Business Continuity and Disaster Recovery - Risk Analysis and Control

In the risk evaluation phase, there are a number of key areas that must be covered. One of the most important is to understand probable threats. In an ideal world, which most of us have noticed does not exist, we would identify and protect ourselves against all threats to ensure that our business continues to survive. Obviously, we are constrained by other factors such as budgets, time and priorities and need to apply cost benefit analysis to ensure we are protecting the most critical business functions.

A second important step is to identify all probable threats and prioritize them. Threats, typically, can be classified in several ways such as internal/external, man-made/natural, primary/secondary, accidental/intentional, controllable/not controllable, warning/no warning, frequency, duration, speed of onset etc. While classifying threats is helpful in terms of understanding their characteristics and potential controls, grouping and understanding by business impact is also important. Obviously, the same impact can result from a number of different threats.

Identifying mission critical business processes and systems is another fundamental building block of the business continuity plan. After your critical business processes and systems and probable threats are established, the next step is to identify vulnerabilities and loss potential. This requires an extensive scan of the organization to identify vulnerabilities and then analysis to understand those vulnerabilities which would have the greatest impact on your critical business processes and the organization. This starts to clarify and quantify potential losses, which helps to establish priorities.

Following the identification of the most probable threats and vulnerabilities, an analysis of existing controls is needed. This spans physical security as well as people, processes, data, communications and asset protection. Some controls such as physical security and data backup are obvious. Other controls required are often less obvious, but they can be identified through the risk evaluation process.

Once the key building blocks of critical business functions, most probable threats, vulnerabilities and controls are identified, the next stage is to develop an understanding of the probability of threats factored by the severity or impact of the threats. This leads to the business impact analysis phase which establishes priorities for protection.

The goal is to minimize threats, impacts and downtime and to mitigate any losses. Fundamentally, the goal is to protect your people, protect your data, protect your vital communications, protect your assets and to protect your brand and reputation. Overall, of course, the goal is to ensure your business continues to operate and to do it in a cost-effective way meeting standards of reasonable and prudent judgment.

About The Author

Robert Mahood has significant technology and management experience in data communications, internet, storage, disaster recovery and data recovery. He is currently the president of Midwest Data Recovery. www.midwestdatarecovery.com

bmahood@midwestdatarecovery.com, 312 907 2100 or 866 786 2595

More Resources

Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting

More Data Recovery Information:

Related Articles


HasYour Computer Hard Drive Ever Crashed? Are You Challenged by Backups?
The following scenario's have probably been repeated thousands of times, on computer systems of all kinds and sizes, operated by all levels of users from complete novice, to expert user.· You log on and your computer will not boot to your operating system.
Comparing Data Recovery Software
Software programmers recognize the importance of data files, and thankfully, they have been able to create products that demonstrate their understanding of how often people accidentally delete or lose important data. Thanks to software programmers and development companies, people have a variety of data recovery software programs available to purchase in the event they've lost vital data.
Big Time Disaster Recovery Solutions Available for the Little Guy
There was a time - not too long ago - that Data Disaster Recovery solutions were available only in the domain of multinational corporations and big business in general. However, with the proliferation of high speed internet access and the ability to store large amounts of data in a much more cost effective manner due to plummeting storage costs, the ability to perform a secure backup of data to a remote location engineered specifically for the purpose of securely storing massive amounts of information is now in the reach of the general public.
Bill Gates Made Data Recovery Easy
Bill gates provided a ready made option in Microsoft windows, which is very useful for data recovery.Several time we make mistakes unknowingly and we lost our data, then we need to recover the data.
3 Simple Steps To Organize Your Critical Online Home Based Business Directory
If You are running an Online Work at home Business it is very critical that you create a well organized directory structure. The Obvious advantage of an organized Directory structure is it makes it easy to find what you need.
Offsite Data Backup Not Just for Fortune 500 Companies Anymore
In today's high paced digital world there is a very high value placed on information. Not just the kind of information you read in the newspaper or your favorite trade journals, but the type of information that we generate on a day to day basis with our digital devices.
Avoiding Hard Disk Data Recovery Services
As a home computer owner, one of the greatest threats to yourinformation and to your wallet, is hard disk failure. When yourdrive crashes, you will quicky realize how valuable theinformation you can no longer access is.
Data Recovery: Beginners Tips
Right now you probably in a lot of mental pain, and all you're concerned about is recovering your data as quickly as possible - so we'll refrain from comments on the wisdom of regular back ups. The time for preventative measures has gone - the issue at hand is data recovery.
How To Use Spyware Elimination Software
Spyware elimination software is designed to detect andeliminate spyware. A large number of spyware eliminationsoftware products are available.
Want To Beat The Odds? Disaster Recovery Planning is Essential
Statistics show two out of five businesses go out of business within five years of experiencing a major disaster.These statistics are staggering.
Do I Really Need To Backup?
Okay, computers a machine, right? Okay, maybe not yours. Youhave this special relationship, but that a subject foranother article.
Disaster Recovery- Managing the Risk
Helping your business survive in the event of an unforeseen disaster: Most business failures are not from bad business but from bad business practices.Most companies that fail are the ones that have not planned how their business will continue to function in the event of a disaster.
Business Continuity and Disaster Recovery - A Business Not a Technology Issue
Hackers, hurricanes, fires, flooding, power outages, denial of service attacks, application failures, employee error, sabotage and now terrorism are helping companies to focus on the necessity of a business continuity plan.Through the late 1990s as companies prepared for Y2K, many IT executives, risk managers, CFOs and corporate managers realized that recovering computing systems, networks and data was not enough.
When Disaster Strikes: How Long Would Your Business Survive if Files On Your Computer Disappeared?
A Tornado? In Birmingham? In The United Kingdom? Unthinkable!Yes, in July 2005 (while I was putting finishing touches to my cave-house in Spain) my house, along with many of my neighbours' houses was struck by a powerful tornado that literally tore up the streets. Leaving people homeless as their homes were bulldozered (with all their possessions inside).
Data Backup for Beginners
It's 10pm. Do you know where your data is?Data.
Its All In The Planning - Surviving Disaster
ITS ALL IN THE PLANNING - PREPARING FOR THE UNTHINKABLE* Make it clear who needs to do what, and who takes responsibility for what.* Appoint deputies for key roles.
3 Ways Computers Can Hurt Your Ministry - Part 1 - Ineffective Data Backups
Our computers have become almost indispensable ministry tools. What would you do if the worst happened and you had to function without your computers? Would your ministry survive?This article is the first in a 3-part series on how to protect your ministry from serious computer-related loss.
5 Simple Tips to Prevent MS Access Database Corruption
It's important to understand that any time an Access client disconnects unexpectedly, it may set a "corruption flag" in the .mdb file indicating that the database is in a corrupt state (regardless of whether any data has actually been corrupted or not).
Data Recovery - You Can Get It Back!
Data recovery is a process whereby you can save data andfiles you accidentally deleted, had eaten by malicioussoftware or viruses, hardware failures, corporate espionageand many more scenarios. Most people believe that when thehard drive crashes their world ends also, but that's notusually the case.
How to Survive an Operating System Crash
"We apologize for the inconvenience, but Windows could not be accessed or located."It happens to the best of us.