SlideShare una empresa de Scribd logo
1 de 17
Backup and Disaster
Recovery
Advanced Business Solutions
David Lacey
Backup and Disaster Recovery

1.
2.
3.
4.
5.
6.
7.

What is it?
Why is it Important?
What are the Basic Fundamentals?
What is a “Good” Backup and Disaster Recovery Solution?
Where Should YOU Start?
Tips and Tricks!
What does the Future Look Like?
What is it?
Backup
The procedure of making extra copies of data in case the original is lost or
damaged.
• Usually used to recover individual files/folders
• Example: Someone accidently deletes a file

Disaster Recovery
The processes, policies and procedures related to ensuring business continuity in
the event of a natural or human-induced disaster.
• Used during large scale interruptions of service where entire systems are
unavailable
• Example: Pipe burst in a server room and completely destroys all servers
Why is it Important?
Every business has important data that is essential to their operation:
•
•
•
•

Email Data
CRM Databases
Accounting Information
User Documents

Every business has “threats” that are constantly putting that data at risk:
• Employees
• Angry employee
• Untrained employee

• Virus/Malware/Spyware
• Cryptolocker

• Environmental Problems
• Power, Cooling, etc…

• Bad Luck!
Why is it Important?
Proactive Prevention is ALWAYS better than Reactive Recovery
What are the Basic Fundamentals?
Backup and Disaster Recovery is like an onion….

Each layer of the onion is a layer of protection
• More layers = better protection!
What are the Basic Fundamentals?

•
•
•
•
•
•

Variables
Endpoints
Applications
Network
Storage
Servers
Backups
What are the Basic Fundamentals?

•
•
•
•
•
•

Bad
Data everywhere!
Servers not secure!
No backup power!
Poor network design!
Inconsistent backup
process!
Many single points of
failure!
What is a Good Backup/DR Solution?

•
•
•
•
•
•

Good
Consolidated data
Servers in a secure
environment
Servers connected to a
UPS
Network is optimized
Centralized backup
Many layers of protection
to avoid Single Points of
Failure
Where Should YOU Start?
Where Should YOU Start?
Know what you’re REQUIRED to do
• Compliance Requirements
• PCI, SAS70, HIPAA, Sarbanes-Oxley, etc…

• Customer Expectations
• Are your customers expecting a service/product from you?

• Employee Expectations
• Employee Payroll
Where Should YOU Start?
Know what you WANT to do
• Identify Recovery Time Objective and Recovery Point Objective
• Be realistic!!!
Where Should YOU Start?
Know what you NEED to do
• Every company is different
• If you have a lot of turnover, securing your data and ensuring that access to it is limited
might be important
• If you’re building has lots of power problems, a good UPS system might be important

• Identify what your company needs to SURVIVE
• Data is not the only important thing…
• Think outside of the box – Printers, Fax Machines, Phone Systems
Where Should YOU Start?
Know what you’re ALREADY CAPABLE of doing
• A lot of these pieces to the puzzle might already be in place
• No reason to spend money unless you have to…
Tips and Tricks!
• Centralize your data
• Keep your Anti-Virus software up to date
• Keep your Workstation and Server Operating Systems up to date
• Reduce the amount of physical access to your Mission Critical
Infrastructure
• Take advantage of the built in features that Microsoft Provides
Tips and Tricks!
• When buying hardware, build in as much redundancy as possible
• Keep your existing equipment up to date
• Compartmentalize your existing data
• Maintain/monitor the backup process
• Test the process at least once a year
• Train your employees
• Get involved!!
What does the Future Look Like?
• Bandwidth getting cheaper
• Virtualization Technology will advance
• Deduplication
• CLOUD

Más contenido relacionado

La actualidad más candente

vRescue Presentation
vRescue PresentationvRescue Presentation
vRescue PresentationvRescue
 
What We Do For Businesses
What We Do For BusinessesWhat We Do For Businesses
What We Do For Businessesalanblakley
 
Data centre incident nov 2010 v3
Data centre incident nov 2010   v3Data centre incident nov 2010   v3
Data centre incident nov 2010 v3gregynog
 
Integrated Business Systems: Success Through Change
Integrated Business Systems: Success Through ChangeIntegrated Business Systems: Success Through Change
Integrated Business Systems: Success Through ChangeLaz Davila
 
What We Do For Law Firm Management
What We Do For Law Firm ManagementWhat We Do For Law Firm Management
What We Do For Law Firm Managementalanblakley
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planningAureusIT
 
sales-sheet-Business-Continuity
sales-sheet-Business-Continuitysales-sheet-Business-Continuity
sales-sheet-Business-ContinuityGeorge Carroll
 
Vantage IT - the Complete IT Solution
Vantage IT - the Complete IT SolutionVantage IT - the Complete IT Solution
Vantage IT - the Complete IT SolutionPaul Tarbox
 
Elements of a Successful Computer System ver 1.0
Elements of a Successful Computer System ver 1.0Elements of a Successful Computer System ver 1.0
Elements of a Successful Computer System ver 1.0Dr. C.V. Suresh Babu
 
Top 10 data center strategy success
Top 10 data center strategy successTop 10 data center strategy success
Top 10 data center strategy successInternap
 
IT in the Cloud
IT in the CloudIT in the Cloud
IT in the CloudIvanti
 
SQLBits VI - Improving database performance by removing the database
SQLBits VI - Improving database performance by removing the databaseSQLBits VI - Improving database performance by removing the database
SQLBits VI - Improving database performance by removing the databaseSimon Munro
 
Disaster Recovery vs. Business Continuity
Disaster Recovery vs. Business ContinuityDisaster Recovery vs. Business Continuity
Disaster Recovery vs. Business ContinuityRapidScale
 
Doing More with Less: Product Features, Strategies, and Ideas to Weather
Doing More with Less: Product Features, Strategies, and Ideas to WeatherDoing More with Less: Product Features, Strategies, and Ideas to Weather
Doing More with Less: Product Features, Strategies, and Ideas to WeatherSolarWinds
 
Top 10 Reasons Why You Need a CTMS
Top 10 Reasons Why You Need a CTMSTop 10 Reasons Why You Need a CTMS
Top 10 Reasons Why You Need a CTMSPerficient
 
dcVAST 3rd Party Support
dcVAST 3rd Party SupportdcVAST 3rd Party Support
dcVAST 3rd Party SupportdcVAST
 

La actualidad más candente (20)

vRescue Presentation
vRescue PresentationvRescue Presentation
vRescue Presentation
 
1 backup
1 backup1 backup
1 backup
 
What We Do For Businesses
What We Do For BusinessesWhat We Do For Businesses
What We Do For Businesses
 
Data centre incident nov 2010 v3
Data centre incident nov 2010   v3Data centre incident nov 2010   v3
Data centre incident nov 2010 v3
 
Integrated Business Systems: Success Through Change
Integrated Business Systems: Success Through ChangeIntegrated Business Systems: Success Through Change
Integrated Business Systems: Success Through Change
 
What We Do For Law Firm Management
What We Do For Law Firm ManagementWhat We Do For Law Firm Management
What We Do For Law Firm Management
 
Next step icm
Next step   icmNext step   icm
Next step icm
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planning
 
sales-sheet-Business-Continuity
sales-sheet-Business-Continuitysales-sheet-Business-Continuity
sales-sheet-Business-Continuity
 
Back up
Back upBack up
Back up
 
Vantage IT - the Complete IT Solution
Vantage IT - the Complete IT SolutionVantage IT - the Complete IT Solution
Vantage IT - the Complete IT Solution
 
Elements of a Successful Computer System ver 1.0
Elements of a Successful Computer System ver 1.0Elements of a Successful Computer System ver 1.0
Elements of a Successful Computer System ver 1.0
 
Top 10 data center strategy success
Top 10 data center strategy successTop 10 data center strategy success
Top 10 data center strategy success
 
Ies Axcient E Ufocuspreso[1]
Ies Axcient E Ufocuspreso[1]Ies Axcient E Ufocuspreso[1]
Ies Axcient E Ufocuspreso[1]
 
IT in the Cloud
IT in the CloudIT in the Cloud
IT in the Cloud
 
SQLBits VI - Improving database performance by removing the database
SQLBits VI - Improving database performance by removing the databaseSQLBits VI - Improving database performance by removing the database
SQLBits VI - Improving database performance by removing the database
 
Disaster Recovery vs. Business Continuity
Disaster Recovery vs. Business ContinuityDisaster Recovery vs. Business Continuity
Disaster Recovery vs. Business Continuity
 
Doing More with Less: Product Features, Strategies, and Ideas to Weather
Doing More with Less: Product Features, Strategies, and Ideas to WeatherDoing More with Less: Product Features, Strategies, and Ideas to Weather
Doing More with Less: Product Features, Strategies, and Ideas to Weather
 
Top 10 Reasons Why You Need a CTMS
Top 10 Reasons Why You Need a CTMSTop 10 Reasons Why You Need a CTMS
Top 10 Reasons Why You Need a CTMS
 
dcVAST 3rd Party Support
dcVAST 3rd Party SupportdcVAST 3rd Party Support
dcVAST 3rd Party Support
 

Similar a Backup and Disaster Recovery

NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016Dave Archer
 
TACOM 2014: Back To Basics
TACOM 2014: Back To BasicsTACOM 2014: Back To Basics
TACOM 2014: Back To BasicsJoel Cardella
 
Big Data: Setting Up the Big Data Lake
Big Data: Setting Up the Big Data LakeBig Data: Setting Up the Big Data Lake
Big Data: Setting Up the Big Data LakeCaserta
 
Big Data at a Gaming Company: Spil Games
Big Data at a Gaming Company: Spil GamesBig Data at a Gaming Company: Spil Games
Big Data at a Gaming Company: Spil GamesRob Winters
 
When the business needs intelligence (15Oct2014)
When the business needs intelligence   (15Oct2014)When the business needs intelligence   (15Oct2014)
When the business needs intelligence (15Oct2014)Dipti Patil
 
Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery
Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster RecoveryAlphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery
Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster RecoveryInternetwork Engineering (IE)
 
Building a Data Warehouse at Clover (PDF)
Building a Data Warehouse at Clover (PDF)Building a Data Warehouse at Clover (PDF)
Building a Data Warehouse at Clover (PDF)Otis Anderson
 
Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techiesBrenton Johnson
 
Group 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptxGroup 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptxsalutiontechnology
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples CounselingAtif Ghauri
 
The Data Lake and Getting Buisnesses the Big Data Insights They Need
The Data Lake and Getting Buisnesses the Big Data Insights They NeedThe Data Lake and Getting Buisnesses the Big Data Insights They Need
The Data Lake and Getting Buisnesses the Big Data Insights They NeedDunn Solutions Group
 
Disaster recovery shouldn’t run on late nights and coffee alone
Disaster recovery shouldn’t run on late nights and coffee aloneDisaster recovery shouldn’t run on late nights and coffee alone
Disaster recovery shouldn’t run on late nights and coffee aloneJosh Mazgelis
 
2018 4-23 The Changing Role of Today's CIO
2018 4-23 The Changing Role of Today's CIO2018 4-23 The Changing Role of Today's CIO
2018 4-23 The Changing Role of Today's CIORaffa Learning Community
 
Crouching Admin, Hidden User
Crouching Admin, Hidden UserCrouching Admin, Hidden User
Crouching Admin, Hidden UserJeff Stokes
 
Break down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesBreak down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesJeff Stokes
 
SQL Saturday STL 2016 Presentation
SQL Saturday STL 2016 PresentationSQL Saturday STL 2016 Presentation
SQL Saturday STL 2016 PresentationMatthew W. Bowers
 
What makes an effective data team?
What makes an effective data team?What makes an effective data team?
What makes an effective data team?Snowplow Analytics
 
Next Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity StrategyNext Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity StrategyNext Dimension Inc.
 

Similar a Backup and Disaster Recovery (20)

NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016
NCET Tech Bite | Ron Husey, Moving Your Business to the Cloud | Mar 2016
 
TACOM 2014: Back To Basics
TACOM 2014: Back To BasicsTACOM 2014: Back To Basics
TACOM 2014: Back To Basics
 
Big Data: Setting Up the Big Data Lake
Big Data: Setting Up the Big Data LakeBig Data: Setting Up the Big Data Lake
Big Data: Setting Up the Big Data Lake
 
Data Cleaning
Data CleaningData Cleaning
Data Cleaning
 
Big Data at a Gaming Company: Spil Games
Big Data at a Gaming Company: Spil GamesBig Data at a Gaming Company: Spil Games
Big Data at a Gaming Company: Spil Games
 
When the business needs intelligence (15Oct2014)
When the business needs intelligence   (15Oct2014)When the business needs intelligence   (15Oct2014)
When the business needs intelligence (15Oct2014)
 
Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery
Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster RecoveryAlphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery
Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery
 
Building a Data Warehouse at Clover (PDF)
Building a Data Warehouse at Clover (PDF)Building a Data Warehouse at Clover (PDF)
Building a Data Warehouse at Clover (PDF)
 
Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techies
 
Group 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptxGroup 2 Handling and Processing of big data.pptx
Group 2 Handling and Processing of big data.pptx
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
 
The Data Lake and Getting Buisnesses the Big Data Insights They Need
The Data Lake and Getting Buisnesses the Big Data Insights They NeedThe Data Lake and Getting Buisnesses the Big Data Insights They Need
The Data Lake and Getting Buisnesses the Big Data Insights They Need
 
2018 06-12 The Changing Role of the CIO
2018 06-12 The Changing Role of the CIO2018 06-12 The Changing Role of the CIO
2018 06-12 The Changing Role of the CIO
 
Disaster recovery shouldn’t run on late nights and coffee alone
Disaster recovery shouldn’t run on late nights and coffee aloneDisaster recovery shouldn’t run on late nights and coffee alone
Disaster recovery shouldn’t run on late nights and coffee alone
 
2018 4-23 The Changing Role of Today's CIO
2018 4-23 The Changing Role of Today's CIO2018 4-23 The Changing Role of Today's CIO
2018 4-23 The Changing Role of Today's CIO
 
Crouching Admin, Hidden User
Crouching Admin, Hidden UserCrouching Admin, Hidden User
Crouching Admin, Hidden User
 
Break down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesBreak down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff Stokes
 
SQL Saturday STL 2016 Presentation
SQL Saturday STL 2016 PresentationSQL Saturday STL 2016 Presentation
SQL Saturday STL 2016 Presentation
 
What makes an effective data team?
What makes an effective data team?What makes an effective data team?
What makes an effective data team?
 
Next Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity StrategyNext Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity Strategy
 

Último

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Último (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Backup and Disaster Recovery

  • 1. Backup and Disaster Recovery Advanced Business Solutions David Lacey
  • 2. Backup and Disaster Recovery 1. 2. 3. 4. 5. 6. 7. What is it? Why is it Important? What are the Basic Fundamentals? What is a “Good” Backup and Disaster Recovery Solution? Where Should YOU Start? Tips and Tricks! What does the Future Look Like?
  • 3. What is it? Backup The procedure of making extra copies of data in case the original is lost or damaged. • Usually used to recover individual files/folders • Example: Someone accidently deletes a file Disaster Recovery The processes, policies and procedures related to ensuring business continuity in the event of a natural or human-induced disaster. • Used during large scale interruptions of service where entire systems are unavailable • Example: Pipe burst in a server room and completely destroys all servers
  • 4. Why is it Important? Every business has important data that is essential to their operation: • • • • Email Data CRM Databases Accounting Information User Documents Every business has “threats” that are constantly putting that data at risk: • Employees • Angry employee • Untrained employee • Virus/Malware/Spyware • Cryptolocker • Environmental Problems • Power, Cooling, etc… • Bad Luck!
  • 5. Why is it Important? Proactive Prevention is ALWAYS better than Reactive Recovery
  • 6. What are the Basic Fundamentals? Backup and Disaster Recovery is like an onion…. Each layer of the onion is a layer of protection • More layers = better protection!
  • 7. What are the Basic Fundamentals? • • • • • • Variables Endpoints Applications Network Storage Servers Backups
  • 8. What are the Basic Fundamentals? • • • • • • Bad Data everywhere! Servers not secure! No backup power! Poor network design! Inconsistent backup process! Many single points of failure!
  • 9. What is a Good Backup/DR Solution? • • • • • • Good Consolidated data Servers in a secure environment Servers connected to a UPS Network is optimized Centralized backup Many layers of protection to avoid Single Points of Failure
  • 11. Where Should YOU Start? Know what you’re REQUIRED to do • Compliance Requirements • PCI, SAS70, HIPAA, Sarbanes-Oxley, etc… • Customer Expectations • Are your customers expecting a service/product from you? • Employee Expectations • Employee Payroll
  • 12. Where Should YOU Start? Know what you WANT to do • Identify Recovery Time Objective and Recovery Point Objective • Be realistic!!!
  • 13. Where Should YOU Start? Know what you NEED to do • Every company is different • If you have a lot of turnover, securing your data and ensuring that access to it is limited might be important • If you’re building has lots of power problems, a good UPS system might be important • Identify what your company needs to SURVIVE • Data is not the only important thing… • Think outside of the box – Printers, Fax Machines, Phone Systems
  • 14. Where Should YOU Start? Know what you’re ALREADY CAPABLE of doing • A lot of these pieces to the puzzle might already be in place • No reason to spend money unless you have to…
  • 15. Tips and Tricks! • Centralize your data • Keep your Anti-Virus software up to date • Keep your Workstation and Server Operating Systems up to date • Reduce the amount of physical access to your Mission Critical Infrastructure • Take advantage of the built in features that Microsoft Provides
  • 16. Tips and Tricks! • When buying hardware, build in as much redundancy as possible • Keep your existing equipment up to date • Compartmentalize your existing data • Maintain/monitor the backup process • Test the process at least once a year • Train your employees • Get involved!!
  • 17. What does the Future Look Like? • Bandwidth getting cheaper • Virtualization Technology will advance • Deduplication • CLOUD