{"id":4256,"date":"2012-07-06T07:09:43","date_gmt":"2012-07-06T12:09:43","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=4256"},"modified":"2012-07-06T07:09:43","modified_gmt":"2012-07-06T12:09:43","slug":"5-important-practices-to-ensure-your-electronic-data-survives-a-disaster","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2012\/07\/5-important-practices-to-ensure-your-electronic-data-survives-a-disaster\/","title":{"rendered":"5 important practices to ensure your electronic data survives a disaster"},"content":{"rendered":"
We are just over a month into the 2012 hurricane season, but have you or your organisation established an IT disaster management and recovery plan?<\/em><\/p>\n <\/a>Without exception, our homes and workplaces can be subject to disasters, be they manmade or natural.\u00a0 This being 6 July, the Caribbean is well into the 2012 hurricane season, which runs from June to November. Most countries, from Grenada to the Bahamas in particular, tend to be anxious about weather systems, such as tropical waves, depressions, storms and full-blown hurricanes, that might occur by the end of November.<\/p>\n Although the aftermath of a disaster is always uncertain, typically, persons who make early preparations tend to better manage the recovery. Many disasters occur with little warning. With earthquakes, for example, there is virtually no notice, but on the other hand, we might be well aware of an approaching storm days in advance. Below are five important practices you could adopt when preparing your organisation\u2019s, or even your household\u2019s, IT disaster management and recovery plan.<\/p>\n Although the main focus of disaster management and recovery for IT, might be the equipment and data, there is critical information and documentation that will be essential when repairs and\/or restoration must be done. They include but would not be limited to:<\/p>\n It is crucial to make copies of critical data stored on all PCs, laptops, as well as file servers, web servers and any with other media where data vital to your organisation, business or household is stored. Ideally, images of all storage disks should be created, thus facilitating virtually seamless restoration should it be necessary. However, creating full copies of all existing storage media, does require ample storage, which must be considered and budgeted for. It is also important to note that backing up is most effective when done frequently, at least daily, again, in order facilitate seamless restoration and continuity.<\/p>\n While creating images of entire storage media (even networks) might be ideal, if that is not possible, at the very least, all user-generated or stored files, including the following, should be backed up:<\/p>\n Hence, in the event you have to re-install the Operating System (OS) and software applications, your user files could be copied back onto the device, virtually restoring it to its earlier state. However, again, it is important to have the latest version of your files backed up, and with prudent discipline, back them up frequently.<\/p>\n It is a good practice to ensure that you or your organisation have copies of all software that has been installed. This would include the OS and all applications. As stated in the first point, it is important to safely store all activation or authentication keys, as they will be needed when the software is being reinstalled or updated.<\/p>\n On a separate note, there has been a growing trend to eliminate optical disk drives from computing devices, especially portable devices. As result, applications must be downloaded, and even installed, directly from the Internet. For those that are downloaded in their entirety, they can be saved for future use.\u00a0 However, for software that is installed over the Internet, it would be advisable to maintain a current list of those applications, so that they can be re-installed when the requisite Internet connectivity is available.<\/p>\n Coupled with the second point on backing up our data, all copies should not reside at the same premises. If that location experiences a disaster, then all copies of the data could be compromised. Hence it is strongly recommended that a secondary location be identified.<\/p>\n The data stored in a tangible media (e.g. external hard drive, CD\/DVD) can be physically transported to that secondary location, or alternatively, it is backed up directly to a remote location. Generally, it is considered good practice to implement the two options, as they act as a fail-safe should one of them be unavailable or has been compromised.<\/p>\n Although every effort ought to be made to safeguard data, loss or damage to equipment is costly and will delay recovery. Hence consideration should also be given to preserving those devices, and should they be damaged, options that support restoration.<\/a><\/p>\n <\/p>\n Image credits: kakela<\/a>, flickr \/\u00a0marnanel<\/a>, flickr \/\u00a0snowpeak<\/a>, flickr\u00a0<\/em><\/p>\n ____________<\/p>\n","protected":false},"excerpt":{"rendered":" We are just over a month into the 2012 hurricane season, but have you or your organisation established an IT disaster management and recovery plan? Without exception, our homes and […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[82,17,27,11,33],"tags":[71,56,38,39,34,50],"class_list":["post-4256","post","type-post","status-publish","format-standard","hentry","category-business","category-caribbean","category-computing","category-ict-tech","category-lists","tag-businesses","tag-conservation","tag-data-protection","tag-equipment-security","tag-lists-2","tag-productivity","et-doesnt-have-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-16E","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/4256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=4256"}],"version-history":[{"count":5,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/4256\/revisions"}],"predecessor-version":[{"id":4264,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/4256\/revisions\/4264"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=4256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=4256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=4256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}1. Collect and protect critical documentation<\/h3>\n
\n
2.\u00a0 Back up data<\/h3>\n
\n
3.\u00a0 Have copies of all software<\/h3>\n
4.\u00a0 Store data in a secondary location<\/h3>\n
5.\u00a0 Ensure adequate provisions are made to protect equipment<\/h3>\n
\n