Select Page

The Most Common Business Continuity and Disaster Recovery Mistakes

When we talk about business continuity and disaster recovery we should probably begin with some definitions as to exactly what do those terms mean. Business continuity plan from an IT perspective really is an organization’s ability to keep vital business operations or processes running at or near normal capacities in the event of infrastructure failure. This is similar to but stands in stark contrast to disaster recovery.

We are going to look at incidents that significantly impact or make critical infrastructure unavailable. The most common examples are natural disasters and things that people describe as an act of God.

Business continuity can be described as the interruption of service but not a wholesale disaster and disaster recovery really is dealing with some of those larger catastrophic failures. There are Common mistakes that people make when evaluating or developing a business continuity plan. Let’s review some of those:

Focusing on Technology First and Business Process Priorities Second

One of the common mistakes that people make when they begin to develop a business continuity plan is focusing on the technology first and the business processes second. If we go back to the definition of business continuity, we really want to do is keep those business processes up and running at or near full capacity.
In order to really develop an effective BCDR (Business Continuity and Disaster Recovery) plan, we need to make sure that we go out and walk amongst the business units, find out what are the priorities, find out what processes absolutely must survive at all cost. Which can go down for short period of time and what processes can go down for hours perhaps in some cases even days.
The main thing and the mistake you would want to avoid is to think about the BCDR from the confines of the server room and not get out amongst all the various stakeholders. This could be your employees, they could be customers and it could be people who interface with various aspects of your technology both internally and externally.
That is who you really need to speak with and that is where you start to build the plan, because in the end hardware and appliance solutions must effectively support business processes otherwise they just don’t make sense economically and they won’t make sense where it really comes time to when you need them.

Focusing on the Wrong Causes of Business Continuity & Disaster Recovery

When the Strategic Research Corporation started analyzing the leading causes of BCDR incidents, they found that 44% are caused by hardware failures. Things such as servers, disk drives, switches and other core infrastructure type components. 32%, that’s right, 32% are caused by human error.

It has nothing to do with the technology but the operators, the people using the equipment. A lot of times it’s a mistake in the configuration setting or issuing the wrong command on a production system. It happens more frequently (as you might expect) right after new hardware or new systems have been installed.

Next on the list are software and firmware errors. These failures often relate to operating system errors, things like driver incompatibilities and the introduction of new applications to servers.

The Most Common Business Continuity and Disaster Recovery Mistakes
7% are due to virus or security type breaches. As you know in today’s world malicious attacks do happen. You need a solid security plan to make sure that you deal with these things, but keep in mind although this is on the rise and it’s very important to deal with, we are now at 7% of all causes of BCDR incidents.

The last on the list, just 3%, have been found to be caused by natural disasters. Typically, when you speak to someone about BCDR what flashes through the mind or what undoubtedly comes up in conversation is the risk management perspective of the disaster recovery peace. Yet as we mentioned only 3%, just three percent evolved BCDR incidents come from natural disasters. From this big cataclysmic events which people like to talk about. But, the fact of the matter is that 70 – 90 percent of all system outages are due to planned downtime.

What do you Need to Look at when developing a Business Continuity & Disaster Recovery plan?

When you look at developing a Business Continuity & Disaster Recovery plan you really need to turn things upside down and look at the fact that how are you going to deal with the 70 – 90 percent of the planned outages, and how you are going to deal with the 7 – 25 percent that come from unplanned downtime. How are you going to prevent that.

Finally of course it’s important you want to plan for the natural disaster, but you really need to look at your systems and how are you going to maintain uptime day-in and day-out. That’s an absolute must that you look at that and have that as part of your plan.

Zero Trust: Enterprise Security for Ransomware Protection

Zero Trust: Enterprise Security for Ransomware Protection

Zero Trust is a fundamental shift in cybersecurity, challenging conventional notions of trust within organizational networks. As ransomware attacks and cyber threats evolve in complexity and scope, the Zero Trust model emerges as a critical strategy to ensure...

Malvertising: The Dark Side of Online Advertising

Malvertising: The Dark Side of Online Advertising

Malvertising—once a shadowy threat lurking on the fringes of cybersecurity discourse—has emerged as a formidable adversary, directly targeting enterprises in the digital arena. As businesses increasingly rely on online advertising to connect with their audience,...

Conti Ransomware: In-Depth Technical Breakdown

Conti Ransomware: In-Depth Technical Breakdown

Conti ransomware has earned notoriety, notably for its involvement in the Costa Rican government hack. Operating as a ransomware-as-a-service (RaaS) group, Conti specializes in infiltrating networks, encrypting crucial data, and extorting exorbitant sums of money. In...

Supply Chain Attack: The Achilles’ Heel of Enterprise Security

Supply Chain Attack: The Achilles’ Heel of Enterprise Security

Supply chain attacks have emerged as a formidable threat vector in the landscape of cybercrime, posing significant risks to enterprises of all sizes and industries. Among the various tactics employed by threat actors, ransomware attacks leveraging supply chain...

How to Set Up S3 Object Storage for Veeam Data Platform

How to Set Up S3 Object Storage for Veeam Data Platform

Veeam v12 introduced Direct-to-Object storage, enabling S3 object storage as the primary backup repository. Prior to this, S3 object storage integration relied on Veeam's Scale-Out Backup Repository (SOBR), using a performance tier and a capacity tier, which extended...

You May Also Like

Subscribe To Our Newsletter

Join our mailing list to receive the latest news, updates, and promotions from StoneFly.

Please Confirm your subscription from the email