Spring World 2018

Conference & Exhibit

Attend The #1 BC/DR Event!

Winter Journal

Volume 30, Issue 4

Full Contents Now Available!

DRJ Blogs

DRJ | The premiere resource for business continuity and disaster recovery

3 Steps Prevention against Ransomware

3 Steps Prevention against Ransomware

Regrettably ransomware are becoming a regular occurrence. The stories of data loss, locked away data and critical operation disruption are real. With the General Data Protection Regulation (GDPR), applicable after 2018, companies are already addressing their backup and disaster recovery plans to ensure that they remain compliant with the data protection regulations. Regardless of compliance reasons, enterprises still need a reliable way of protecting themselves from ransomware.

The following three steps can prepare an enterprise to prevent the damage done by ransomware:

Step 1: Prepare

Preparation is of the utmost importance; something as grand a scale as moving to the cloud takes a great deal of it. It can be classified into these major segments: Training staff, employing security layers, removing outdated operating systems.

...
Continue reading
942 Hits
0 Comments

Here are few tips to keeping your BC plan and program healthy!

Food is a universal language. So is man’s need to survive. Whether in the business world or the kitchen we need a simple recipe for business continuity success.  In this four part series I’ll introduce you to the four basic courses necessary when cooking up an appetizing and rewarding business continuity program. This week the focus is on doing what’s good for us…exercising and eating our veggies!

Continue reading
1554 Hits
0 Comments

The Devil(ed Egg) is in the Detail: Recipe for Disaster Recovery, A Cookbook for building an effective Business Continuity Program

Food is a universal language. So is man’s need to survive. Whether in the business world or the kitchen we need a simple recipe for business continuity success.  In this four part series I’ll introduce you to the four basic courses necessary when cooking up an appetizing and rewarding business continuity program.   Let's get started... Remember the "devil(ed egg) is in the detail".

 

Continue reading
2841 Hits
0 Comments

Using the Results of Your BIA to Develop Disaster Recovery Requirements

By Michael Bratton, Avalution Consulting
Originally posted on Avalution Consulting’s Business Continuity Blog

So you’ve just completed your business impact analysis (BIA) – identifying recovery time objectives for a variety of processes and functions throughout your organization and captured the names of applications and systems that business owners state they just can’t live without. In addition, the IT department heard you were conducting a BIA and mentioned on a few different occasions that they were excited to see what the final results would be to help with their planning. You’ve taken all the applications and their reported recovery time and recovery point objectives and crammed them into a very lengthy spreadsheet, and then the inevitable happens… you realize that everything you have collected is a huge mess.

But, don’t worry, this is a common issue! This perspective will explore the process of taking that seemingly disorganized pile of data and organizing it into something that can be utilized by IT disaster recovery planners to help meet continuity goals. So, let’s get started!

...
Continue reading
1494 Hits
0 Comments

Bankers As Buyers: 2014 Tech Trends for Disaster Recovery

Originally posted on Rentsys Recovery Services' blog

Every year the William Mills Agency releases a Bankers As Buyers report containing essential information and statistics about the technology trends that are popular in the U.S. financial services industry.

In this year's report, we found three key takeaways that your firm should keep in mind as you update your 2014 disaster recovery (DR) plan.

...
Continue reading
1749 Hits
0 Comments

Government shutdown does not halt growth of data

During the shutdown, slowdown or whatever you call it, did you stop using your phone, sending emails or going to work? No. For the majority of us, the only thing that actually shut down was our goofy government and wonderful representatives (all of them). The fact is, the rest of the world just kept on working. We did not have a choice.

 Funny thing. This living being that is “big data” kept growing while we continued feeding it with our day-to-day use of electronics. You used Facebook and the bank and everything else. 

 Here’s the real question. Did the IT departments of the banks and Facebook shutdown too? Did all the data protection solutions in play stop working because the government decided not to do its job? Again, the answer is no.

 While the government stopped, the world added petabytes to the infrastructure we protect. It’s important to understand that protecting all of this data is not easy. As a matter of fact, it is impossible.

...
Continue reading
1494 Hits
0 Comments

Big data, big changes, big trouble (in Little China)

Big data, big changes, big trouble (in Little China)

Every day you add more data to your infrastructure. Some analysts say it averages 20 percent year on year. There are certain types of organizations that can change up to 60 percent year on year. One way or another, data keeps growing and you keep buying more storage, and that can cause big trouble.

In 1986, the movie “Big Trouble in Little China” was released and changed the world. Its “B” grade kung fu moves and effects made everyone laugh, but there was a serious element to the movie too that translates into the world of IT. The main character Jack Burton said, “I'm a reasonable guy. But, I've just experienced some very unreasonable things.” This profound statement really does rock the IT world.

...
Continue reading
3946 Hits
0 Comments

Your business DNA: Do you have an inherited disease?

You are an administrator of your company’s IT infrastructure. Before you came along, it was someone else’s job, but you inherited their mess. While another person built the infrastructure, it is now your responsibility to manage everything that happens within it. 

 

That inherited infrastructure is the DNA of your business. All of your plans, projects, business and customer information exist in the form of 1’s and 0’s. Just like DNA, those 1’s and 0’s are the building blocks of everything else you do. 

...
Continue reading
2063 Hits
0 Comments

Scalability–You grow, it grows!

When keeping pace with growing data, a major concern for IT organizations, in terms of both storage and data protection is how the data protection solution will handle the growth.

If your business has grown its capacity by 40-60 percent in each of the past three years, and it now supports billions of data objects, you need a solution that grows with you. This growing of capacity may be outpacing your data protection solution and you may need to find a way to scale your protection.

...
Continue reading
1859 Hits
0 Comments

What to know about private cloud!

Before considering cloud-based data protection, it is important to first understand the basics of cloud, which can sometimes be foggy (at best). With trade magazines and publications defining the "cloud" in a number of different ways, IT managers and executives are often confused about the true meaning of the term; however the recent maturation of cloud-based services has helped the definition become more focused.

 In a nutshell, there are two main types of cloud-based data protection services: public and private. The public cloud is where data is on a shared infrastructure. In a private cloud, data is on dedicated infrastructure and the owners of that data share no part of it with others. There are variations of the public and private cloud, including combinations of the two that result in a "semi-private cloud," but for the sake of clarity, we will stay away from that topic.

In data protection, there are some popular configurations to consider. The first is disaster recovery to a private cloud, which assumes an existing solution is onsite and has a backup copy and perhaps an archive copy. Usually this involves a system with disks and/or tape that keeps the data protected for a set duration of time. It then assumes that users want to automate disaster recovery to another location. Customers who need this cloud offering typically want to move away from a tape solution or have not yet installed a disaster recovery technology.

...
Continue reading
1855 Hits
0 Comments