Business Continuity Planning and DRP

Business Continuity Planning & Disaster Recovery Planning – Answer any one of the question

Business Continuity Planning and Disaster Recovery Planning.

Please respond to one of these Questions

Q1

Chapter 18 – Which type of retention policy does your place of employment use or write about your own experience?

Q2

Chapter 19 – Describe some of the risks that social engineering creates for the company?

Q3

Chapter 20 – Describe 3 ways that you would protect your company’s data.




ANSWER

Question 3) Chapter 20 – Ways that you would protect your company’s data.

Business Continuity Planning and Disaster Recovery Planning.

Business Continuity Planning and Disaster Recovery Planning. Human and software faults can both risk the business data in your company’s Computer network system. If the companies have not taken the essential precautions, they are putting their survival and credibility in jeopardy. Further, they may lose clients to their competitors. In addition, it is difficult to recover after a security breach; it generally takes a significant amount of time and money, making it critical to safeguard their business data adequately. Furthermore, the global expansion of data protection laws has given an extra degree of urgency to the requirement for all businesses to establish effective data protection procedures.
In recent years, data security has become a must-have for all businesses, regardless of size. Large corporations are often far ahead of the game, having developed and tested their cyber security procedures over the previous few years (Wallace & Webber, 2017). Therefore, the discussion will entail three ways to protect data in a company and ensure corporate data security.



i. Developing data plan recovery

Various steps must be taken to create an implementable strategy for effectively recovering a company's data after a disaster. They are as follows: planning, identifying essential data, developing appropriate guidelines and standards, determining the backup type, developing recovery methods, and organizing testing and management.
An effective data recuperation strategy starts with correct planning, as with any job. Initially, the relevant stakeholders have a primary mandate to review backup and recovery. Find out what your business demands are and whether they are concerned with regulatory standards. Few firms have not planned data retrieval. Therefore the next step is to assess the current backup and recovery plans.




Many mechanisms are in place for data backup and recovery. These include conventional offline means for storing hard copying printouts, magnetic disks, CD-ROM, and external hard drives, as well as microfiches. However, online options such as disk mirroring, storage servers, and computer backups provide speedier data recovery. To the success of your rehabilitation strategy, assessment and selection of suitable solutions are essential (Wallace & Webber, 2017). Many companies have experienced a disaster to find that the software needed to read their storage devices has been obsolete, hard to access, or just not available anymore.




The data storage is significant factor. It is best if the company has several different places for data storage. The company may also agree to store data for each other with another incompetent company. Naturally, the corporation must be relatively convinced that the same calamity will not damage both sites. The firms must also ensure that both sites handle the increased workload if one website is offline. The choice is not always good in practice and tough to handle (Wallace & Webber, 2017). Another way to maintain the integrity of your media is to employ a professional storage firm that has an integrated environmental facility. It has also tried and established techniques to store and retrieve data in an urgent procedure and provide guidance on business continuity strategies.



Most firms have no data storage and classification rules and processes. And many of the policies are poorly enforced. The policy that is not implemented might generate a false sense of security that is worse than no policy. The first stage in the implementation of data storage and classification policies is to identify data owners. An identifiable owner who understands the relevance and the usage of the data should bear all the data in the firm. Upon identifying the owners of the data, design a strategy to determine how relevant the data is (Wallace & Webber, 2017). A categorization strategy can then be developed. Some classifications that the company may utilize are essential, sensible, legally necessary, and non-critical.



ii. Identify crucial data

The corporation is likely to adopt a variety of strategies that balance time-to-data against cost compensation. Traditional tape backups are still often used, although they can cause transit problems, storage problems, and recovery problems. They can be helpful. Tapes might fail without warning if they are not correctly handled and preserved. You also need to refresh the program and program for reading the cassettes (Wallace & Webber, 2017). The company may maintain their data over LAN or WAN, such as the Internet, using digital vaults, and they can quickly restore it than disk. ………….Cont.

For further help with this assignment and many more contact us via email:

Address:- homehubstudy@gmail.com  

 

Refer to Other Related Articles

References

Wallace, M., & Webber, L. (2017). The disaster recovery handbook: A step-by-step plan to
ensure business continuity and protect vital operations, facilities, and assets. Amacom.
https://www.yourhomeworksolutions.com/wp-
content/uploads/edd/2020/09/the_disaster_recovery_handbook_1-2.pdf