If you're a managed services provider (MSP) looking to dive into the backup and disaster recovery (BDR) pool this summer, we've compiled a few swimming lessons for you to keep your head above the water. We've connected with CCNS Consulting owner Karl Bickmore to discover how three simple BDR lessons would have relieved a lot of tension in the beginning for him. So slip-on your sandals and swim trunks, and head down to the pool for three swimming lessons that will make you better than your competition in this MSPmentor exclusive.
Bickmore promoted three initial areas of focus for those MSPs starting with BDR: vendor selection, the value of standardization of backup, and the cost of initial seeding.
MOORE, Okla. — A giant tornado, a mile wide or more, killed at least 91 people, 20 of them children, as it tore across parts of Oklahoma City and its suburbs Monday afternoon, flattening homes, flinging cars through the air and crushing at least two schools.
The injured flooded into hospitals, and the authorities said many people remained trapped, even as rescue workers struggled to make their way through debris-clogged streets to the devastated suburb of Moore, where much of the damage occurred.
Amy Elliott, the spokeswoman for the Oklahoma City medical examiner, said at least 91 people had died, including the children, and officials said that toll was likely to climb. Hospitals reported at least 145 people injured, 70 of them children.
In a previous post on making suggestions for updating NIMS, I suggested that social media monitoring should go into the ICS structure rather than be considered a part of the JIC or PIO responsibilities. This prompted some thoughtful responses from readers of this blog--I encourage you to read them at the bottom of that post.
I wanted to respond in particular to the comments of Ed McDonough who raises some very important objections to my suggestion. Here is the crux of his concerns:
If we move social media monitoring to planning, then should we also move tradition media monitoring to plans? How about the monitoring of public query lines? Furthermore, what sense would it make to move the monitoring of social media away from the same group of people that are pushing out the social media messaging?
Network World - This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.
Disaster recovery plans and the usual mix of uninterrupted power supplies (UPSs), co-location services, data mirroring and hot-standby technologies theoretically make it possible to weather any storm. But are backup systems, replication rules and fast failover solutions enough?
Any data center manager that has implemented a DR solution understands there are always compromises. To save costs, for example, the generators and co-lo facilities are typically designed to support only a subset of the services being provided during times of normal operation. Here are some considerations meant to ensure the compromises are based on the right facts, and that the DR plan stays aligned with the dynamic requirements of the business it protects.
Business continuity management has evolved into a specialized discipline, but you don’t need a team of specialists to create and manage your BCM program. With a little help, and an understanding of these 14 fundamentals, you can build and manage your BCM program easier than you thought, and at a much lower cost.
1. BCM is risk management, not insurance: BCM ensures that business processes are appropriately resilient to disruptions, or are recoverable at an appropriate time. Insurance is a grudge purchase. You buy as little as you need and accept as many risks as tolerable. If nothing goes wrong, you feel like you wasted your money. Don’t “sell” your BCM program as insurance. Nobody wants to buy that. Sell the ancillary benefits of BCM, i.e., service delivery, compliance. Seek strategic partners and leverage their resources.
While Bloomberg‘s data terminals, which serve up volumes of intricately detailed financial information to Wall Street pros on a daily basis, have enjoyed a reputation as must-have tools, a privacy breach scandal has landed the company in a threatening crisis.
Last week, it was revealed that Bloomberg reporters have had special access to data on how customers used their terminals for DECADES, and actively sought to use it in order to break stories first. Customers ranging from JPMorgan and Goldman Sachs to the U.S. Federal Reserve have all expressed extreme dismay, and the legal letters demanding further information are already starting to pour in.
A United Nations group and consultancy PwC warned businesses that they are exposed more than ever to billions of dollars worth of economic losses linked to natural disaster risks.
According to a report by the UN International Strategy for Disaster Reduction (UNISDR) and PwC, it warns large multinationals' dependencies on international supply chains, infrastructure and markets poses a systemic risk to 'business as usual.'
On May 13, California government officials and private-sector leaders met behind closed doors to discuss a comprehensive cybersecurity plan for the state -- it was the beginning of the California Cybersecurity Task Force, the first state-led collaboration of its kind.
Because of the interconnectedness of government and private-sector IT assets, collaboration has become crucial, said Michele Robinson, acting director for the Office of Information Security.
“Those working relationships need to be strong in order to really affect this area,” she said. “We all own a piece of that infrastructure, so it’s a shared responsibility."
VARs and MSPs assume a number of responsibilities when they take on a new client, or sign a long-term contract with a current customer. In addition to providing disaster recovery and other IT services, this relationship offers the opportunity to become the go-to consultant for a number of issues that their customers experience, including those that appear unrelated to IT systems.
While consultants or service providers in other industries may consider questions outside their “sphere of influence” as nuisances, most IT professionals understand that those queries present a real business opportunity. When clients are willing to seek their VARs’ advice on a business-related subject not directly associated with their computer or network systems, it should be considered a sign of respect and an opening for forging a closer relationship.
Computerworld — Bring your own device is so 2012. The next big push in the consumerization of IT is bring your own cloud. And just as when consumer devices poured into the enterprise, many IT organizations have already responded with a list of do's and don'ts.
The standard approach has been to forbid the use of personal cloud applications for business use, by offering official alternatives -- the "use this, not that" approach -- and to carve out separate cloud storage workspaces for business documents that can be walled off, managed and audited. But personal cloud services are difficult to control, and users are adept at going around IT if the productivity tools in their personal cloud can do the job easier, faster and better. IT wants a bifurcated approach to consumer and professional cloud apps and storage. But users don't work that way anymore.