Be Prepared

When it comes to disaster preparedness, applying the Scout motto pays dividends.
This story appears in the September 2007 issue of BizTech Magazine.
John W. Ellis
Photo: Hot Shots Imaging
Jim Shanks
Executive Vice President and
former CIO of CDW

Disasters happen — particularly when you least expect them.

The “Murphy’s Law” theory seems to ensure that even if you think you are prepared, something will go wrong. Most likely the issue that goes wrong will be the thing you are least prepared for. Of course, maybe that’s just a matter of perception, depending on whether you are looking at a given situation from a prepared or not-prepared point of view.

Being unprepared for a data center catastrophe or other serious loss of data or network resources can have a significant and lasting impact on your business. You should put in the effort up front to define business processes and understand how various units within your company interact with one another.

To determine your most critical data and network resources, you first must understand how the business functions and which tasks are critical. Once you have a grasp of these points, you can use three main tools to help you establish an action plan to keep your business running if disaster strikes.

1 Impact Analysis: Using a current inventory of your network resources and computer equipment — and possibly other documentation such as network diagrams — examine your systems assets and rate them in terms of the impact they would have on doing business if they were unavailable. You can rate them using a scale of 1 to 5, with 1 being slightly affected and 5 being closed down. Of course, you can also come up with your own scale or rating strategy.

In the end, you need to be able to identify the servers, data and network resources that are most critical to your business, so you can give these the highest priority and allocate your resources effectively.

2 Documented Plan: You should consider all reasonable (and maybe even some seemingly unreasonable) scenarios and document the procedures each employee will follow if an event occurs.

Once you have the impact analysis complete, take a look at the list of equipment and resources on it. This will help you prioritize. Your plan should include both business continuity (how to continue doing business during a catastrophe) and disaster recovery (how to return to a normal state of business following a catastrophe).

3 Test Your Plan: One common mistake is to create a great disaster recovery and business continuity plan and assume it is working or will work when needed. If you find a flaw in your strategy the hard way — after a disaster has affected your business — it’s too late. The damage is done.

Run periodic drills and tests to ensure your process works and the people responsible for executing the plan are trained and understand their roles. You should also periodically test your backup data by doing a data restore to make sure you have successfully saved the data you need so that you can recover it when necessary.

Ultimately, being prepared takes time, but it’s worth it. Even a relatively minor problem can seem like a disaster when you are not prepared. Conversely, with a well-designed and documented business continuity and disaster recovery plan in place, even a major incident can be reduced to little more than a minor inconvenience.

Jim Shanks is executive vice president of CDW, a $6.8 billion provider of technology products and services, based in Vernon Hills, Ill.
Sign up for our e-newsletter


Heartbleed: What Should Your... |
One of the biggest security vulnerabilities has almost every user and every industry...
Why Businesses Need a Next-G... |
Devices investigate patterns that could indicate malicious activity.
Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....


The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

Businesses Must Step Careful... |
Slow and steady wins the race as businesses migrate IT operations to service providers,...
Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Ensure Uptime Is in Your Dat... |
Power and cooling solutions support disaster recovery and create cost savings and...


Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Mobility: A Foundational Pie... |
Other technologies rely on mobile computing, which has the power to change lives, Lextech...
Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.

Hardware & Software

Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....
New Challenges in Software M... |
IT trends such as cloud, virtualization and BYOD pose serious hurdles for software...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.