Backup & Storage|Cloud Computing|data management

Four Common Disaster Recovery Myths

Most organizations have finally been convinced about the need to have a robust disaster recovery (DR) plan to protect their essential workloads. That’s due in a big part to the fact that almost everyone in IT is all too familiar with Murphy’s Law that states if something can go wrong it will go wrong and that other old IT axiom of,  it’s not if something is going to fail – it’s when it’s going to fail. While you may not need a DR plan most of the time, there definitely will come an instance when you will.

A recent Gartner report showed that around 80% of businesses faced an incident in the last few years that required the use of their DR plan. While the need for DR is pretty well established, there are still a number of myths about DR that can hinder a successful implementation. Let’s tackle some of these DR myths.

Our business doesn’t really need a DR plan — Some organizations have this mindset because they are in an area where natural disasters seldom occur.  However, that doesn’t mean that your business is safe from other types of events. For instance, your business could be brought down by cyberattack or ransomware or even the possibility of fire. Plus, disasters and data loss can also be caused by human error. One prime example of that was experienced by British Airways back in 2017 when their entire operations were brought down by an engineering error that resulted in the cancelation of over 400 flights.

Our business uses cloud apps and they are automatically protected – While it’s true that today’s major cloud providers have extremely high levels of availability it’s also true that just running your apps in the cloud is no guarantee that your critical data is protected. All of the major cloud providers do offer geo-redundancy and disaster recovery as a service (DRaaS) but you don’t get these features automatically. Instead, these are almost always add-on services that you buy above and beyond a standard services agreement for Infrastructure-as-a-Service (IaaS) or Software-as-a-Service offerings.

Sponsored Content

Maximize Value from Microsoft Defender

In this ebook, you’ll learn why Red Canary’s platform and expertise bring you the highest possible value from your Microsoft Defender for Endpoint investment, deployment, or migration.

Backups eliminate the need for DR – Backing up your critical workloads and data is certainly the core of a sound data protection strategy. However, backups don’t guarantee that you will be able to recover all of your data following a disaster. The data that can be restored by a backup is only as the current of the point-in-time when the last backup was completed which means there can be possible data loss. Backup and DR are both separate and essential pillars of overall business continuity and data protection strategy. Backups provide vital data copy and archival functions and they can provide a last line of defense in a disaster recovery situation but they don’t provide the fastest recovery time objectives (RTOs) or the shortest recovery point objectives (RPOs). Dedicated DR and DRaaS solutions can provide far faster recovery with less data loss.

We have a DR plan so we’re all set – Having a DR plan is great. However, many businesses make the mistake of thinking that once they’ve created a DR plan, that’s all that they need to do. Unfortunately, that’s not ever really the case. Businesses are not static entities where nothing ever changes. Instead, most organizations are continually deploying new applications as well as changing and updating business processes.  For your DR plan to work when you need it to, you need to go back and periodically review and update the plan to account for the changes in your business. Further, to really have confidence in your DR plan you need to periodically test it or at least select portions of it to ensure that everything is working the way you expect it to.


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

Michael Otey is president of TECA, a technical content production, consulting and software development company in Portland,
External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by:

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: