As di­git­isa­tion spreads its way through virtually every business sector, IT emer­gen­cies have become all the more dis­astrous for the parties they afflict. Defective or com­prom­ised equipment can paralyse day-to-day op­er­a­tions and needs to be corrected as quickly as possible. In order to avoid sub­stan­tial losses of time, money, and data, every company needs a game plan for getting things back in working order. An IT disaster recovery plan offers a blueprint for crucial situ­ations by laying out different ap­proaches to solving problems and ap­pro­pri­ately del­eg­at­ing ac­count­ab­il­ity.

Emergency man­age­ment processes

In technical jargon, general emergency man­age­ment is char­ac­ter­ised as business con­tinu­ity man­age­ment; processes essential to a business’ op­er­a­tions need to be kept running, even during abnormal situ­ations. These processes can be broken down into three different groups:

  • Emergency planning: emergency planning includes all pre­vent­at­ive measures that aim to prevent a crisis situation from occurring e.g. by in­creas­ing re­li­ab­il­ity or designing a more robust system.
  • Emergency response: this is all about op­tim­ising the quickest reaction possible for a crisis situation. It involves re­act­iv­at­ing all system processes that are essential for daily business op­er­a­tions. Con­tin­gency planning and crisis man­age­ment tools con­sti­tute further aspects of this group.
  • Tests and drills: good emergency planning should also include regular practice tests and drills. The goal of this is to con­tinu­ally improve the emergency man­age­ment process and identify potential points of weakness.

IT in­fra­struc­ture: integral to every business

The business world has long since been in a state of in­creas­ing di­git­al­isa­tion. Many fun­da­ment­al aspects of the economy, as well as a large number of different business models, have been out­sourced and/or exported to internet-based en­ter­prises: from ap­plic­a­tion man­age­ment services (e-re­cruit­ment) to logistic centres (e-logistic), the list of in­dus­tries operating in one online form or another is as long as it is diverse. This is why it’s so important for busi­nesses to be able to rely on their IT in­fra­struc­ture. Failure of just one IT component demon­strates the sig­ni­fic­ance of having a sound set-up, as this can bring an entire system down and lead to con­sid­er­able financial losses. Preparing for such worst-case scenarios with a thorough IT disaster recovery plan can help reduce the severity of such instances.

How do IT disasters occur?

A partial or complete IT system failure can be the product of various situ­ations: from physical cir­cum­stances, like power outages or water damage, to external tampering by cyber criminals, there are many possible causes of IT problems. Here’s a list of some of the most common causes:

  • Power outages
  • Water damage
  • Hardware and software errors
  • User errors
  • Cyber attacks

IT doc­u­ment­a­tion: an essential basis

Doc­u­ment­ing all IT resources makes up the basis of each step of an IT disaster recovery plan. That’s why it’s important that all doc­u­ment­a­tion is carried out as neatly and thor­oughly as possible and is always kept up to date. Technical and contact data, user lists, and a clear al­loc­a­tion of re­spons­ib­il­ity for important tasks all play an essential role in IT disaster man­age­ment.

An IT disaster recovery plan contains, for example, in­form­a­tion on: 

  • Hardware and peri­pher­al devices, like printers
  • Software ap­plic­a­tions
  • IP addresses
  • VPN and server access
  • E-mail/data exchange

In order to reach the right contact in an emergency, you should include all important contact in­form­a­tion in the doc­u­ment­a­tion. This in­form­a­tion includes:

  • User lists
  • Contact person and person re­spons­ible for each in­di­vidu­al de­part­ment
  • Contact person for external providers
  • Contract in­form­a­tion for the internet or hosting service provider

The IT disaster recovery plan

IT disaster recovery plans are the product of seam­lessly in­teg­rat­ing disaster recovery personnel into the overall day-to-day business op­er­a­tions of the company. At its essence, an IT recovery plan is part of a company’s general security scheme and typically follows existing guidelines. Here’s an IT recovery plan checklist of some items that should def­in­itely be included:

  • Defin­i­tion (‘What’s a disaster?’)
  • Personnel lists with contact data (see above)
  • Alarms and com­mu­nic­a­tion systems
  • Emergency flow chart
  • Ter­min­a­tion measures and doc­u­ment­ing the emergency
  • Emergency supplies
  • System recovery 

Emergency situ­ations and recovery

In addition to documents mentioned above, recovery strategies for in­di­vidu­al com­pon­ents are among the most essential parts of a solid disaster recovery plan. And it’s this part of the plan that often requires the most effort.

IT security managers are known to encounter many different situ­ations. Optimal pre­par­a­tion for such scenarios should include an IT disaster recovery plan with relevant solutions and, above all, a suitable recovery plan. A precise risk analysis helps reveal vul­ner­able areas and identify portions of the IT network that, while po­ten­tially threat­en­ing when left unguarded, are essential to day-to-day business op­er­a­tions. 

Make sure to execute the following steps before you put your recovery plan together:

  • Analysis of all IT processes and pro­ced­ures
  • Hardware analysis
  • Audit of all software ap­plic­a­tions
  • Survey of all relevant transfer and system data

Once these steps have been carried out, you can now begin to create a step-by-step guide for various potential emergency situ­ations and record them into your IT disaster recovery plan. Creating such a recovery plan can prove to be a demanding exercise of patience and diligence, as it requires that each step is in alignment with all company de­part­ments. IT disaster recovery plan templates, while helpful, should not be viewed as a silver bullet for those with time con­straints. This is because carrying out regular updates and properly training fellow coworkers con­sti­tutes another major task in setting up adequate security pre­cau­tions. For this reason, it may be a good idea to think about hiring an external con­tract­or.

In­creas­ing fail-safe per­form­ance

Creating an IT disaster recovery plan is a necessary and important task for any company. In some cases, a carefully conceived plan could be the dif­fer­ence between an ir­rit­at­ing period of downtime and thousands of losses, as the following tool from Stor­agepipe il­lus­trates. This tool lets users create different potential disaster scenarios based on varying company para­met­ers, like annual revenue, number of affected employees, their hourly wages, etc. It doesn’t take long to gain a feel for what type of financial damage these situ­ations are able to inflict. Taking time out for regular drills can help reveal potential points of weakness in your IT system, pathing the way for prompt repair before they can cause any real harm.

Go to Main Menu