The importance of BC and DR

1 June 2019 Infrastructure, Security Services & Risk Management

According to Shaun Searle, country manager - African regions at Redstor, organisations need to realise that business continuity (BC) and disaster recovery (DR) entail entirely different strategies with both being vital to keeping a business operational in a globally competitive marketplace.

Shaun Searle
Shaun Searle

BC ensures the company can continue during a disaster by getting things up and running as quickly as possible. These disasters can be natural (fire, flood, or earthquake) or man-made (hardware failure, data breach, or ongoing power failures); essentially anything that can bring an organisation to a standstill.

DR forms part of this. It is the capability of the company to restore data and critical applications in the event its systems are destroyed when disaster strikes. The focus revolves around vital support systems, such as communications; hardware; and technology assets getting back to normal in the shortest time possible.

“When it comes to BC and DR options, sizing the solution becomes key. A software-only option can help with this as it requires no additional on-premise infrastructure and can back up large data sets and complex environments, while ensuring compliance.”

Prioritising options

However, he cautions that very few solutions can perform both backup and DR effectively.

“Most specialise in one area or another. For example, you can get rapid recoveries at the expense of efficient long-term retention, or you get efficiency at the expense of restore speed. But the most important thing is that something needs to be done considering that Gartner estimates the average cost of downtime at $5600 per minute and growing.”

With customers less brand loyal than in the past, they are likely to move to a competitor when having a negative experience as a result of downtime or data loss.

“If data is lost, a business must be able to serve it up immediately, on demand, and with minimal effort from the user. Historically, these capabilities were only available to businesses that could afford an enterprise-grade data management solution. Fortunately, as technologies have evolved, such systems are more affordable to businesses of all sizes. Of course, the focus must be on the most critical files that need to be accessed first.”

While companies work on these files, the remaining data must be intelligently restored in the background without any delays, downtime, or disruption.

Planned approach

“Beyond effective solutions, one of the most important steps in putting together BC and DR plans is to ensure they are tested. This is vital to understanding additional aspects that may be missing, understand in greater detail the timeframes behind planned steps, and give decision-makers greater peace of mind.”

Best practice dictates that solutions are in place that allow for simple, on-demand testing with no limited functionalities or additional costs.

“It also makes business sense to avoid using separate solutions for backup, disaster recovery, and archiving. With an all-in-one data-management technology, a business will be able to access all its data, whether on-premise or in the cloud, instantly, through a single control centre.”

Ongoing review

Furthermore, BC and DR plans are not things done once and forgotten about.

“Key personnel need to come together once a year, if not more frequently, to review the plans and discuss any areas that must be modified. Additionally, companies might want to consider using technology that can be deployed quickly as an onsite solution, a fully cloud-based software-as-a-service solution, or a hybrid of the two.”

Cloud-based technologies require no upfront capital investment and no additional hardware. This means organisations avoid the expense of duplicate data centres and failover infrastructure that sit idle most of the time. However, it is prudent to find a provider whose charges are based on a simple subscription model with no bandwidth costs or charges for restores.

“It is important too to check that there is unthrottled access. Some providers limit the speed at which companies can download or stream data. They must make sure they can receive access as fast as possible so operations can continue uninterrupted. Irrespective, decision-makers today cannot afford to ignore either BC or DR strategies. The longevity of their organisations depends on it.”





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
New firearms training modules from ITA
News & Events Security Services & Risk Management
The International Firearm Training Academy has launched two new firearms training modules to support career development in the firearms industry: the Maintenance Fitter and the Firearms Custodian modules.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Background checks: risk levels and compliance
iFacts Access Control & Identity Management Security Services & Risk Management
Conducting background checks is a vital step in the hiring process for employers or when engaging service providers; however, it is crucial to understand the legal framework and regulations governing these checks.

Read more...
On the ball or unaware
Technews Publishing Information Security Security Services & Risk Management
Whether an organisation is operating at a high level of information security maturity or has dangerous vulnerabilities that could put an entire business at risk, advanced, strategic penetration testing can uncover its true state of IT security.

Read more...