{"id":154,"date":"2015-12-14T03:38:43","date_gmt":"2015-12-14T03:38:43","guid":{"rendered":"http:\/\/it-toolkits.org\/blog\/?p=154"},"modified":"2016-07-11T09:18:35","modified_gmt":"2016-07-11T09:18:35","slug":"disaster-recovery","status":"publish","type":"post","link":"https:\/\/it-toolkits.org\/Blog\/disaster-recovery.html","title":{"rendered":"Disaster Recovery"},"content":{"rendered":"<p style=\"text-align: center;\"><a href=\"https:\/\/it-toolkits.org\/Blog\/wp-content\/uploads\/2015\/12\/IT-Toolkits_DR.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-170\" src=\"https:\/\/it-toolkits.org\/Blog\/wp-content\/uploads\/2015\/12\/IT-Toolkits_DR.jpg\" alt=\"IT-Toolkits_DR\" width=\"960\" height=\"341\" srcset=\"https:\/\/it-toolkits.org\/Blog\/wp-content\/uploads\/2015\/12\/IT-Toolkits_DR.jpg 960w, https:\/\/it-toolkits.org\/Blog\/wp-content\/uploads\/2015\/12\/IT-Toolkits_DR-300x107.jpg 300w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/a><\/p>\n<p id=\"MainContent_leftColumnPlaceHolder_pTakeaway\">Disasters causing data loss can be enough to cause businesses to go under, but proper recovery planning can help a business survive, even in the worst of situations.<\/p>\n<div class=\"article-image-container article-image-small\" style=\"text-align: center;\">\n<div class=\"article-image-img-div\"><img decoding=\"async\" class=\"thumbnail img-responsive aligncenter\" src=\"https:\/\/cdn.techopedia.com\/images\/uploads\/aef58ae1f9bb443eabdba9f39740fbc5.jpg?height=159&amp;width=256&amp;mode=crop\" alt=\"Disaster Recovery 101\" \/><\/div>\n<p><span class=\"article-image-source\">Source: Picsfive \/ Dreamstime.com<\/span><\/p>\n<\/div>\n<div class=\"article-text editorContent\">\n<div>\n<p>In February, the Pacific Northwest experienced some high winds and heavy rains as an &#8220;atmospheric river&#8221; went over the region. Though not nearly as bad as the Columbus Day Storm of 1962, some wind gusts did get into the triple digits in some places, and a few trees managed to crash down near where I live.<\/p>\n<p>The lesson here is that extreme weather and other natural disasters can happen anywhere, even in places that most people think are serene, including the Pacific Northwest.<\/p>\n<p>Computers are delicate devices inside, and are as vulnerable to what nature and people can dish out as other human beings and structures are. Hurricanes, tornadoes, earthquakes, even warfare and terrorism can not only cause death and destruction, but loss of valuable data.<\/p>\n<p>For most \u2014 if not all \u2014 modern businesses, the data <em>is<\/em> their business, and the loss of the former could very well mean the end of the latter.<\/p>\n<p>It is for this reason that businesses should include their IT infrastructure in their disaster planning.<\/p>\n<h2>Plan for the Kind of Disasters That Affect You<\/h2>\n<p>Since there\u2019s no place on Earth that\u2019s immune to every kind of natural or human-made disaster, it\u2019s important for businesses to plan for the kinds of disasters that are most likely to affect your business.<\/p>\n<p>The big one for many companies in the Silicon Valley is earthquakes. The San Francisco Bay Area could also be vulnerable to coastal flooding caused by global warming in the future, as could many other coastal areas.<\/p>\n<p>The West Coast also has a potential for tsunamis caused by earthquakes, even ones far away from California. Tsunami waves from the 2011 Tohoku earthquake in Japan were able to cause some damage on the West Coast.<\/p>\n<p>Knowing the kinds of risks companies face will affect how they design data centers. For example, given the risk of earthquakes and tsunamis, it\u2019s a bad idea to build your data center at the coast below sea level, no matter how good the view is.<\/p>\n<p>The designers of the Fukushima Daiichi nuclear power plant in Japan found this out the hard way after tsunami waves knocked out the backup generators keeping the reactors cool, causing a meltdown.<\/p>\n<p>If your business is located in the South or the Midwest, weather is an obvious concern. Hurricanes are the biggest threat from the East Coast and the Gulf of Mexico, while tornadoes and severe storms are yet another concern. While high winds can damage buildings and equipment, lightning is a bigger killer than tornadoes, both of people and electronic equipment.<\/p>\n<h2>Plan for Key Business Areas<\/h2>\n<p>You won\u2019t be able to protect everything and everyone in a disaster, but if you plan accordingly you\u2019ll still be able to maintain your business if the worst happens. You\u2019ll have to &#8220;triage&#8221; your IT infrastructure. You\u2019ll want to protect the critical parts, such as client lists and important financial records. These are the kinds of things you\u2019ll want to save with\u00a0offsite backups and alternate data centers, for example.<\/p>\n<h2>Make a Risk Assessment<\/h2>\n<p>Along with the planning for key business areas, you\u2019ll have to plan how much risk you have from disasters. Most people in North America, for example, are relatively free from the risk of warfare. In the Middle East, it\u2019s a different story. The end of the Cold War has also made a nuclear war much less likely, though planning for one might be a useful exercise in thinking through the kinds of issues that can affect data centers in an emergency.<\/p>\n<p>For example, the electromagnetic pulse (EMP) of a nuclear weapon exploded high in the air can short out electrical devices, including computers, if they aren\u2019t shielded.<\/p>\n<p>Planning for improbable events can mean that companies are better protected when more routine disasters happen.<\/p>\n<h2>Implement Protective Technologies<\/h2>\n<p>Since disasters can affect IT, how can you plan for them? Since you can\u2019t always protect against them, you can be prepared when they do happen.<\/p>\n<p>The obvious choice is to locate data centers away from problem areas, such as coastal areas, but that\u2019s not always possible. The best disaster planning will always involve keeping good backups and testing them. Even better is having backups stored offsite, hopefully far away from a potential disaster. For example, you might want to store backups in the Midwest, the East Coast or even Europe if you\u2019re based on the West Coast. At the personal level, cloud storage services like Dropbox might serve this purpose.<\/p>\n<p>If you can afford it, having complete data centers in different locations that you can fail over is also a great idea.<\/p>\n<p>Other things include backup generators and UPS for when you lose power and RAID for extra data reliability.<\/p>\n<p>Once you have measures in place, you should periodically test them to make sure they work, for the same reason you have regular fire drills. Try restoring from one of your backups sometime, just to be safe.<\/p>\n<p>You might think of anti-malware software as an annoyance, but it\u2019s a useful disaster mitigation tool, this time against a human-made problem. As and hacking gets more professionalized and used as a weapon of war, you\u2019ll want to protect the integrity of your data.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Disasters causing data loss can be enough to cause businesses to go under, but proper recovery planning can help a<\/p>\n","protected":false},"author":1,"featured_media":170,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-154","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-risk-management"],"_links":{"self":[{"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/posts\/154"}],"collection":[{"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/comments?post=154"}],"version-history":[{"count":0,"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/posts\/154\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/media\/170"}],"wp:attachment":[{"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/media?parent=154"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/categories?post=154"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/it-toolkits.org\/Blog\/wp-json\/wp\/v2\/tags?post=154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}