Page 64 - TNR-V02N1
P. 64

There are ample reasons as to why assessing the criticality   Assessing vulnerability of each process allows
        of your processes will aid in developing a DR solution   the prediction of potential threats to the
        suitable to the business. Firstly, defining the mission critical   overall continuity of a business and increases
        processes will allow your DR solution to assign priorities   the effectiveness of a DR solution due to these
        for the recovery process and get the business back online   vulnerabilities being built into the plan. Threats are
        while staying within your RTO and RPO to ensure         typically broken down into two main categories,
        impacts are staying within the parameters of minimal    internal or external.
        acceptable loss. Second, identifying dependencies within
        processes will also ensure proper recovery order. As a   External threats are typically natural or man-made
        result, you will be able to appropriately assign priorities   disasters such as storms and earthquakes and are
        to dependent processes so they can function properly in   an indirect threat to the BCP (business continuity
        the event of a disaster. Cloud Endure research shows that   plan). While external options usually don’t specifically
        77% of surveyed companies had an availability goal of 99.9%   target a business, they still have the capability to cause
        which equates to approximately 8.7 hours of downtime    a significant disruption. Internal threats are events
        annually.                                               that don’t happen on a large scale and occur within a
                                                                business, such as hardware failure and file corruption.
        Ensuring the recovery of information and processes is done
        as efficiently as possible due to setting these priorities will   Data from the Strategic Research Corporation
        drastically increase the effectiveness of the DR solution   shows that approximately 44% of disruptions are
        you have in place, thus minimizing down-time. Failure to do   caused by hardware failure, making it the leading
        so runs the risk implementing a recovery solution that will   cause of disruption in business continuity. A complete
        recover non-crucial data before critical data, thus delaying   risk assessment ensures the vulnerabilities of the
        the recovery of the business, and in turn increasing the loss   processes are being appropriately planned for within
        of data and financial damages of a possible disaster.   your solution.






















































          64              Return to TOC                             True North RESILIENCE magazine - Spring 2023
   59   60   61   62   63   64   65   66   67   68   69