Disaster Recovery Audits: Free Webinar Addresses What's MissingDisaster Recovery Audits: Free Webinar Addresses What's Missing
Disaster recovery specialist Continuity Software is hosting a free webinar today to address gaps in typical DR audits. The biggest gap for many small and midsize businesses, of course, is a DR audit, or plan itself.
January 15, 2009

Disaster recovery specialist Continuity Software is hosting a free webinar today to address gaps in typical DR audits. The biggest gap for many small and midsize businesses, of course, is a DR audit, or plan itself.Continuity Software. which makes automated disaster recovery(DR)testing software, is hosting a free webinar today at 2:00 pm EST. The topic: why manual DR audits don't reveal all the gaps in your DR plan. (Register for the webinar here.)
While the webinar, presented by Continuity's CTO, Doron Pinhas, is undoubtedly worth checking out, the topic also provides a good opportunity to consider your own DR plan -- or lack of one.
To that end, a few simple questions. Think of it as a pre-DR audit audit:
How solid is your business's disaster recovery plan?
Does the plan exist in writing, or only in the heads of a few key personnel?
Who's responnsible for executing the plan in the event of a natural disaster, fire, catastrophic data loss? What happens if that person is rendered unavailable by the catastrophe?
Where are your backups stored and how safe are they in the event of a regional disaster?
How fast can you get your business back up and running, even at minimum levels in the event that your core data functions (hardware/software/data) are destroyed or rendered inaccessible? And above all (first things last, as it were):
Do you even have a formal disaster recovery plan for your business and its core functions?
You can't audit or test what you don't have.
Check out Continuity Software's DR audit webinar to get a sense of what a good audit/test will reveal.
And then make sure you've got a plan, formal, written, tested and re-tested that's worth auditing.
Your business could depend on it.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023