Your SlideShare is downloading. ×
  • Like
  • Save
Disaster Recovery
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply
Published

IT disaster recovery and contingency planning - Where It's At 2013

IT disaster recovery and contingency planning - Where It's At 2013

Published in Business , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
951
On SlideShare
0
From Embeds
0
Number of Embeds
9

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. DISASTER RECOVERYIT DR CONTINGENCY PLANNING
  • 2. KNOW YOUR CURRENT SET UP?• Is your IT full Documented?• Where is my data?• How long would it take to recreate in an emergency?• Is your back up effective, when was the last time a testrestore was done?• Are all device passwords known, tested? (log on to firewall,router, WAP,NAS, SAN)
  • 3. PREVENTION IS BETTER THAN CURE• Is your network protected?• Complex passwords• Firewall• Malware & AV protection• Are the latest service packs and critical updates installed?• Are you aware of all the entry points into the network?• Are Homeworkers adequately protected (Firewall, AV)• RDP locked down?• Are Smart Phones/Tablets OK (know how CS/Client, Settings recorded, AV/Rules on use)
  • 4. BACK UP ONLY AS EFFECTIVE AS THE LASTRESTORE• In the event of an emergency how much time could you afford to lose? 1 Day, 1 Week, 1 Month?• How often is a full back up taken?• Consider a multi tier solution, offsite for critical data• Business continuity for email, message labs, mime cast, hosted exchange.• Previous versions for flat files• Identify the critical data, separate it out from archive or duplicated data
  • 5. BUSINESS CRITICAL SYSTEMS• What could you not live with out?• Outline the main areas of concern and identify the best way to protect them• Establish levels of priority, what needs to be online first?• Do you have a copy of all the software that would be needed in an emergency?• Software licence keys
  • 6. LEVEL OF DISASTER• Level 1. Building becomes inaccessible through flooding, fire, Structural Damage etc• Actions: Follow full contingency plan and relocate to another office. This location would be decided bya crises meeting of management.• Level 2. Area is inaccessible – i.e. street flooded, terrorist alert. Servers are still running• Actions: Staff to work from another office where capacity, or from home. If needed additional remoteaccess resources to be set up• Level 3. Outage – Power, internet, building facilities• Actions: The other office will provide some resources and an assessment will be made of people’sneeds. If necessary, email traffic can be routed to the alternative site exchange very quickly. Data can beaccess from DR office. Staff work from home if appropriate.
  • 7. OUTLINE OF CONTINGENCY PLAN• Open lines of communication, notify staff, relevant 3rd parties• Establish priority of services to be resumed• DR Site to be identified• What hardware is needed? Who would supply it?• Latest off site back up to be restored• Where would staff work from? DR site or from home?
  • 8. RED BOX CHECKLIST• Operating system disks• An emergency repair boot disk• Any third party drivers (raid controllers, network printers, scanners, etc)• Exchange media• Back up media• Antivirus media• Any firewall media• Any bespoke/individual software installed on the server (peer lock, file way, etc)• Current copy of audit in the red box
  • 9. THE END!•Thank you for your time