STAY ONE STEP AHEAD OF POTENTIAL DISASTERS
Ransomware protection for your business. This means a successful defense against an attack on your business that would otherwise be a disaster for you and your business reputation.
The best defense against a ransomware attack is a solid and tested data backup and disaster recovery (BDR), plan. You have to prepare yourself before disaster strikes. Being prepared for potential disasters, like a ransomware attack, is key to keeping your business running. It is not only important to have a disaster recovery solution you trust, but to make sure you test it as well.
Keep this handy little BDR checklist on hand and follow it.
The Ultimate Disaster Recovery Checklist
Prior to a disaster ever occurring (and unfortunately, it is a matter of when and not if) ask yourself the following:
Do you have a disaster recovery solution in place?
Do you trust it?
When was the last time your backup was tested?
How long does it take to recover from your current backup solution?
How long can you realistically be down? 1 hour? 1 day?
What is the financial cost of downtime to your business?
When a disaster occurs, is there an offsite copy?
Are your backups safe from Ransomware deleting them as well?
Okay, let’s pretend, your disaster moment has occurred—time to walk through the following steps:
1. Assess the problem and its impact on your business
Every disaster is different. Before doing anything, understand the underlying issue and how it may affect you.
Is the issue local to one machine, or does it affect your entire system?
Have files been deleted or are servers/workstations down?
2. Establish recovery goals
Recovery is what makes a BDR solution different from a simple backup product. Plan out your road to recovery.
• Restore the system, the data, or both? Should time be spent recovering files and folders before system recovery?
• Identify critical systems and prioritize recovery tasks.
• What date/time should you recover from?
• How long can your recovery take?
3. Select the appropriate recovery type(s)
To get to your “road to recovery”, the appropriate recovery procedure must be followed. Think about which approach will best get you to your end goal.
• File restore. OR
• Local virtualization. OR
• Off-site virtualization.
4. Verify the recovery and confirm functionality with users. Once a recovery is verified, confirm that it interacts positively with users.
• Test network connectivity.
• Ensure all users can access resources and applications in the virtual environment.
5. Restore the original system(s), if needed. If the original system(s) needs to be restored, decide which restoration process will work best.
• Bare metal restore. OR
• Virtual machine restore.
6. Self-assess afterwards. After it’s all said and done, take a step back and think about it: How well did your team do? What could you have done differently?
• What precipitated the failure?
• What ongoing issues need to addressed?
• What can be done better in future DR scenarios?
Does all of this ransomware protection and data backup stuff tire you out? Do you need some technology help in your business? Would you like to work with a technology company that is dedicated to your success? If this is true of you and your business, give us a call at 503.359.1275. We’re always happy to chat!
Dedicated to your success,
DTS InfoTech . . . computer networks that work