How to formulate a disaster recovery plan
What do you think of when you hear the word ‘disaster’? Perhaps it is an earthquake, or a wildfire, or maybe a global pandemic. Have you considered the word disaster in the context of your business? Every year, thousands of businesses face disasters in the form of cyber-attacks or hardware failure. These disasters can disrupt day-to-day business or, in some cases, can put a company out of business entirely.
In business, it is always a good idea to plan for every eventuality. Disasters can strike at any moment and can take various forms. An effective disaster recovery plan will give organisations a process to follow when the unexpected occurs, to ensure as little disruption as possible; the longer an issue is left, the more expensive it becomes. Gartner estimates the average cost of downtime is £4,300 per minute which equals to more than £230,000 an hour.
Failure to implement an effective and well-tested disaster recovery plan means you are unnecessarily exposed if a disaster were to occur. This would not only impact on your finances, business reputation can be severely impacted, and some not survive an incident – according to one survey, 25% of businesses do not open after a disaster.
What is a disaster recovery plan?
A disaster recovery plan is a set of procedures and tools used to recover from disruption to a business’ IT resources. Essentially, it acts as a form of insurance by helping to anticipate technology downtime, then creating contingencies and workarounds that minimise the potential consequences of these likely risks.
While initially the costs may seem high, when a disaster strikes, having one in place could make the difference between just experiencing a bad day in the office, or your company going out of business. Below are five steps to ensure an efficient strategy when formulating a disaster recovery plan.
STEP 1: Assess any potential risks
The first step in disaster recovery planning should be to complete a risk assessment to assess any potential risks. Any event, both natural and man-made, that interrupts access to computer systems, apps or data should be considered as a risk. Some examples of these include:
- Fires
- Water pipe breaks
- System failures (hardware and software)
- Accidental errors
- Malicious errors
Business risk analysis should be also be completed alongside the risk assessment. This is where the likelihood of each risk occurring, and the damage each one can cause is identified.
You won’t be able to plan for every threat, which is why the team dealing with the DR planning will need to decide which pose the biggest problems. The key is not to try to defend against every danger, but to have a detailed picture of the potential risks, an understanding of their probability, the consequences if occurred, and how long it takes to recover from them.
STEP 2: Audit all IT resources
If you want to return to ‘normal’, you need to know what your organisations ‘normal’ is. Take time to go through all the IT resources you have in place, both hardware and software, make a detailed inventory of them and then a note of all the essential parts which keep your business operating.
By creating an inventory of all of the IT resources your business network includes, as well as the data each of these holds and how essential they are, it will be easier to streamline your recovery process. As a result, backing up and recovering information or resources in the future will be more efficient should a disaster strike.
STEP 3: Set recovery objectives
Now that you have identified your risks and their damage, as well as the state of your IT resources when operating at normal, you need to set recovery ‘objectives’ or ‘goals’. Setting these are essential if you want an effective disaster recovery plan.
The best way to do this is to set a recovery point objective (RPO) and a recovery time objective (RTO) for each key resource, and if necessary, each key component. An RPO is the recovery window – how long you in which you must recover, and an RTO sets how far back you need to go when recovering data.
For each IT resource, metrics will differ, making it harder to reconcile them all at once. For example, if you’re an organisation with large volumes of significant valuable data, you may struggle with a short RTO, so data recovery would need to be tiered. Less important parts of this data that aren’t accessed all the time may be given lower priority as a result – assigning longer recovery time and not prioritising frequent backups.
These metrics, in turn, end up being tied into further measures that ensure resilience and availability. For example, for businesses that are reliant on their customers who are less tolerant of downtime, contingency plans, such as staff working from home using cloud-based applications may be included.
STEP 4: Establish roles and responsibilities in response plan
When everyone knows what to do in response to a major incident, your disaster recovery plan will be more effective. Therefore, you should ensure every employee in your organisation knows their role to play in the plan.
Company intranets are good places to document any disaster recovery information as all employees whether they’re office based or remote based can inform themselves. In addition to documenting, appropriate training should be given to all employees – and it should not be a one-time thing. To have the most effective DR plan, employees will be regularly trained on any changes to ensure as minimal disruption when the unexpected occurs.
Beyond this, you should form a DR response team that includes experts not just from IT to cover all areas in the organisation. For example, those from HR, legal and business operations. This team need to be aware of how they can communicate in a disaster and should always take part in any DR exercises, so they are familiar with the role they play when disaster strikes.
STEP 5: Test the plan
The worst thing a business can do is formulate a disaster recovery plan, then leave it. The most effective DR plans are ones that go through a continuous process of being tested, reviewed and updated.
“Firms may have written plans and procedures, but they may not be practical or widely known and aren’t actually then applied in a crisis,” comments Samuel Ingrey, a disaster recovery specialist at PA Consulting.
“Firms need a clear decision-making structure and playbooks that have been agreed and refined through practice and testing, and easy-to-understand approaches like a gold, silver and bronze command structure. These are of more practical use to firms during a disaster than a detailed 100-page manual.”
Testing your plan is the best way to expose any weaknesses or problems you weren’t already aware of. Anything learnt from the testing phrase needs to be documented and addressed as soon as possible. From this, teams can feed the knowledge back into other stages of the DR planning process which helps to fine-tune the plan as they go.
If you don’t test, you know whether your plan is resilient enough to perform well under pressures or if it even works at all.
Conclusion
These days, technology plays a substantial role in ensuring business operations stay up and running. Unfortunately, because of this reliance, a short-term problem can quickly evolve into a long-term operational and financial disaster if a disaster recovery plan is not put in place effectively or at all.
Our five steps start you at the beginning of the DR planning process by getting you to complete a full risk assessment and business risk analysis, then gradually guide you onto other key areas of the process such as auditing, setting objectives and testing. If you are not tech savvy and don’t feel confident in complete these steps yourself, many IT providers offer DR as a Service (DRaaS) which helps with the creation and management of DR plans. For businesses where IT is not their main area of business, we highly recommend it. Not only will the help give you peace of mind you have an effective plan in place that has been formulated by professionals, but it will free you up to focus on more important areas of business.
The entrust IT Group have over a decade of experience in helping businesses formulate disaster recovery plans. We also have a number of solutions which have acted as part of many businesses DR plans. For example, our cloud backup is usually chosen because data remains safe should your office be at risk from disasters such as fires, flood or employee theft.
In the current climate, organisations are facing a growing number of threats through widespread work-from-home practises. As a result, defences are being challenged and weaknesses are being exposed more than ever before. Formulating a disaster recovery plan has never been more important. Please get in touch with a member of the team on 0330 002 0045 or email enquiries@entrustit.co.uk if you think you could benefit from our help.
Subscribe here!
Recent Posts
Posts by tag
- technology (124)
- Security (97)
- cyber security (85)
- IT Security (81)
- Cloud (65)
- Microsoft 365 (63)
- modern technology (62)
- Managed Service (60)
- business (60)
- cloud computing (59)
- cyber attack (54)
- workplace (54)
- IT support (53)
- cloud it (53)
- Microsoft Teams (52)
- microsoft (51)
- Working from home (50)
- productivity (47)
- office (46)
- cybersecurity (44)
- office 365 (44)
- IT (41)
- Uncategorised (38)
- employees (38)
- entrustit (38)
- flexible work (36)
- Password Security (34)
- Remote (33)
- efficiency (31)
- Hosted Workspace (30)
- hosted desktop (30)
- schools (29)
- independent schools (28)
- school ict (27)
- collaboration (26)
- 2023 (25)
- Cyber (24)
- cyber privacy (22)
- public cloud (22)
- computing (21)
- email security (20)
- password (20)
- it support bournemouth (19)
- passwords (19)
- entrust (18)
- hosted applications (18)
- VoIP (17)
- cloud voip (17)
- covid19 (17)
- hacking (17)
- private cloud (17)
- data (16)
- it support dorset (16)
- teamwork (16)
- Coronavirus (15)
- GDPR (14)
- hackers (14)
- office 365 support (14)
- ransomware (14)
- IT audit (13)
- Protection (13)
- cloud cctv (13)
- covid-19 (13)
- hack (13)
- it support hampshire (13)
- management (13)
- network (13)
- Hosted Desktop and Applications (12)
- Windows Virtual Desktop (12)
- cctv (12)
- hardware (12)
- internet (12)
- it consultancy (12)
- 2020 (11)
- 2022 (11)
- hybrid cloud (11)
- internet safety (11)
- IT costs (10)
- Microsoft Planner (10)
- data breach (10)
- it consultancy bournemouth (10)
- it support southampton (10)
- it support winchester (10)
- phishing (10)
- vulnerabilities (10)
- windows (10)
- windows 10 (10)
- Backup (9)
- bitwarden (9)
- digital (9)
- it consultancy hampshire (9)
- telephony (9)
- attack (8)
- communication (8)
- desk phone (8)
- education (8)
- eu (8)
- it consultancy dorset (8)
- it consultancy southampton (8)
- msp (8)
- planning (8)
- software (8)
- staff (8)
- uk (8)
- Google (7)
- OneDrive (7)
- infrastructure (7)
- mobile (7)
- offsite backup (7)
- outsource (7)
- partnership (7)
- 2019 (6)
- Apple (6)
- Hampshire (6)
- IT Director (6)
- Skype for Business (6)
- apps (6)
- architect (6)
- child protection (6)
- cloud storage (6)
- european union (6)
- hacks (6)
- legal (6)
- legal it (6)
- mobile phones (6)
- onsite backup (6)
- password manager (6)
- remote desktop service (6)
- usecure (6)
- virus (6)
- 3d design desktop (5)
- Azure (5)
- Bournemouth (5)
- Desktop (5)
- ISO (5)
- News (5)
- Risk assessment (5)
- Windows 7 (5)
- awards (5)
- brexit (5)
- designer (5)
- personal data (5)
- resources (5)
- smartphone (5)
- website (5)
- Access Management (4)
- BYOD (4)
- Dorset (4)
- Facebook (4)
- Government (4)
- SharePoint (4)
- VPN (4)
- WannaCry (4)
- ios (4)
- law (4)
- legacy (4)
- proactive (4)
- remote learning (4)
- 2021 (3)
- 2024 (3)
- Attacks (3)
- Case Studies (3)
- General (3)
- Google Drive (3)
- Help (3)
- IP (3)
- Microsoft Forms (3)
- NHS (3)
- New Forest (3)
- Zoom (3)
- big switch off (3)
- budgets (3)
- citrix (3)
- closed cloud (3)
- ddos (3)
- digital hub (3)
- disaster recovery (3)
- guide (3)
- instagram (3)
- internet of things (3)
- meetings (3)
- sme (3)
- storage (3)
- surrey (3)
- teaching (3)
- trump (3)
- twitter (3)
- 2016 (2)
- 2018 (2)
- CAD (2)
- DR (2)
- DR planning (2)
- Environment (2)
- Firewall (2)
- Gen Z (2)
- ISBA (2)
- Local (2)
- Macs (2)
- Microsoft Copilot (2)
- PaaS (2)
- Tiva (2)
- android (2)
- artificial intelligence (2)
- award winning (2)
- bcs (2)
- broadband (2)
- camcloud (2)
- computer performance (2)
- digital transformation (2)
- downtime (2)
- dropbox (2)
- exhibition (2)
- finalist (2)
- innovation (2)
- legalex (2)
- london (2)
- macos (2)
- online meetings (2)
- organisation (2)
- paypal (2)
- predictions (2)
- president (2)
- strategy (2)
- united kingdom (2)
- us (2)
- video conferencing tools (2)
- 1998 (1)
- 5G (1)
- AI (1)
- AMD (1)
- ARM (1)
- Abbey Hill (1)
- Aldwickbury Park (1)
- BBC (1)
- BUNKERS! (1)
- Birchwood Park (1)
- Burhill (1)
- Burhill Group (1)
- Burnout (1)
- CEO (1)
- ChatGPT (1)
- Cloudtango (1)
- GPT-4 (1)
- Go Integrator (1)
- Hoebridge (1)
- Ignite 2018 (1)
- Ignite 2020 (1)
- Leaders (1)
- Loop (1)
- MFA (1)
- MSP Select 2024 (1)
- Market (1)
- May (1)
- Mr Mulligans (1)
- Multi Factor Authentication (1)
- MyAnalytics (1)
- Ninja Warrior UK (1)
- PBX (1)
- PM (1)
- Power BI (1)
- Privacy Shield (1)
- Ramsdale Park (1)
- Redbourn (1)
- Regulation (1)
- Surrey Business Awards (1)
- Sydenhams (1)
- Tech Company of the Year (1)
- The Business Magazine (1)
- Thornbury (1)
- WCry (1)
- WannaCrypt (1)
- Wifi (1)
- Wycombe Heights (1)
- acquisition (1)
- afc bournemouth (1)
- afcb (1)
- ashley madison (1)
- b2b (1)
- bandwidth (1)
- battersea (1)
- beach (1)
- big data (1)
- bloatware (1)
- blockchain (1)
- builders merchant (1)
- cambridge analytica (1)
- canada (1)
- cia (1)
- clinton (1)
- cnn (1)
- copilot (1)
- copilot pro (1)
- copyright (1)
- cryptocurrency (1)
- dark web (1)
- dns (1)
- donald (1)
- dyn (1)
- east grinstead (1)
- election (1)
- equality (1)
- executive order (1)
- farnham (1)
- fax (1)
- football (1)
- gchq (1)
- grinstead (1)
- intel (1)
- intelligence (1)
- josh widdicombe (1)
- landmarks (1)
- learning (1)
- legal technology forum (1)
- machine learning (1)
- meltdown (1)
- millennials (1)
- mirai (1)
- no-deal (1)
- onsite (1)
- paper (1)
- patisserie valerie (1)
- performance reviews (1)
- pound (1)
- premier league (1)
- procrastination (1)
- recruitment (1)
- research (1)
- serval systems (1)
- sharefile (1)
- smishing (1)
- snowden (1)
- solent (1)
- solent business awards (1)
- solentBA (1)
- spectre (1)
- sterling (1)
- storm (1)
- talktalk (1)
- trumppresident (1)
- ukitawards (1)
- united states (1)
- usa (1)
- vault 7 (1)
- vitality stadium (1)
- whatsapp (1)
- white (1)
- white house (1)
- wikileaks (1)
- wireless internet bournemouth (1)
- wireless internet southampton (1)
- women in business (1)
- xiongmai (1)
- year (1)