Premium Essay

Business Recovery

Submitted By
Words 1172
Pages 5
As businesses are surrounded with more and more threats each and every day, a business needs to have a business continuity and disaster recovery plan activated and ready to be implemented in case of disaster or emergencies. These plans are related practices that establish a platform for an organizations preparation for any possible unforeseen risks to contained operations. The plans are organized to help the organization recover if any disaster occurs. The plans outline of each action a business or particular employees to help restore any of the company’s critical operations that have been interrupted during or after a disaster or occurrence. The objective for a successful disaster recovery is to have a business continuity and disaster recovery …show more content…
The recovery phase takes assumption the cause of the disruption has stopped, been contained, or subsided. There is no rule to follow in this phase, as actions will be dictated by the specifics of each situation. The recovery efforts depend on the recovering from the immediate aftermath of the event or disaster and if the event is still occurring. Furthermore, the recovery phase includes evacuating the facility, removing equipment that can be damaged easily, identifying the situation or the damage, and determining the recovery steps to resume normal business operations. Also, it is important to develop triggers that help the business know when to transition from recovery efforts to business continuity efforts The triggers determine the effects of the disruption to the business and are not continuing to make a big impact on the company. Additionally, activities such as a fire in the building, assessment of the fire, suppliers have been salvaged are included in the recovery phase. Moreover, when the phase is completely the business moves to the business continuity phase, which includes resuming normal business. The recovery phase focuses on recovering a business from any disasters or disruptions in order to resume back to normal business …show more content…
Every so often the business continuity and disaster recovery plan needs to be reviewed to confirm it is current and relevant. Operations and technology components change, locations or faculties may change and the plan needs to be updated to define these changes. Old plans can be dangerous for a business because it provides a form of false security that could possibly create significant gaps in coverage if the plan is reflecting old information. The plan needs to be repeated numerous times for effectiveness of the approach to seek operationalize plan maintenance. Everymen a company makes a change such as setting up a new server the business continuity and disaster recovery plan needs to be reviewed. The review is a established part of the IT change control process and the change control documentation can determine the necessary changes what need to occur with the business continuity and disaster recovery plan as a result of the changes made in the business. If a company activates a business continuity and disaster recovery plan the company should assess the effectiveness of the plan when the business resumes to normal or semi-normal operations. Reviewing the plan after the disaster or disruption can give the business valuable insights of what was effective and ineffective t. this knowledge can be incorporated into the company’s plan to continue to have a successful

Similar Documents

Premium Essay

Compare and Contrast Various Business Continuity & Disaster Recovery Planning Models.

...Contrast various Business Continuity & Disaster Recovery Planning models. Information is a vital resource to modern companies. The loss of that information can throw a company into chaos and even be the end of it. For these reasons, businesses go to great lengths to ensure that the information they store and rely on will always be safe and available. Unfortunately despite these best efforts, disaster can still strike and the few hours of days after such an event may be crucial to the long term survival of the company. This is why businesses must be able to recover quickly from natural and man-made disasters. Business Continuity & Disaster Recovery covers how companies should act in the hours and days after a disruptive event. “What is Business Continuity and Disaster Recovery” describes disaster recovery as “...specific steps taken to resume operations in the aftermath of a catastrophic natural disaster or national emergency.” They go to give examples of such steps to include restoring servers and data connections, egress, employee muster, etc. Business Continuity is described as a the steps a company takes to ensure its information systems don't go down during a disaster (What is Business Continuity and Disaster Recovery). This may include the location of hot or cold sites as well as procedures for relocating to them. Disaster Recovery plans may also focus on preventive measures such as smoke alarms and fire drills (Smith, C., n.d.). Business recovery plans may cover loans...

Words: 399 - Pages: 2

Premium Essay

Business Continuity and Disaster Recovery Planning for It Professionals

...436_XSS_FM.qxd 4/20/07 1:18 PM Page ii 443_Disaster_Rec_FM.qxd 5/25/07 3:07 PM Page i Visit us at w w w. s y n g r e s s . c o m Syngress is committed to publishing high-quality books for IT Professionals and delivering those books in media and formats that fit the demands of our customers. We are also committed to extending the utility of the book you purchase via additional materials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our solutions@syngress.com Web pages. There you may find an assortment of valueadded features such as free e-books related to the topic of this book, URLs of related Web sites, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of expertise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE E-BOOKS For readers who can’t wait for hard copy, we offer most of our titles in downloadable Adobe PDF form. These e-books are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress...

Words: 189146 - Pages: 757

Premium Essay

Business Continuity/Disaster Recovery Plan for Local Government Agency

...CASE STUDY-BUSINESS CONTINUITY/DISASTER RECOVERY PLAN FOR LOCAL GOVERNMENT AGENCY 1. Disaster Recovery for City Hall Server #3 a. RTO/RPO for Hardware/Software: The Recovery Time Objective (RTO) is the determined length of time from when a disruption occurs in which a department’s functionalities, systems, applications, etc. must recover. The RTOs for the City Clerk, HR, and Finance Departments are as follows: RTO: Recovery Time Objective APPLICATIONS CITY CLERK HR FINANCE Millennium – Internal Payroll Processing 1 Day 4 Hours 1 Day Access to External Ameripay Payroll Service 1 Day 4 Hours 1 Day Collector’s Office System (Access) 1 Month 1 Month 1 Month Building Department System (Access) 1 Month 1 Month 1 Month Water Department System (Access) 1 Month 1 Month 1 Month PeopleSoft (HR System) N/A 4 Hours N/A The Recovery Point Objective (RPO) is the amount of acceptable data loss determined by an organization during a disruption of systems. The RPOs for the City Clerk, HR, and Finance Departments are as follows: RPO: Recovery Point Objective APPLICATIONS CITY CLERK HR FINANCE Millennium – Internal Payroll Processing 0 0 0 Access to External Ameripay Payroll Service 0 0 0 Collector’s Office System (Access) 1 Week 1 Week 1 Week Building Department System (Access) 1 Week 1 Week 1 Week Water Department System (Access) 1 Week 1 Week 1 Week PeopleSoft (HR System) N/A 0 N/A Because the applications within each of the departments itemized above have...

Words: 1796 - Pages: 8

Free Essay

Carnival Cruis

...arm movement: outsweep, insweep, and recovery. The movement starts with the outsweep. From the initial position, the hands sink a little bit down and the palms face inward, and the hands rotate outward and move apart. During the outsweep the arms stay almost straight and parallel to the surface. The outsweep is followed by the insweep, where the hands point down and push the water backwards. The elbows stay in the horizontal plane through the shoulders. The hands push back until approximately the vertical plane through the shoulders. At the end of the insweep the hands come together with facing palms in front of the chest and the elbows are at the side at the body. In the recovery phase the hands are moved forward again into the initial position under water. The entire arm stroke starts slowly, increases speed to the peak arm movement speed in the insweep phase, and slows down again during recovery. The goal is to produce maximum thrust during the insweep phase, and minimum drag during the recovery phase. As a variant, it is possible to recover the arms over water. This reduces drag, but requires more power. Some competitive swimmers use this variant in competition. Another variant is the underwater pull-down, similar to the push phase of a butterfly stroke. This stroke continues the insweep phase and pushes the hands all the way to the back to the sides of the hip. This greatly increases the push from one stroke, but also makes recovery more difficult. This style is well suited...

Words: 753 - Pages: 4

Free Essay

Disaster Recovery

...retained. Often some of these backups are removed from the site for safekeeping and disaster recovery purposes. RTO - The recovery time objective (RTO) is the targeted duration of time and a service level within which a business process must be restored after a disaster (or disruption) in order to avoid unacceptable consequences associated with a break in business continuity.[1] It can include the time for trying to fix the problem without a recovery, the recovery itself, testing, and the communication to the users. Decision time for users representative is not included. RPO - The recovery point objective (RPO) is the age of files that must be recovered from backup storage for normal operations to resume if a computer, system, or network goes down as a result of a hardware, program, or communications failure. Cold Site - A cold site is a similar type of disaster recovery service that provides office space, but the customer provides and installs all the equipment needed to continue operations. A cold site is less expensive, but it takes longer to get an enterprise in full operation after the disaster. Warm Site - A warm backup site is already stocked with hardware representing a reasonable facsimile of that found in your data center. To restore service, the last backups from your off-site storage facility must be delivered, and bare metal restoration completed, before the real work of recovery can begin. Hot Site - Hot...

Words: 369 - Pages: 2

Free Essay

Breaking Food Addiction: the Story of Amber

...society that puts blame and shame on the obese. But an involvement with a 12 step program put her on a path to truth of self, recovery and eventually life changing weight loss. “Prior to being introduced to 12 steps, my life was about food and the acquisition of it,” said Amber. Only 48 months ago Amber weighed nearly 320 lbs with a dress size of 26. Tired of fad diets and breaking self promises, she turned to the help of the well-known 12 steps for addiction and as she put it ‘got real’ about her food addiction. She found a long term solution for her food issues in understanding the science of addiction to food and by committing herself to the 12 steps of addiction recovery. Both Amber and her colleague Dr. Vera Tarman agree that weight loss is only a result of the recovery process for the food addict. Amber went from sneaking food and staying away from public interactions to becoming an advocate for food addiction in the public eye, truly a real life success story. “The process of surrendering to addiction is difficult for most people,” said Dr. Tarman, Canada’s foremost food addiction expert. “For those people like Amber who embrace the science behind food addiction and the need to change the way they think and act; the results of recovery can be remarkable.” Today Amber has lost over 150 lbs and more importantly is totally committed to the recovery process, including abstinence from sugars and starch. “It’s one day at a time for me, like it is for most people recovering...

Words: 360 - Pages: 2

Free Essay

Sobriety

...drinking, to aquire a foundation for sobriety, and to providing service for the still sick and suffering alcoholic. There is a formal part of our Alcoholics Anonymous philosophy of life is four absolutes,the twelve steps,and the twelve traditions. Our sobriety had to become number one to gain a spirituality,mental,also physical well being while working the program. Because the Absolutes are not specifically repeated in our Steps or Traditions, some of us are inclined to forget them. Yet in many old time groups where the solid spirit of our fellowship is so strongly exemplified, the Absolutes receive frequent mention. A twelve-step program is a set of guiding principles outlining a course of action for recovery from addiction, compulsion, or other behavioral problems. The Twelve Traditions of twelve-step programs provide guidelines for relationships between the twelve-step groups, members, other groups, the global fellowship, and society at large. Often there are special beginner's, or "First Step,"meetings that are attended both by newcomers and those who have been sober a long time. The home group provides a foundation where they go every week, so people get to know them. Part of the home group functions are...

Words: 672 - Pages: 3

Free Essay

Help

...Questions 1. What happens to the data on the drive sent in for an RMA and can it be retrieved a. Customer confidentiality is a priority to Western Digital. When a drive is received at our facility, it is put through a rigorous testing process for analysis. During this process, all data on the drive is completely erased, and therefore irrecoverable. b. Consequently, if you need to recover the data on the drive, you must do so before returning the drive to us. As was stated in the above paragraph, once we receive the drive, all data is completely erased and irrecoverable. If you need data recovery, please click on the link below for a list of WD data recovery partners. Once they recover your data, you can then send the drive in for replacement. c. Answer ID 70: Can I recover data on my drive, obtain a circuit board, repair my drive, or find a list of WD data recovery partners?. 2. How to reset a WD My Cloud, Mirror, EX2, or EX4 Personal Cloud drive d. WD My Cloud i. With the device powered on, please insert a paperclip or narrow tipped pen into the Reset button slot on the back of the device, which is located right above the USB port of the unit. ii. Press and hold down the Reset button for four seconds. When the button is released, the device will reboot. This process may take up to three minutes to complete. e. Performing a System Restore through the Reset button iii. The Reset button may also be used to perform a System...

Words: 386 - Pages: 2

Premium Essay

Final Information Security Policy

...1. Executive Summary 2 2. Introduction 3 2.1 Company Overview 3 2.2 Security Policy Overview 4 2.3 Security policy goals 4 2.3.1 Confidentiality 4 2.3.2 Integrity 5 2.3.3 Availability 5 3. Disaster Recovery Plan 6 3.1 Risk Assessment 6 3.1.1Critical Business Processes 7 3.1.2 Internal, external, and environmental risks 7 3.2 Disaster Recovery Strategy 8 3.3 Disaster Recovery Test Plan 8 3.3.1 Walk-throughs 8 3.3.2 Simulations 9 3.3.3 Checklists 9 3.3.4 Parallel testing 9 3.3.5 Full interruption 9 4. Physical Security Policy 10 4.1 Security of the building facilities 10 4.1.1Physical entry control 10 4.1.2 Security offices, rooms and facilities 11 4.13.Isolated delivery and loading areas 12 4.2 Security of the information systems 12 4.2.1Workplace protections 12 4.2.2Unused ports and cabling 13 4.2.3 Network/server equipment 13 4.2.4 Equipment maintenance 13 4.2.5 Security of laptops/roaming equipment 13 5. References 14 Executive Summary The objective of this proposal is to present the information security policy created for Bloom Design Group. The issue of a company’s network security continues to be crucial because the results of data loss or significant system failure can be disastrous for a company. An alarming number of companies fail to realize how vulnerable their network is to internal, external, and environmental risks. One of the top priorities of an organization should be maintaining...

Words: 3568 - Pages: 15

Premium Essay

Impac of Ict

...person in care of Mental Health Service must have an individual care plan (MHA 2001; art 15&16). Mental Health Commission in its document related to individual Care Planning in Mental Health Service outlined that recovery of a client needs to be at the centre of all that nurses do and care plans are here like a key tools, guiding nursing work in this process (MHC 2012, p.8). Presented essay attempts to explore how nursing care and interventions support the process of patient’s recovery. In further part of it focus will be on how individual care plans reflect process of recovery and how they guide nurses towards it. Concept of ‘recovery’ in Mental Health slightly differs from adopted definition. Usually a person with severe mental health problems such as Schizophrenia or Bi-polar cannot fully recover from the illness like it takes place in most of the patients with physical illnesses. The concept of recovery in Mental Health addresses issues related to building-up self-esteem, learning to control the illness; recognizing symptoms of relapse; returning to normal life and enjoying it as much as possible. It is a long journey that involves intensive work and collaboration of all members of MDT, patient itself and his/her family. From the client’s point of view recovery process concentrates mainly on setting up and achieving small goals, building-up hope, personal growth, education, overcoming symptoms of illness, building-up support network and...

Words: 2288 - Pages: 10

Premium Essay

Social Model Recovery Research Paper

...internship at River Community residential treatment facility in Azusa Canyon. River Community is part of the Social Model Recovery Systems. River community is a coed facility, that houses up to 38 residents. Social Model Recovery Systems is a non-profit 501(c) 3 that provides direct treatment services (at 12 locations in Los Angeles and Orange counties) for those whose lives have become unmanageable due to alcohol and other drug use and/or whose mental health issues are interfering with leading productive lives. River Community itself is a unique residential treatment program providing recovery services to individuals with concurrent mental health and chemical dependency problems. The current director of River Community is a LCSW and ACSW. Social Model Recovery Systems ascribes to the principles and practices of social rehabilitation. The social rehabilitation approach is one in which addiction is viewed as being centered in the reciprocal relationship between...

Words: 2880 - Pages: 12

Premium Essay

Audnotes

...________________________________________________________________________ UNIVERSITI TEKNOLOGI MARA TEST 1 ________________________________________________________________________ COURSE : EDP AUDITING COURSE CODE : AUD 370 DATE : FEBRUARY 2013 TIME : 2 HOURS NAME : GROUP : MATRIX NUMBER : SEMESTER : DEC 2012 – APR 2013 INSTRUCTIONS TO CANDIDATES 1. 2. 3. Answer ALL questions. Start each answer on a new page. Do not bring any material into the examination room unless permission is given by the invigilator. DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO This test paper consists of 8 printed pages 2 TEST 1 PART A This part consists of 20 multiple-choice questions. Choose the most suitable answer and shades the corresponding alphabet representing the answer. 1. Among the objectives of an operating system are as follows EXCEPT a. b. c. d. the operating system must protect itself from users the operating system must protect users from each other the operating system must protect users from themselves the operating system must be totally free from errors 2. One of the criteria for accessing the firewall effectiveness is _______________ a. authorization b. flexibility c. supervision d. access control 3. Electronic fund transfer is adopted by EDI trading partners due to implication on ________ a. b. c. d. Audit trails of transactions Cash disbursement and receipts ...

Words: 3159 - Pages: 13

Premium Essay

Rlat2 Full Article

...Plan One way to implement a Disaster Recovery Plan would include two stages toward completion. With a commitment to completing these stages, your operation will be protected from the definite consequences of any disaster that may occur. STAGE I Step One should consist of the signing of a base disaster recovery contract with a vendor that you feel will be able to satisfy your requirements over a long period of time. Remember that a commitment to disaster recovery is not for the short fall, but for the long term protection of your organization. Therefore since your investment both in time and money will be considerable, you must make sure that this investment is made wisely. Any disaster recovery vendor should offer contract terms that will fit your particular needs. A five year term may not be in your best interest therefore your vendor should be able to provide terms that will best serve you and not that vendor. As an example you may require that the initial term be a period of six months with some automatic extension at the end of this period. This will give you the leverage to get out of an unsatisfactory arrangement while at the same time protecting the vendor's investment if the service is as advertised. Possibly the most important aspect of your contract is if the vendors guarantee that you will have access to the facility in case of a disaster. If there is a remote possibility that you would not have access to the disaster recovery facility, then the vendor should be...

Words: 1794 - Pages: 8

Free Essay

Database Recovery and Cloud Services

...Availability Disaster Recovery: Best Practices HOME SUPPORT TECHNOLOGY SUPPORT AVAILABILITY HIGH AVAILABILITY TECHNOLOGY INFORMATION TECHNOLOGY WHITE PAPER Disaster Recovery: Best Practices Downloads Disaster Recovery: Best Practices Contents 1 Executive Summary 2 Disaster Recovery Planning 2.1 Identification and Analysis of Disaster Risks/Threats 2.2 Classification of Risks Based on Relative Weights 2.2.1 External Risks 2.2.2 Facility Risks 2.2.3 Data Systems Risks 2.2.4 Departmental Risks 2.2.5 Desk-Level Risks 2.3 Building the Risk Assessment 2.4 Determining the Effects of Disasters 2.4.1 List of Disaster Affected Entities 2.4.2 Downtime Tolerance Limits 2.4.3 Cost of Downtime 2.4.4 Interdependencies 2.5 Evaluation of Disaster Recovery Mechanisms 2.6 Disaster Recovery Committee 3 Disaster Recovery Phases 3.1 Activation Phase 3.1.1 Notification Procedures 3.1.2 Damage Assessment 3.1.3 Activation Planning 3.2 Execution Phase 3.2.1 Sequence of Recovery Activities 3.2.2 Recovery Procedures 3.3 Reconstitution Phase 4 The Disaster Recovery Plan Document 4.1 Document Contents 4.2 Document Maintenance 5 Reference 1 Executive Summary Disasters are inevitable but mostly unpredictable, and they vary in type and magnitude. The best strategy is to have some kind of disaster recovery plan in place...

Words: 5950 - Pages: 24

Free Essay

Riordan Web Based Plan

...Riordan Manufacturing has asked our firm, LTB and Associates, to develop a web-based plan to be used as a Business-to-Business web site in order to purchase materials from their vendors. We have examined Riordan’s products and business systems, interviewed Riordan’s employees, and have determined the best course of action to implement the plan. Riordan Manufacturing is a plastics manufacturer based in several locations across the world. With three plants based in the continental US, which are located in Albany, Georgia; Pontiac Michigan; and in San Jose, California, which is the company headquarters. A fourth plant is located in Hangzhou, China will not be part of the plan as they purchase materials locally. This where we explain how the database will be set up. Refer to the ERD, Sequence diagram, Use Case diagram, and Class Diagram that followThe following paragraphs will describe the considerations that Riordan Manufacturing will need to make in implementing the database plan. Where ever it is possible to for our firm to do so, LTB and Associates will make a recommendation on the choice to make. In order to implement the database properly, these recommendations should be implemented in order to offer the tightest amount of security that will be possible. Type of Online ProcessingRiordan Manufacturing will need to decide between real-time asynchronous processing and batch processing. Real-time asynchronous processing is applicable when the processing must be performed...

Words: 2477 - Pages: 10