Monday, August 26, 2019
How to Assure Information Continuity and Recovery in Business Coursework
How to Assure Information Continuity and Recovery in Business Continuity Planning and Disaster Recovery - Coursework Example While numerous weaknesses may be diminished or even eradicated through technical, management, or operational resolutions as part of the stateââ¬â¢s general risk managing effort, it is practically impossible to entirely eradicate all risks. In numerous cases, critical assets may be located outside the organizationââ¬â¢s control ââ¬â for instance telecommunications or electric power ââ¬â and the organization may be incapable of ensuring their accessibility. Therefore effective disaster recovery planning, implementation, and analysis are indispensible to diminish the risk of service and system unavailability. The production environment of an organization persistently evolves. Whether that is a result of software or hardware updates, the addition or removal of systems, or changes in configuration; the variance from the recovery answer grows broader with each change, increasing the chance of the failure of the solution. The maintenance of the technology recovery solution - both plans and recovery configurations - should be kept in lock-step with the production environment. One only has to look at the quantity of preparation, documentation updates and contract upgrades that occur in support of an exercise to see thereââ¬â¢s a significant divergence which can occur over a fairly short period of time. All these factors can negatively impact recovery results. As much effort as is put into plan development, itââ¬â¢s surprising how many companies do not have sufficient detail in their recovery procedures that will support the recovery of their key technologies. Even companies that test often abandon their plans and instead rely on the knowledge of their people, or use their plans but never add the detail they need. This may be worse than not testing at all, since it creates the perception the plan will support a recovery; however if the primary team isnââ¬â¢t available during the incident, recovery can be challenging without access
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.