Tactical Advice

Building Better Business Continuity

Are you bracing for the next Katrina without planning for the sprinkler leak that's more likely to threaten your servers?
This story appears in the September 2006 issue of BizTech Magazine.

Photo: Raffi Alexander
Frank J. Gillman, Chief Technology Officer at Allen, Matkins, Leck, Gamble, Mallory & Natsis

Say the words "disaster recovery" to the average IT executive and be prepared for immediate assurances that the business can ultimately restore operations in the event of a catastrophe. Horrific events such as Hurricane Katrina and the Sept. 11th attacks have rightly focused attention on how companies can recover from a serious loss of service or materials. Larger businesses have documented and planned how to resume operations on a limited basis, and equipped key staff members with the necessary codes and authorizations needed to recover data. Smaller companies have increased their investments in backup technology and off-site data storage services to provide an extra measure of insurance.


Yet, in reality, most disaster recovery plans ignore the more likely scenarios that can significantly disrupt business operations. A faulty sprinkler in the server room, a toxic spill in the building that forces evacuation or employee sabotage of critical data can mirror the impact of a Katrina-scale calamity. Your organization's plans should focus as much, if not more, on dealing with these more routine events. Rather than limit yourself to thoughts of recovery from a natural disaster, take a broader look at the issue by defining your company's overall goals for business continuity. Here are a few tips to get you started:


Define Your Scope. How long can your organization function, both structurally and financially, during a significant loss of service? Companies with large cash-reserves or previously distributed goods can withstand longer downtimes. Professional service companies that operate a cash-based business will see an immediate impact on their profits as each hour goes by. Your business continuity investments and options should be proportionally higher if you have a very short window of risk tolerance.



Testing 1-2-3. The best-laid plans can fail if they're not tested on a regular basis. Organizations should test their business continuity plans every six months to ensure that the process is working as desired.


Create Communication Contingencies. How will workers be informed of the company's status during an emergency? If your systems are off-line, options such as internal voicemail broadcasts, e-mail or Web page alerts may be unavailable.


Back Up Your Backups. Relying on one outside service to protect your business simply moves the single point of vulnerability from inside to outside your organization. It's important to have a multitiered approach to protecting your data. Hire at least two independent companies — one at least 100 miles from your primary place of business — to house your data. If you store tapes off-site, make sure that you consider tape encryption to fully protect key company information.


Consider Continuous Backup. Advances in storage technology are making it possible to collect complete sets of company data. Yet, in today's 24/7 global economy, it's getting harder to find maintenance windows for data backup. Several companies now offer continuous backup systems that, after an initial data population, only back up data that has changed, and does it in real time. This process ensures that the data set is always current and virtually eliminates maintenance windows for backups.


Developing an effective business continuity plan requires the active participation of multiple executives and department heads, a difficult task to be sure, but critical to defining your organization's goals. Whatever solution or solutions you ultimately implement, the plan must meet those metrics, or it will certainly fail when a crisis occurs. That's the worst time to find out that better planning and proper testing would have ensured the plan's success.


Frank J. Gillman is the chief technology officer for Allen, Matkins, Leck, Gamble, Mallory & Natsis, a 200-attorney law firm with six offices in California.
Sign up for our e-newsletter


Heartbleed: What Should Your... |
One of the biggest security vulnerabilities has almost every user and every industry...
Why Businesses Need a Next-G... |
Devices investigate patterns that could indicate malicious activity.
Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....


The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

Businesses Must Step Careful... |
Slow and steady wins the race as businesses migrate IT operations to service providers,...
Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Ensure Uptime Is in Your Dat... |
Power and cooling solutions support disaster recovery and create cost savings and...


Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Mobility: A Foundational Pie... |
Other technologies rely on mobile computing, which has the power to change lives, Lextech...
Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.

Hardware & Software

Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....
New Challenges in Software M... |
IT trends such as cloud, virtualization and BYOD pose serious hurdles for software...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.