What would happen if you lost access to your company’s data? Would you get it back, and how soon? To recover operations faster, and more cost-effectively, your company should have a disaster recovery and business continuity plan in place. It’s crucial to develop a risk analysis and assessment so you can plan and be prepared for the unexpected. You can find 10 tips below that can help minimize a disaster’s impact on IT assets.
Failure to resume operations swiftly can compound the effects of the disaster and threaten the survival of the organization. According to one often-cited statistic from the U.S. Bureau of Labor Statistics, 40 percent of all companies that experience a disaster never reopen, and more than 25 percent of the companies that are able to reopen close within two years. Thus, disaster recovery is especially vital.
Avoiding Murphy’s Law: In the midst of the excessive stress that is inevitable in any disaster recovery process, if something can go wrong, it most likely will. Particularly, in any complex IT environment, many unimaginable things can go wrong. Fortunately, there are a number of ways to lessen the effects of Murphy’s law and to reduce the effects of a disaster.
1. Inventory all IT assets.
The first prerequisite to disaster recovery is to know what needs to be recovered. If no detailed inventory of IT assets – both tangible and intangible – is available, make one now. What hardware, software, and data will have to be recovered? Which skills will be required to perform the recovery operations, and then run the systems at a backup location if necessary? The IT asset inventory list should be included in the company’s disaster recovery plan.
2. Maintain offsite data backups.
A comprehensive tape archive strategy is crucial. To minimize recovery times in situations where the physical assets of the primary data center are still operational, backup data has to be available on locally stored tapes.
In addition, it’s critical to protect business operations from the risk of the destruction of the data center. That means backup tapes have to be available at a secondary location. Maintaining an up-to-date copy of backup data at an offsite location is worth almost any price. A local fireproof vault is not an adequate alternative because, depending on the circumstances, the vault may not offer sufficient protection, or may not be accessible quickly after a disaster.
3. Prioritize the data and applications and assess their varying criticality.
All are not created equal. Some will be indispensable in reestablishing the business and need to be restored first. Recovery of secondary applications and data can be deferred until the critical applications and data are restored. The data recovery plan should explicitly state the recovery order of data and applications to reflect these priorities.
4. Don’t omit standalone data from the recovery plan.
Increasingly, business-critical data and documents are stored on laptop and desktop computer disk drives. The data recovery plan should include details on how this data will be backed up and recovered if lost.
And remember, a laptop or desktop computer may be destroyed in the same disaster that strikes a data center. Therefore, it is not enough to back up PC-based data onto a network drive in the primary data center. Critical PC-based data must also be included in the offsite backup data sets.
5. Formally document the plan.
A disaster recovery plan that exists only in someone’s head is no plan at all. While we’d rather not consider the prospect of serious injury or death, it’s possible that some key employees will not be available after the disaster. They may be on vacation and otherwise unreachable during a recovery operation. If the recovery plan exists only in those people’s heads, the remaining staff won’t be able to execute it. Although it may be possible to automate the initiation of some recovery processes and use the system to enforce the completion of checklists, it’s important to keep printed copies of the recovery plan in multiple secure locations, including at the recovery site. A plan for restarting the organization’s systems that is locked inside an application that is unavailable will be useless when the time comes to initiate the recovery operations.
6. Test the solution.
In any complex system or process, what works in theory often fails in practice. Regular testing not only ensures that the recovery plan is viable but also acts as a training tool. People who have already performed the recovery procedures a number of times during regular testing will be familiar with the plan and confident in their abilities to perform the required actions.
Test the recovery processes at least three or four times per year. Tests will often reveal flaws in the plan. When this happens, be sure to update the plan to fix the flaws. Avoid using an off-the-cuff approach to Disaster Recovery (DR) testing. Maintain a test script that follows the DR recovery plan as closely as possible and tests as much of it as possible. For operational reasons, it may not be possible to test all aspects of a recovery operation during every test, but every effort should be made to leave as little as possible out of the DR tests.
7. Maintain multiple communication channels.
When staff has to be notified of a DR event, normal communication channels, such as email and phone, may be disrupted. Consider text messaging, personal email addresses, and alternate phone numbers as alternative communication vehicles. In addition, there are third-party companies that can handle disaster communications.
8. Automate as much as possible.
Human error is possible under any circumstances, but during particularly stressful situations, it is almost inevitable. The more automated the recovery process, the better – thereby removing the human element. However, keep in mind that the systems responsible for automating the recovery operations may be unavailable after a disaster. Thus, just as business applications and data need backups, manual backups for all of the automated recovery processes are crucial.
9. Don’t neglect security.
When recovering from a disaster, it can be tempting to bypass normal security protocols and policies in order to simplify and speed the recovery. In general, this is a bad idea. Security policies were established for a reason, and bypassing them may create risks that are as disruptive as, or more disruptive than, the disaster itself. Also, remember to store passwords in multiple locations. They will be useless if they are available only at a site that is inaccessible.
10. Ask for help.
Creating an effective DR plan can be challenging. DR experts and consultants with extensive knowledge and experience in the field can help leverage the best practices of many companies. They can more effectively craft a plan that meets all business requirements at a cost that fits the budget and is justified by the benefits.
*Source: Information Management newsletter Feb. 4, 2010 (www.information-management.com via Melissa Data).