Disaster Recovery & Corporate Survival Strategies: by Louise Broby

By Louise Broby

The terrorist assault at the global exchange Centre brought on the main huge destruction ever of desktops, throwing the significance of potent back-up and garage platforms into the limelight as being necessary to company survival. This briefing addresses the technical and company facets of putting in back-up platforms which are designed to cater not just for terrorist assaults, but additionally acts of God and different risks. It examines catastrophe restoration plans and what's taken with fitting and imposing them. It info the newest applied sciences, resembling fibre channel garage zone networks (SANs), and reports the newest high-performance back-up tapes, in addition to extra conventional items. For key industries reminiscent of monetary companies, having info effectively again up in secure distant destinations in case of terrorist or different assaults can make the adaptation among survival and extinction.

Show description

Read or Download Disaster Recovery & Corporate Survival Strategies: Pre-Emptive Procedures & Countermeasures (Executive Briefings) PDF

Similar physical education and sport books

Review of Developments in Transport in Asia and the Pacific 2005

The evaluate, a biennial e-book, is established into 3 major elements. half I describes the surroundings during which the shipping area is constructing and the significant demanding situations that this setting poses to governments, the delivery and society at huge. half II specializes in tracing the numerous improvement of roads, railways, delivery, ports, inland waterways and air delivery industries and infrastructure within the zone.

Additional resources for Disaster Recovery & Corporate Survival Strategies: Pre-Emptive Procedures & Countermeasures (Executive Briefings)

Sample text

The most serious breaches were caused by viruses (33 per cent of respondents). Fig. 3 What proportion of UK businesses have suffered security incidents in the last 12 months? g. use of e-mail or web browsing to access or distribute inappropriate material) 11% 8% 14% Unauthorized access (including hacking attacks on Websites) 4% 6% Theft 6% 44% Any of the above 24% 0 10 ISBS 2002 20 30 ISBS 2000 Source: DTI, Information Security Breaches Survey, 2002 30 40 50 60 70 80 90 100 Information security Security policy In the 2000 survey only 14 per cent of respondents had a specific information security policy, but of those that had, 54 per cent had a formal document and 38 per cent made new staff aware of the policy on joining.

Are they technical or economic in nature, are they people related? Are they external or internal to the organization? 1. These relate not only to risks against IT systems but also to risks to the organization as a whole. The BCM process is therefore not only aimed at IT systems failure but takes in threats in all its forms, which should be guarded against to ensure corporate survival.

Mobile recovery services For those who are not ready for the moment disaster strikes, mobile recovery services are available in various forms. If, for instance, restoration to normal business operations involves local access to systems but with no suitable accommodation, a mobile recovery unit may be the solution. Such a unit is a complete data centre and end-user recovery service, which provides not only physical space but the entire infrastructure required to restore critical business functions.

Download PDF sample

Rated 4.24 of 5 – based on 7 votes