Saving Your Business from a Data Loss Randy Clark.

Slides:



Advertisements
Similar presentations
1 The Basics of Business Continuity Presented by Mary F. Sandy, CBCP Business Continuity/Disaster Recovery Class DePaul University ©Mary F. Sandy, 2006.
Advertisements

Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Information Technology Disaster Recovery Awareness Program.
Maximizing Uptime and Your Firm's Bottom Line: Understanding risk and budget when evaluating business continuity & disaster recovery protocols Michael.
©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain Digital is a trademark of Iron Mountain Incorporated. Stanford University ©2006 Iron.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.
© 2009 EMC Corporation. All rights reserved. Introduction to Business Continuity Module 3.1.
Managing Information Systems Information Systems Security and Control Part 1 Dr. Stephania Loizidou Himona ACSC 345.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Remote On-line Backup Service. How safe is your business data?
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Barracuda Backup Service Data Backup and Disaster Recovery.
The Ultimate Backup Solution.
1 Pertemuan 23 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Processing Integrity and Availability Controls
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo.
Contingency Planning Drew Hunt Network Security Officer Valley Medical Center.
| Establishing a Contingency Plan.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Protecting ICT Systems
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Presented By: MICHAEL HOFFMAN President & CEO - Bolt Data Systems June 16, 2010 Data Backup for the Shared Platform.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
What is Next-Generation Disaster Recovery and Service Availability? Why do We Need it? Dan Smith Senior Manager, Solution Consulting and Engineering, GTSI.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Security and backups GCSE ICT.
DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection.
2015 Risky Business Week Welcome to the 2015 Risky Business Week presentation regarding disaster recovery Risky Business Week.
David N. Wozei Systems Administrator, IT Auditor.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
 FFC backs up all of its data each day. It stores its most recent daily backup once a week at a company owned offsite location. FFC also stores the most.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
Co-location Sites for Business Continuity and Disaster Recovery Peter Lesser (212) Peter Lesser (212) Kraft.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Disaster Recovery.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
TIJARA Provincial Economic Growth Program Business Continuity / Disaster Recovery Planning Introduction and Workshop Outline Prepared by Larry SanBoeuf.
Back ups Megan Wilkinson. What data can be held on a computer? Personal data / files: 1.Bank info 2. address and passwords 3.Bank passwords and wage.
Business Continuity Management Rikus Matthyser Executive: Telkom Business Integration Services.
The Ultimate Backup Solution.
Enveloc ®, Inc. The Importance of Data Backup Enveloc, Inc. USA Technology & Research Park 775 N. University Blvd. Suite 110 Mobile, AL
Protecting Your Data With Just Get Backup, LLC. Agenda How important is your data – Acknowledging worst-case scenarios. Understanding that data backup.
Disaster Recovery: Can Your Business Survive Data Loss? DR Strategies for Today and Tomorrow.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
Contingency Management in IT. Presentation Outline Components of contingency planning Insurance and backups Actual IT contingencies - Y2K problems - major.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
Technology and Business Continuity
Online Backup Service 30 Day FREE Trial
DISASTER RECOVERY INSTITUTE INTERNATIONAL
Disaster Recovery and SQL for new and non-DBAs
Bare Metal Server Backup Solution
The Ultimate Backup Solution.
Database Security &Threats
Disaster Recovery is everyone’s job!
Disaster Recovery at UNC
Presentation transcript:

Saving Your Business from a Data Loss Randy Clark

The types of disasters most commonly putting businesses at risk for data loss Effects of a data loss How to implement a disaster recovery strategy The most vital piece to include in your recovery strategy 6 critical steps to save your business from a data loss disaster

Customer Data Bases Financial DataClient Lists Proprietary Information Intellectual Property Business Operations Data What would the impact be to your business if this data was lost?

The most common disasters that cause data loss: Hardware Failure – such as hard drive failure or power surges 42% Human Error – such as accidental deletion of data or accidental damage to hardware (dropping a laptop) 30% Software Corruption 13% Computer Viruses 7% Crime – such as computer theft or sabotage 5% Natural Disasters – such as floods, fire, and tornados 3% * Dr. Bill Bruck, “Taming the Information Tsunami, “ Microsoft Press

If your business suffered a data loss, and you had no disaster recovery plan in place, what could happen? Financial Loss Productivity Plunge Damaged Reputation Lost Sales/ Contracts Bankruptcy

Implement a Disaster Recovery Plan! The objective of a disaster recovery plan (DRP) is to establish, and implement as needed, procedures to restore any loss of data. A disaster recovery plan is the part of an overall contingency plan that contains a process enabling an enterprise to restore any loss of data in the event of disaster. Getting Started: 1. Identify your needs and define what business continuity means to you 2. Determine and document your recovery objectives 3. Evaluate technologies that support your strategy 4. Implement and test the technologies best suited to your requirements

Data is stored OFF-SITE Data is securely stored using the highest level of encryption available and Tier 4 data centers Data is automatically backed up Data is fully recoverable at anytime from any location The data restoration time is FAST, minimizing downtime and accelerating recovery time Compliant with HIPAA, Sarbanes Oxley and Gramm Leach Bliley

Tier IV Data Center is composed of multiple active power and cooling distribution paths, has redundant components, and is fault tolerant, providing % availability. Fault tolerance is the property that enables data center to continue operating properly in the event of the failure of some of its components.

6 Steps You Can Take to Save a Business from Data Loss 1.Backup your data off-site – online backup and recovery is the best method available. 2.Test your backup technology to ensure that data is being backed up and is recoverable – many online backup solutions provide backup logs. 3.Reduce risk of viruses and hackers by utilizing appropriate anti-virus and security software. 4.Make sure you have a data recovery plan in place so that your team knows how to react in the event of a data loss. 5.Make it simple and seamless for both local and remote employees to backup and restore data themselves. 6.Contact the COMPUTER BOX to speak to a disaster recovery expert and begin protecting your data today.

COMPUTER BOX offers Evolved Backup, an online backup software solution that securely backs up data to multiple offsite locations and accelerates time to recovery in the event of data loss.

Questions?