up off-site or data is mirrored between the two sites, data can be restored at the alternate site and processing can continue. Hardware at an alternate facility can be configured to run similar hardware and software applications when needed. Many businesses have access to more than one facility. However, there are other solutions available for small to medium sized businesses with critical business applications and data to protect. This is a very expensive solution that only larger companies can afford. They utilize dual data centers capable of handling all data processing needs, which run in parallel with data mirrored or synchronized between the two centers. Some business applications cannot tolerate any downtime. Software applications (electronic data interchange, electronic mail, enterprise resource management, office productivity, etc.).Connectivity to a service provider (fiber, cable, wireless, etc.).Hardware (networks, servers, desktop and laptop computers, wireless devices and peripherals).Computer room environment (secure computer room with climate control, conditioned and backup power supply, etc.).Therefore, recovery strategies should be developed to anticipate the loss of one or more of the following system components: Without one component of the “system,” the system may not run. Information technology systems require hardware, software, data and connectivity. The recovery time for an IT resource should match the recovery time objective for the business function or process that depends on the IT resource. IT resources required to support time-sensitive business functions and processes should also be identified. Priorities for IT recovery should be consistent with the priorities for recovery of business functions and processes that were developed during the business impact analysis. This includes networks, servers, desktops, laptops, wireless devices, data and connectivity. Recovery strategies should be developed for Information technology (IT) systems, applications and data. Building An Information Technology Security Awareness and Training Program - NIST Special Publication 800-50.Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities – NIST Special Publication 800-84. ![]() Contingency Planning Guide for Federal Information Systems - NIST Special Publication 800-34 Rev.Computer Security Resource Center - National Institute of Standards and Technology (NIST), Computer Security Division Special Publications.Resources for Information Technology Disaster Recovery Planning A plan for data backup and restoration of electronic information is essential. The impact of data loss or corruption from hardware failure, human error, hacking or malware could be significant. Some data is vital to the survival and continued operation of the business. Technology recovery strategies should be developed to restore hardware, applications and data in time to meet the needs of the business recovery.īusinesses large and small create and manage large volumes of electronic information or data. Priorities and recovery time objectives for information technology should be developed during the business impact analysis. What do you when your information technology stops working?Īn information technology disaster recovery plan (IT DRP) should be developed in conjunction with the business continuity plan. Desktop computers, laptops and wireless devices are used by employees to create, process, manage and communicate information. Servers process information and store large amounts of data. Electronic data interchange (EDI) is used to transmit data including orders and payments from one company to another. Employees use electronic mail and Voice Over Internet Protocol (VOIP) telephone systems to communicate. Leaders in Business Community Resilienceīusinesses use information technology to quickly and effectively process information.Chemicals and Hazardous Materials Incidents. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |