Understand the Different Cloud Options for Your Backup and Disaster Recovery Strategy

Effective backup requires more than simply making another copy of a file. You need to track the files you’ve backed up, provide appropriate security, and know how to restore them when needed. If you’re planning to backup files in the cloud, it’s important to know how to use the different options to get the right level of protection.

Cloud Storage

Cloud storage simply provides a remote filesystem for you to use. How you use the available space is up to you; depending on the cloud provider’s capabilities, you may be able to access it as a local filesystem. Unlike local filesystems, the capacity is unlimited, and you pay only for the capacity you use. An additional advantage of cloud storage is that cloud providers usually have several regions, allowing you to store data in a different geographic location.

Cloud Sync

Cloud sync copies folders from your local filesystem to a filesystem in the cloud. This is often used to share files so they can be used from anywhere, making them production data rather than a backup. Depending on the vendor, cloud sync may or may not allow you to access older versions of files. 

Cloud Backup

Cloud backup operates like traditional backup software, but with the cloud rather than a local filesystem as the target. The software operates on a schedule to backup changes to the cloud, with historic versions preserved. Cloud backup can be implemented with backup software running in the cloud or in your local data center. Cloud backup give you more control than cloud sync with respect to when and how data is duplicated. Cloud backup often uses compression and deduplication to reduce the space and cost of the backed-up data; it may also apply encryption for security. 

Cloud Disaster Recovery

It’s important to note that getting data out of the cloud is often more difficult and more expensive than getting data into the cloud. Cloud disaster recovery provides additional support needed to restore files and virtual machine images in case of an outage. Disaster Recovery as a Service (DRaaS) uses high levels of automation to bring systems online in the cloud rapidly.

Understanding the different capabilities between these cloud services is key to implementing an effective backup and disaster recovery strategy in the cloud. CCS Technology Group combines its cloud expertise with our business continuity insight to develop, implement, monitor, and support effective cloud-based backup and disaster recovery solutions. Contact us to learn more about how your backup can leverage the cloud to ensure a smooth backup and disaster recovery process for your business.

Additional Disaster Recovery Resources

Don’t Lose Your Files to Ransomware

5 Changes to Make When You Switch to Disaster Recovery in the Cloud

Backups Are Not A Disaster Recovery Solution

Don’t Lose Your Files to Ransomware

Think about that panicky feeling you get when you lose one file. Now scale that feeling up and imagine the panic after losing all your files. That’s how you’ll feel if a ransomware attack makes it impossible for you to access any of your data.

Ransomware is a kind of malware that holds your data hostage. When you’re attacked by malware, it encrypts all your data. Since you don’t have the key, you aren’t able to read it. Typically you’re asked to make a payment in cryptocurrency in exchange for the key. If you don’t pay up by the deadline, the key is discarded and your data is lost for good.

Ransomware can be difficult and time-consuming to recover from; one town had to rely on typewriters when their computers were down after an incident. If you don’t have typewriters tucked away in a closet, here are some options to help prevent and respond to ransomware incidents.

Prevent Ransomware Attacks

It’s impossible to completely protect yourself from a ransomware attack; like any other malware, they spread through phishing and social engineering methods that trick your employees into opening dangerous attachments. Training employees is important but not foolproof.

Keeping up with your operating system patches is an important measure, as it reduces the number of vulnerabilities for hackers to exploit. You should also use antivirus software and whitelisting software to block malware and prevent unapproved applications from executing.

Ensure you have a reliable backup and disaster recovery process. This won’t prevent you from becoming a ransomware victim but will reduce the panic if you do.

Recover from a Ransomware Attack

The first thing to know about recovering from a ransomware attack is that you should never ever pay the ransom! For one thing, there’s no guarantee that you’ll receive the decryption key. Plus, once you pay ransom, you’ve shown that you’ll pay ransom, and you make yourself a target for additional ransomware attacks with bigger and bigger ransom demands.

Identify the ransomware that attacked you and see whether there’s a decryptor. This will let you recover your locked files without paying the ransom.

If there isn’t a decryptor (and it’s really not that likely you’ll find one for the exact version of the attack that victimized you), you’ll need to do a scan to remove the malware from your system and then restore files from a clean backup. Unfortunately you’ll lose any new files or modifications made between the time the backup was created and the time you were encrypted—good motivation for doing backups at least nightly. You’ll need to make sure the backup isn’t infected with the malware as well, as some ransomware can attack shared drives.

Then protect yourself from future attacks by hardening your cybersecurity strategy and making sure your backups aren’t vulnerable, perhaps by storing them in the cloud. CCS Technology Group information security services help you develop and implement an approach that protects you against ransomware and the many other common malware threats that target your systems. Contact us to learn more.

5 Changes to Make When You Switch to Disaster Recovery in the Cloud

Disaster recovery (DR) is one of the most important uses of cloud. For companies that are just making the switch to cloud computing, it’s a good first step. Since you don’t execute your disaster recovery plan every day, DR in the cloud lets you get familiar with the cloud without disrupting routine operations or putting critical production applications at risk.

It’s important to recognize that cloud DR doesn’t mean migrating your existing DR process to the cloud. You’ll want to rethink your strategy and make changes to optimize your new disaster recovery process. Here are some of the changes to make.

1. Change Your Recovery Time Objective

The goal of disaster recovery is to get applications back online as rapidly as possible with minimal data loss. There isn’t one number that applies to all workloads, as less important applications can tolerate longer outages. Whatever your existing recovery time objectives (RTOs) are, you should revisit them if you plan a switch to DR in the cloud. Depending on how you set up your cloud DR, recovery times can be dramatically reduced, particularly if you keep redundant virtual machines (VMs) in the cloud online and ready to go.

2. Change Your Backup Procedures

Recovery in the cloud necessarily requires backing up to the cloud. Your existing backup tools may be able to integrate with your cloud provider, or the cloud provider may offer tools to support backup as a service.

3. Change Your Recovery Procedures

Recovery procedures typically require restoring the latest data from tape to servers. If you’ve set your cloud DR up to be online, your servers will already be up and running with the latest replicated data. If not, your recovery process will need to define how to activate and load data on your cloud VMs. If you use Disaster Recovery as a Service, the recovery process will largely be automated but you’ll need to spend time beforehand to make sure the configurations are complete and capture all startup dependencies.

4. Change Your Disaster Recovery Spending

Disaster recovery expenses in the data center are largely hardware-related, with duplicate servers and storage purchased and set aside for DR purposes; you may also need duplicate software licenses. In the cloud, your DR spending becomes a monthly fee based on the amount of storage and how many virtual machines you use. There may also be a fee for transferring data into the cloud; there will almost certainly be a fee for transferring data out of the cloud, which you’ll need to do to resume your on-site operations after the disaster is resolved.

5. Change Your Disaster Recovery Testing

Many companies fail to test their traditional disaster recovery procedures because testing is time consuming and can be risky for the production environment. With cloud-based disaster recovery, the risks to production are greatly reduced. Tests can be done more easily, often during normal business hours, and so companies can have reassurance that their disaster recovery process will really work when they need it.

Start Changing Your Disaster Recovery Process to Cloud

How do you change from a data center-based DR process to DR in the cloud? As with every cloud project, start with planning. You’ll need to work through a variety of issues, including how data will get from premises to the cloud. Because of the criticality of disaster recovery, it’s helpful to work with a partner with experience in both cloud technology and disaster recovery. CCS Technology Group’s business continuity services will help you respond to any type of disaster. Contact us to learn more.

Additional Disaster Recovery Resources

Backups Are Not A Disaster Recovery Solution

7 Common Mistakes That Place Your Data in Danger

Why a business continuity plan is essential

Get the Basics Right With Better Patch Management

Success in any organization begins with mastering the fundamentals. In information technology, one of the most fundamental practices is patch management. Software and firmware need periodic updates to address security vulnerabilities and other issues.

Whether they’re released on a schedule or released urgently in response to a critical vulnerability, protecting systems, data, users, and customers requires applying patches in a timely manner to all affected systems. Far too many businesses fail at this basic process.

Patch Installation Isn’t As Simple As It Sounds

Although it sounds like it should be straightforward—receive patch, apply patch—the reality is that patching is complex. There are several reasons for this:

There’s a wide variety of systems to be patched. Patches come from everywhere. Today’s organizations have multiple operating systems, multiple hypervisors, and multiple versions of the software products they own. Keeping track of all of those systems and their patch levels is difficult. In addition, companies now have to think about how to manage patches on the mobile systems their employees use.

Patches need to be tested. No matter how important the vendor says the patch is, companies can’t simply apply it to their systems. All patches need to be tested to make sure they don’t unintentionally break a critical application. Plus, even tested patches can fail when they’re installed on production servers, and businesses need to document how they’ll back out and recover if something goes wrong.

Applying patches takes time. First, unless the process is automated, applying patches to all systems can take a lot of an operations team’s workday. Maybe more important, applying patches generally causes system downtime. That impacts business operations, and with today’s 24×7 business hours, it can be hard to find an appropriate time to perform the installation.

Not all patches are equally important. If it’s difficult to get all patches installed, the situation might not be so bad if businesses were able to get the critical patches installed. But it’s hard for companies to keep track of vulnerabilities and effectively evaluate and prioritize the importance of the many patches they receive.

Get On Top of Patches With Managed Services

One of the best ways to get on top of patches is to use IT managed services. A managed services provider is experienced at overseeing the routine maintenance of all your technology resources, including tracking and applying patches. Through their broad experience with technology, managed services providers are able to evaluate patch priority and ensure the critical items are handled rapidly. They can implement technology to make the patching process easier, using tools to scan systems to identify vulnerabilities and automation to ensure the issues are addressed.

How are you keeping up with patches? Contact CCS Technology Group if you’ve fallen behind and would like to implement a process to catch you up and keep you current with critical systems patches.

Backups Are Not A Disaster Recovery Solution

Backups are an important part of your disaster recovery strategy, but they aren’t the complete solution by any means.

Backup vs. Disaster Recovery

Backups are simply copies of data intended to restore an old version of a file. This may be in order to bring an application back online after a failure, or to use historical data for analytics or a legal inquiry.

A disaster recovery solution extends beyond the replacement of old files to loss of complete infrastructure. The solution needs to ensure you can recover all of your lost systems within a reasonable time period and with limited data loss, even if you have no access to your data center and all your servers are unavailable. Disaster recovery typically requires a second location that duplicates your production environment, either in a different physical location or in the cloud. Disaster Recovery as a Service (DRaaS) offers a third way of implementing a recovery environment.

Backup copies are usually stored onsite to ensure they can be accessed rapidly. Copies earmarked for disaster recovery purposes need to be stored offsite to ensure they can be accessed when your site is unavailable.

Planning for Backup vs. Planning for Disaster Recovery

Backups can be planned and implemented relatively straightforwardly. All you need is to make sure all systems are backed up and that the process is monitored to make sure it completes successfully. This can usually be automated, with any failures triggering an alert to IT support.

Disaster recovery requires a much more comprehensive planning process. While you need backups of all your systems, having those available isn’t enough to ensure effective recovery. You need to identify your mission critical systems and prioritize restoring them, first. You’ll want to identify recovery time objectives (how fast you need to be able to bring the system back) and recovery point objectives (how much data you can afford to lose) when developing your plan. These objectives will help you decide what kind of backup or disaster recovery technology will work for your business.

Any complex procedures for bringing systems back on line and ensuring the restored data is consistent should be fully documented. Because these recovery procedures can be complicated, the process should be tested at least once per year to ensure that no steps—or even applications—have been overlooked.

Backups and Disaster Recovery Are Always Needed

You need a backup and disaster recovery strategy even if your infrastructure resides in the cloud. Cloud providers do backup files, but their retention strategy (how long old data is preserved) may not meet your requirements. In addition, while the cloud generally provides high availability, there have been cloud outages that impacted cloud customers.

Create A Backup and Disaster Recovery Strategy

Creating a backup and disaster recovery strategy starts with understanding your systems. CCS Technology Group works with our clients to create disaster recovery plans that allow your business to survive an outage no matter how big or small. Contact us to learn more about making sure backups are just one part of your disaster recovery strategy.

Additional Disaster Recovery Resources

The top 5 reasons to prepare your business continuity plan

Why a business continuity plan is essential

5 disaster recovery tips from aboard the Battlestar Galactica

Why a business continuity plan is essential

What can an ostrich teach you about business continuity? As it turns out, a lot.

In their book, “The Ostrich Paradox: Why We Underprepare for Disasters,” authors Howard Kunreuther and Robert Meyer make the case that ostriches get a bum rap. The classic image of the big bird with his head in the sand gives the impression that ostriches deal with risk by ignoring it.

In reality, ostriches do a pretty good job of mitigating risk. They can’t fly, but they can run at amazing speeds. They can also kick hard enough to kill a lion.

The trick to disaster preparation is to approach it like an ostrich. Know where you’re susceptible to loss and counter those potential weaknesses with a solid plan.

Heads in the Sand

Three out of four small businesses have no disaster recovery plan at all. Unpleasant though it is, think about that for a moment.

There are innumerable things that can go wrong. Natural disasters are both unpredictable and potentially catastrophic. Fire can raze a building to the ground. Viruses can bring networks to their knees. A data breach can expose your entire system.

Disaster comes in all shapes and forms. No business is immune, regardless of size, legacy or location. And a lack of preparation can be devastating.

The High Cost of Downtime

Of the organizations without a business continuity plan, 90% permanently close their doors within one year of a disaster.

The real killer here is downtime. Consider what it would cost if your business grinds to a halt. Just one day of downtime could leave you reeling for weeks, throwing off profitability and productivity for the entire organization. By one estimate, downtime costs small businesses up to $8,600 per hour.

Unfortunately, that’s just one aspect of the cost. Downtime also impacts employee satisfaction, which in turn impacts productivity. And then there’s your reputation to consider. How will your customers feel about you if given the impression that you aren’t reliable?

Business Continuity in Action

By contrast, organizations with robust business continuity plans stand out when others struggle. That’s because a business continuity plan allows you to bounce back, whatever the nature of the disaster. It’s a failsafe you hope you never have to use, but one that can literally save your business.

There are three advantages that come with a business continuity plan.

First, you’re protected against the losses associated with downtime. For example, employees can log in remotely, able to work even if your office isn’t accessible. Automated tasks continue to perform. Your customers aren’t left in a lurch, suddenly without your services. Instead, you’re able to continue doing business, even in the midst of a genuine crisis.

Second, your data is safe. Any solid business continuity plan will include some form of backup and recovery option. That means even if every hard drive in your office simultaneously stops working, you don’t lose a single spreadsheet.

Finally, you get the intangible (but powerful) benefit of peace of mind. You won’t have to worry about worst case scenarios. Rather, you’ll know that even if disaster hits, you’re ready for it.

Creating Your Business Continuity Plan

Developing the kind of business continuity plan that provides real protection takes some know-how. This isn’t one of those times a do-it-yourself approach will suffice. You want someone with serious credentials to walk you through the process, ensuring every base is covered.

CCS Technology knows disaster recovery. We’ll take the time to understand how your business functions. From there, we’ll put together a plan that takes into account every kind of contingency. Should the unthinkable happen, you’ll be in the best possible position: prepared.

Maybe it’s time to put together a business continuity plan for your organization. If so, we’re here to help.

 

Why a business continuity plan is essential

What can an ostrich teach you about business continuity? As it turns out, a lot.

In their book, “The Ostrich Paradox: Why We Underprepare for Disasters,” authors Howard Kunreuther and Robert Meyer make the case that ostriches get a bum rap. The classic image of the big bird with his head in the sand gives the impression that ostriches deal with risk by ignoring it.

In reality, ostriches do a pretty good job of mitigating risk. They can’t fly, but they can run at amazing speeds. They can also kick hard enough to kill a lion.

The trick to disaster preparation is to approach it like an ostrich. Know where you’re susceptible to loss and counter those potential weaknesses with a solid plan.

Heads in the Sand

Three out of four small businesses have no disaster recovery plan at all. Unpleasant though it is, think about that for a moment.

There are innumerable things that can go wrong. Natural disasters are both unpredictable and potentially catastrophic. Fire can raze a building to the ground. Viruses can bring networks to their knees. A data breach can expose your entire system.

Disaster comes in all shapes and forms. No business is immune, regardless of size, legacy or location. And a lack of preparation can be devastating.

The High Cost of Downtime

Of the organizations without a business continuity plan, 90% permanently close their doors within one year of a disaster.

— Small Business Trends

The real killer here is downtime. Consider what it would cost if your business grinds to a halt. Just one day of downtime could leave you reeling for weeks, throwing off profitability and productivity for the entire organization. By one estimate, downtime costs small businesses up to $8,600 per hour.

— Aberdeen Essentials

Unfortunately, that’s just one aspect of the cost. Downtime also impacts employee satisfaction, which in turn impacts productivity. And then there’s your reputation to consider. How will your customers feel about you if given the impression that you aren’t reliable?

Business Continuity in Action

By contrast, organizations with robust business continuity plans stand out when others struggle. That’s because a business continuity plan allows you to bounce back, whatever the nature of the disaster. It’s a failsafe you hope you never have to use, but one that can literally save your business.

There are three advantages that come with a business continuity plan.

First, you’re protected against the losses associated with downtime. For example, employees can log in remotely, able to work even if your office isn’t accessible. Automated tasks continue to perform. Your customers aren’t left in a lurch, suddenly without your services. Instead, you’re able to continue doing business, even in the midst of a genuine crisis.

Second, your data is safe. Any solid business continuity plan will include some form of backup and recovery option. That means even if every hard drive in your office simultaneously stops working, you don’t lose a single spreadsheet.

Finally, you get the intangible (but powerful) benefit of peace of mind. You won’t have to worry about worst case scenarios. Rather, you’ll know that even if disaster hits, you’re ready for it.

Creating Your Business Continuity Plan

Developing the kind of business continuity plan that provides real protection takes some know-how. This isn’t one of those times a do-it-yourself approach will suffice. You want someone with serious credentials to walk you through the process, ensuring every base is covered.

CCS Technology knows disaster recovery. We’ll take the time to understand how your business functions. From there, we’ll put together a plan that takes into account every kind of contingency. Should the unthinkable happen, you’ll be in the best possible position: prepared.

Maybe it’s time to put together a business continuity plan for your organization. If so, we’re here to help.

 

5 disaster recovery tips from aboard the Battlestar Galactica

In the year 2003, SCI FI Channel (now Syfy) aired a successful mini-series remake of the 1978 series, Battlestar Galactica, which launched the 2004 Battlestar Galactica series. In the plot of the mini-series, we have perhaps the most potent argument for a disaster recovery plan of any single piece of entertainment media.

A quick refresher: The beginning of Battlestar Galactica (2003) sees humanity at the height of culture and on the cusp of a digital revolution. The Twelve Colonies are comfortable and they are progressing. To top it off, humans have enjoyed a 40-year armistice with their sworn enemy, the Cylons.

The Cylons are a cybernetic race of soldiers and workers who had rebelled against humanity during a 12-year war and then disappeared into space.

During the mini-series, the Cylons return to rain down unholy hell on the Twelve Colonies, effectively destroying most of humanity via nuclear assault and…cyber warfare.

Meanwhile, Captain William Adama prepares to decommission his storied ship, the battlestar Galactica, which will soon be transformed into a museum.

So what does Battlestar Galactica have to do with your business network? Everything. The Cylons are able to destroy the Twelve Colonies by exploiting the exact same weaknesses that hackers use to destroy businesses every day.

Let’s take a look at what the Cylons did, and how Captain William Adama of the Battlestar Galactica is able to rescue humanity with the help of a disaster recovery plan.

The Nefarious Plan of Cylons and Cyber Attacks

In order to destroy the Twelve Colonies, the Cylons attack on two fronts. First, they make a physical attack with calculated nuclear strikes. Second, they carry out a catastrophic malware attack which renders nearly the entire military of the Twelve Colonies useless.

The Cylons carry out their cyber attack by seducing a human (literally, with a sexy spy model indistinguishable from humans) and using his credentials to access the military network. Then, they upload malware to the network that shuts down most of the battlestars, smaller ships, and other military units, and even drives them to attack and destroy one another.

The digital warfare perpetrated by the Cylons is nothing short of brilliant, and it is cataclysmic to the human race. In a short time, most of the human race is destroyed.

Cyber attacks on your business work the same way. For instance, malware will attack your network by either recognizing weaknesses in your digital infrastructure or by hiding in attached documents. With a few catchy subject lines, hackers are able to “seduce” your own employees into downloading dangerous material.

Even as vicious cyber attacks have become commonplace, end user education still falls behind the techniques of cyber criminals. Human error and insider threats remain a particular weak spot in the world of cybersecurity.

In one report that compiled 20 years of data, ITIC found that human error is the cause of 70% of data center incidents.

Whether it’s a sudden influx of downtime costing $100,000 per hour, or a major data loss incident racking up more than $18,000 for only 100 records, the financial losses can be as devastating as a Cylon attack. In fact, that type of loss can be outright fatal after experiencing a significant data loss incident.

So how did Battlestar Galactica continue for 75 episodes after the Cylons wiped out most of humanity?

Battlestar Galactica, Humanity’s Backup Plan

Commander William Adama was a man of extreme practicality, which some might say bordered on paranoia. As commander of the Battlestar Galactica, he insisted that the ship remain disconnected from the military network and prohibited any upgrades to digital interfaces. While the rest of the world became increasingly more connected, the Galactica was completely self-sufficient.

Adama’s disdain for the digital was more than an inability to adapt to evolving times – he in fact had his reasons. Adama knew that the Cylons had every tactical and strategic advantage in a digital world. They were created to out-process and out-think humans. He specifically kept his ship offline because he wanted to be able to maintain command if the central network was compromised. Boy, was he right on the money.

At the time of the Cylon’s attack on the Twelve Colonies, the battlestar Galactica was hosting an eclectic mix of military personnel and civilians to cover the ship’s decommissioning. Those aboard the ship went on to consist of most of humanity’s survivors.

For most of the remainder of the show, Adama must outthink the Cylons, flee their ranks, and ascertain the identities of the near-human Cylons that seek to infiltrate his ranks.

It is estimated that around 50,000 people lived aboard the ship at the beginning of Adama’s command of the survivors. By maintaining a command that was isolated from the main network, Adama is able to preserve humanity.

Backup and disaster recovery is an essential element of maintaining the longevity of your business. Just as Adama’s analog ship is able to maintain humanity, you should always back up your network in different places, both on your network and off your network.

In addition to Adama’s triumph for humanity’s future existence, the command structures are able to create a new government to guide the survivors beyond Adama’s military lead.

You should also have a disaster recovery plan, including a chain of command that ensures immediate response and establishes near-term operations and communication.

If you’re making a checklist, add a few of these things that we’ve learned from Battlestar Galactica:

  1. Back up your data
  2. Implement cybersecurity solutions
  3. Prepare and execute a Disaster Recovery Plan
  4. Don’t trust strange emails and attachments
  5. Trust the professionals

“So say we all.”

There are many other ways that Battlestar Galactica shows us what to do in the event of a disaster. We’d love to talk to you about them when you call us or send us a message.

You can also couple this article with our recent Star Wars Weapons Can Help You Find the Best Backup and Restore Plan for Your Business and The Top 5 Reasons to Prepare Your Business Continuity Plan.

Star Wars weapons can help you find the best backup and restore plan for your business

You can create the best cybersecurity, cloud, and help desk solutions, but in the event that a disaster strikes your business, none of that will matter if you are not operational. Estimates of the cost of downtime range from $8,600 for small businesses to $100,000 for larger businesses. To avoid these astronomical costs, many businesses turn to an alternate site to backup and restore business operations.

Smooth operation of your business depends on a consistently reliable physical location for your employees and your equipment. To understand the three primary forms of backup sites – cold, hot, and warm – we’re going to examine three of the famous weapons from The Star Wars Saga.

Wondering what weapons have to do with a backup site? Allow me to explain.

Here’s the scenario:

You are a young Jedi Padawan during the Clone Wars. Your name is (First Name=take your real first name and add a hyphen somewhere at random, Last Name=the first syllable in your mom’s maiden name), and you have been on the trail of bounty hunter Cyb Rattack on the planet Datalos. Unfortunately, you have lost your lightsaber. What’s a Jedi to do?

The Blaster: the Cold Site Weapon

If you’re going to have any chance of stopping your enemy, you’re going to need a new weapon. If you’re limited on funds, you’ll probably want to opt for a good old-fashioned blaster.

A blaster is nothing like the graceful lightsaber, but at the very bare minimum it will get the job done. With a few extra credits and some elbow grease, it can easily be modified to meet your specific needs.

This is the same concept as a cold recovery site. If your office is hit with a disaster, you can choose a cold site to get back to business, but this is definitely the bare bones approach.

A cold site will most likely have only space, power, and utilities. You’re starting from scratch here. A cold site, like a blaster, is perfect for those who need something affordable that will do the trick – albeit sans all bells, whistles.

The Lightsaber: the Hot Site Weapon

When Anakin Skywalker loses a lightsaber, he doesn’t settle for a blaster pistol, he immediately finds or procures a brand new lightsaber. In fact, most young Jedi have to construct their own lightsabers as a ritualistic rite of passage.

The Lightsaber is not a cheap weapon. The construction of this beautiful laser sword requires a lot of effort, and even on the open market, it will cost quite a bit. If you have the credits and the time, it is the number-one best option for your next weapon. The same goes for a hot recovery site.

When you opt for a hot recovery site, you are getting all of the top-notch recovery services available. Your recovery site will be specifically designed to mirror the infrastructure of your original business, allowing for a seamless transition and eliminating expensive downtime.

The hot site will already have all of your data transferred, and will require no time delay in resuming network functions.

The hot recovery site, while the most costly of options, is the closest you will get to operating out of your original business location. This may not be a viable option for all businesses, but it is definitely the premium option, and best when seamless restoration is a necessity.

The Vibrosword: the Warm Site Weapon

If you’ve seen the newest Star Wars movie, The Last Jedi, you’ve seen the red-clad Praetorian Guard fight a wicked battle using vibroswords. These weapons, which utilize an electrically charged blade, are the only swords that can stand up against a lightsaber.

If you happen to have a decent amount of credits, but not enough for the real thing, you could purchase a vibrosword. This weapon is capable of superior movement, though it will involve less grace than a lightsaber and more of the chaos of nature. It is a perfect hybrid of the minimalism of a blaster and the power of a lightsaber.

You were most comfortable with a lightsaber, and it will take some effort getting to know your new weapon.

A warm recovery site is very similar. With this option, you’ll find an internet connection and available servers for network transfer, but there will be a brief delay while you move over network functions. Where the cold site was basically an empty room, the warm site will often include workspaces for key staff who may be displaced.

The warm recovery site won’t break the bank and you’ll end up getting more functionality, response and productivity with your space.

Use the Force

Unfortunately, backup and data recovery is something 3 of 4 businesses aren’t planning for.

Becoming familiar with the available weapons in your backup recovery arsenal will help you choose the best option for your business when the time comes.

Please give us a call or send us a message and we’ll share some more information about how a backup site would work for your business.

You’re also invited to check out our recent whitepaper on the best business continuity plans. We’re happy to help, no strings attached.

The top 5 reasons to prepare your business continuity plan

The last thing you want is to go out of business in the event of an unforeseen circumstance. A business continuity plan is essential for modern businesses in any industry. Regardless of what kind of technology you use, think of this plan as a blueprint for keeping your business running in the event of a major disaster.

Disasters come in many forms, including natural disasters, human error, cyber attacks, and insider threats. The worst disasters always have the same effect: stopping your business dead in its tracks.

Sometimes, it’s hard to really conceptualize the importance of a continuity plan without looking at what happens if you don’t have one.

Take, for instance, the Great Chicago Fire of 1871. Urban legend has it that the conflagration started when Mrs. O’Leary’s cow kicked over a lantern in the family barn. The fire’s origin is debatable. The aftermath, however, is well documented and devastating by any standards.

The Great Chicago fire completely destroyed 3.2 miles in the heart of Chicago, rapidly consuming homes and businesses. The inferno resulted in the death of 300 citizens, the destruction of 17,500 buildings, Of the 300,000 residents of Chicago, 100,000 were left homeless.

The 185 firefighters employed within Chicago were ill-equipped to handle the ferocious spread of the fire, which was attributed to a drought as well as the mostly wooden construction of the city’s buildings, roads, and sidewalks.The total cost of the fire was estimated at $222 million, or roughly $4.6 billion today.

When a disaster this large happens, the only way for a business to survive is to have an understanding of what needs to be protected, how you want to respond, and which practices to follow to continue operations. Here are the 5 most important things to focus on when putting together a continuity plan.

1. Minimizing Downtime

The primary reason for a business continuity plan is to eliminate downtime. 75% of businesses don’t have any sort of business continuity plan or disaster recovery plan. Skipping out on a continuity plan is not only reckless, but extremely expensive.

ITIC’s latest survey data finds that 98% of organizations say a single hour of downtime costs over $100,000.Those aren’t numbers to be ignored. Whether you suffer a natural disaster or a cyber attack, the only way to stay in business is to continue your work as soon as possible. Otherwise, you may very well go out of business.

2. Protecting What’s Important

A business continuity plan should detail the necessary components and data that will keep your business running. This involves inventory of backup devices and cloud services, as well as an outline of your data backup specifics (when and where) and an overview of how company assets will be handled when disaster strikes.

3. Communicating with Confidence

One of the primary benefits of creating a business continuity plan is to establish a state of order amid the chaos. Your plan should focus on a chain-of-command delegation of responsibility, and should include reliable communication channels prioritized for contacting employees, partners and customers to minimize breakdowns in collaboration and service.

4. Resuming Operations

The goal of any business continuity plan is to get you back in business as soon as possible. Many companies have taken the extra precaution of utilizing backup and recovery sites. These are off-campus facilities where your business can be relocated to continue operations regardless of any damage or limited access you may experience.

These sites run the gamut from “cold sites”, which are bare-boned facilities without any installed operations, to “hot sites”, which are exact duplicates of your current operations.

5. Ensuring Your Recovery

A recent report finds that 60% of small businesses close within 6 months of a significant cyber attack. But this doesn’t have to be you. Implementing a business continuity plan to your current backup and data recovery solutions will allow you the peace of mind that even if disaster strikes, you don’t have to become a statistic.

We Are Here to Help

CCS Technology Group would be happy to help your business create a specific business continuity plan. We have proven experience developing solutions that will keep you in business no matter what outside forces may arrive.

It’s important to plan ahead. It might just save your business.

Give us a call or send us a message to learn more.