1.) Companies that aren’t able to to resume operations within ten days after a catastrophic event are not likely to survive. (Strategic Research Institute)
2.) 60% of companies that lose their data will shut down within 6 months of the disaster.
3.) 93% of businesses that lost their data center for 10 days or more due to a catastrophic event filed for bankruptcy within one year of the disaster. 50% of companies that found themselves without data management for this same time period filed for bankruptcy immediately. (Source: National Archives & Records Administration in Washington)
4.) Hardware or system failure accounts for 78% of all data loss
Human error accounts for 11% of all data loss
Software corruption accounts for 7% of all data loss
Natural disasters account for only 1% of all data loss.
Disaster Recovery Plan (Wikipedia, February 2014):
“The process, policies and procedures that are related to preparing for recovery or continuation of technology infrastructure which are vital to an organization after a natural or human-induced disaster. Disaster Recovery focuses on the IT or technology systems that support business functions, as opposed to business continuity, which involves planning for keeping all aspects of a business functioning in the midst of disruptive events.”
(Source: Wikipedia, February 2014)
A Disaster Recovery Plan describes the methods and procedures for restoring services to full operation after a catastrophic interruption. Recovery strategies for IT systems cover hardware such as servers, workstations, laptops, networks (LAN, WLAN, WAN), software, services and data.
The sequence of recovering services has to correspond to the priorities of time sensitive business functions and processes. A Business Impact Analysis helps to identify the priorities.
Important Elements of a Disaster Recovery Plan
1.) Data Backup and Recovery: what data are being backed up on a regularly schedule
Fallback Procedures: in case a recovery process fails
2.) Replacements: available hardware to replace defective equipment
3.) Procedures: step by step instructions to avoid improvisation
4.) People: who’s doing what
Contact List (Management, IT Staff, external consultants, vendors, e.g.)