Thursday, June 10, 2010

Disaster: "When Bad Things Happen to Good Information Technology"

We all see what happens when people and organizations are not prepared for disaster. Whether the disaster is natural (hurricanes) or man-made (oil spills) there is one disaster we will all experience to some degree in our own lifetime: massive technology failure. It can be as simple as your smart phone and personal computer acting up or breaking down on the same day or as extensive as a company’s entire systems and infrastructure critically failing.

The chance of a disaster on any given day is miniscule, but over time the individual chances continue to mount. Without a plan in place, things can quickly evolve into a true nightmare. Disasters can, and do, happen, so it doesn’t pay to be unprepared. Too often organizations that believe "this is too costly and can wait for a better time to be addressed" find that the real costs lie in disaster recovery, and not prevention.

Since disaster can come from all angles, what can we do to prevent it and keep business operating as usual? What would be the Business Impact if any (or all) parts of your IT infrastructure experienced a disaster?

While a disaster can never be predicted as to when it will happen, there are several warning signs that indicate you are at risk.

Aging Equipment: When equipment starts to become outdated (either due to age or the advent of more advanced hardware) it will be more prone to a variety of issues occurring with the worst end of the spectrum being dead equipment. Aging equipment also incurs more expenses by needing increased servicing. In cases of extremely old equipment, your technology may have aged into a legacy category. Think about your IT hardware like a car but with a shorter life span. If it is properly maintained the life can be extended but once it has reached a certain age (4-to-6 years) the costs of continually servicing the machine will start to out strip the benefit of keeping it.

Type and Frequency of Backup: There are roughly 7 tiers of back up types, ranging from absolutely nothing in place to pricy automated recovery. Depending on how mission-critical time and data recovery is to your business, you can determine which tier is most appropriate. So – ask yourself if your back up a disk image? Disk mirroring? Parallel server(s)? And act accordingly.

Insufficient Resources: If you are running low on memory for your servers or do not have back up servers, either on-site, off-site or virtually, your risk of a crash and longer recovery time is exponentially higher. Having a Business Continuity Plan and a Disaster Recovery Plan for your company will save you time and money in the long run!

Wrong User Permissions: This is one of the most easily avoidable and one of the most dangerous mistakes out there. An employee with unlimited permissions can inadvertently or maliciously access and change critical settings. This can also lead to improper data editing and deletion. Consider what would happen if every employee had access and was able to edit payroll and accounting information? It is the type of disaster that has ruined many small businesses.
Improper Maintenance: Just like anything man-made, your IT infrastructure needs to be regularly serviced to maintain optimal performance. Minor problems that do not shut down business operations and go unnoticed or ignored can quickly snowball into a major disaster. Every so often you have a car tuned-up to increase its lifespan; computer hardware is exactly the same.

Security: This contains two main components: Firewall & Anti-Virus. Many products exist that will fill the majority of needs for the average business. Choosing the proper one should be aligned specifically to organizational needs and risks. Nearly everyone has antivirus software, but is it updated and is it protecting what you think it is protecting? Who and what is your firewall letting in? If you don’t know the answer to these questions, you probably need a security upgrade.

Plan:

Do you have a DRP (Disaster Recovery Plan) in place? Does it cover all applications, data, hardware, communications/networking, and other IT infrastructure?
If not, one can be created after having a Business Continuity Plan Asset Assessment. This will detail what is most critical for your company and the best approach to protect assets between necessity and cost.

Most plans will have several steps involved mitigation measures including: preventive, detective, and corrective measures and monitoring at all phases. Many organizations wait until costly and time consuming corrective measures need to be taken.

After creating a plan, it needs to be maintained and updated as new hardware and software become integrated to the company.

But the best way to face a possible disaster is to follow the old Boy Scout motto: “Always be prepared”





.

Labels: , , , , , , , , ,


posted by Dataccount Inc. @ 4:35 PM   9 Comments




9 Comments:

At August 28, 2019 at 12:46 AM , Blogger caris said...

Ace4sure is the website that deals in preparation material for the exam for many years. According to my exposure and research, this is the right platform where you can get exact N10-007 Dumps Questions.

 
At May 10, 2021 at 11:24 AM , Blogger Elina Rose said...

Once you start burning metal, you better have a good welding helmets on your head. The right welding helmet makes the job safer and makes a tough job easier. Modern welding helmets are light, offer high tech features and can even make you look great. But choosing the wrong helmet could be costly and even painful. Welding will throw burning sparks and drip molten metal around the work site. We took a close look at eight different welding helmets. Balancing cost with features and value will put you in the right gear.

 
At May 29, 2021 at 9:16 AM , Blogger Elina Rose said...

Here are some easy methods to check the Iqama Expiry Date or Validity status in Saudi Arabia online. Check your Iqama Expiry Status now. You can now check iqama expiry online Date through the MOL website without using the Absher account, here is a detailed guide.

 
At September 6, 2021 at 1:23 AM , Blogger Isabell Kiral said...

Technology has changed our lives and we should use it for only positive purpose and avoid from wrong usage because through this, we will harm our society and face many issues. We should apply it in our education department, so that we can get more success. Assignment writing services.

 
At January 11, 2022 at 1:50 PM , Blogger Jone Martin said...

From your blog, People came to know about the many knowledge from your blog. People like your blog. I will do your marketing through USA SEO Company and give you rapid result. Further, you can rely on us.

 
At January 13, 2022 at 3:19 PM , Blogger MartenJames said...

From your article, we got to know how to avoid any disaster in information technology. Additionally, you can get our Alzheimer’s Care at Home in Villages FL services. We have highly trained caregivers who take care of loved ones who are effected with Alzheimer's.

 
At April 18, 2022 at 7:10 AM , Blogger jonamdicks said...

how to take off an embroidered patch? Embroidery is the art of making beautiful fabric designs that has been used for centuries. You can pull or cut away the excess backing, but unless there's more than 1/2" around the outer edges, you should leave it to preserve the quality of your embroidery for a longer period of time.

 
At May 22, 2023 at 4:03 AM , Blogger Ziya said...

I like the article very much. Everyone can benefit from this knowledge. You thoroughly cover the subject and accurately guide the reader. Thank you a lot. erp customer service

 
At January 20, 2024 at 7:34 AM , Anonymous corporate law assignment help said...

The narrative highlights the complexity and manipulation surrounding the exodus, shedding light on the geopolitical considerations and the subsequent freezing of property, which further intensified the plight of Iraqi Jews during that period. The context of the forced migration of Iraqi Jews in 1949, examining the political maneuvering by Iraqi Prime Minister Nuri al-Said to use them as leverage in the Israeli-Arab conflict.

 

Post a Comment

Subscribe to Post Comments [Atom]

<< Home