|
Now is the perfect time to make sure your Business Continuity Plan is up to date. These are the 6 steps:
1. Plan for the Effect, Not the Threat
Since you can’t anticipate all threats, your goal is to understand how any of the various unexpected scenarios will impact your building, your data and your area.2. Business Impact Analysis
Know your recovery time objective (RTO), which is the minimum time required for getting the critical production capabilities back online — e.g, 24 hours, 12 hours, or immediate. Also know your recovery point objective (RPO), which is the measure of how current the data must be in order to resume business operations.3. Business Continuity Plan
This plan must be thoroughly tested using a variety of planned and surprise scenarios, with the results properly recorded and available for review.
4. Disaster Recovery Planning
The disaster recovery plan is a critical subset of the BCP. This plan includes the specific procedures and requirements for the recovery of IT systems and bringing an alternate production site online.
5. Crisis/Incident Management
This program focuses on people and communication. What are the roles and responsibilities in the event the BCP is set in motion? Who has responsibility for triggering the plan? Who has backup responsibility if any individuals with primary responsibility are unavailable? How will people be informed that the plan has been set in motion? What if various communication platforms are not available?6. Education, Training, Testing, and Reassessment
No BCP can be successful if people don’t know about it, if they aren’t trained to handle both their primary and backup responsibilities, if the plan hasn’t been tested against a variety of scenarios, and if the plan isn’t continually updated to account for changing business conditions and potential threats.We can help you put a Business Continuity Plan in place and address the following concerns that directly impact your business:
- Identify what critical data is unsecured.
- Guide you in selecting the right security solutions for a layered approach, based on your type of data and your specific compliance requirements.
Start by clicking the "Get Started" button below and we'll help you tailor a solution specific to your business needs.
|
|