By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Start Your Business Magazine
  • Store
    Merchandise
    Subscribe
  • Features

    Grow, expand and leverage your business..

    Grow your start up business with our experts and industry insiders…

    Get Started

    Quick Links

    • Agenda
    • Business Books
    • Marketing
    • Technology
    • Wellbeing
    • Finance
    Reading: The Importance of Architecting a DR Plan to Enable Application Recovery in the Cloud

    Our Newsletters

    Our website stores cookies on your computer. They allow us to remember you and help personalise your experience with our site..

    Read our privacy policy for more information.
  • Book
  • Trending
    agenda

    5 ways to reduce the hidden mental load of business travel

    According to recent research, 55 percent of business travellers believe frequent travel can lead…

    agenda

    Why you shouldn’t be giving out your personal number for work

    Professionals in the UK are being warned about the risks associated with…

    blog

    Workforce planning expert shares tips for peak season 

    The end of the year is fast approaching, with Black Friday and…

  • Topics

    Topics

    • Agenda
    • Blogs
    • Book Review
    • Business Advice
    • eCommerce
    • SME Update
    Reading: The Importance of Architecting a DR Plan to Enable Application Recovery in the Cloud
    • Events
    • Business Experts
    • Featured
    • Franchise
    • Growing Business
    • Health
    Reading: The Importance of Architecting a DR Plan to Enable Application Recovery in the Cloud
    • Finance
    • Franchise Experts
    • How To
    • Interviews
    • Just for fun
    Reading: The Importance of Architecting a DR Plan to Enable Application Recovery in the Cloud
    • Lifestyle
    • Making money
    • Manufacturing
    • Marketing
    • Money
    • Property
    Reading: The Importance of Architecting a DR Plan to Enable Application Recovery in the Cloud
    • Starting Up
    • Taxation
    • Technology
    • Wellbeing
    • Women in Business
    Reading: The Importance of Architecting a DR Plan to Enable Application Recovery in the Cloud
Reading: The Importance of Architecting a DR Plan to Enable Application Recovery in the Cloud
Connect
Start Your Business MagazineStart Your Business Magazine
Aa
  • Magazine
  • SEO – Backlinks
  • Book: Start Your Business
Search
  • Agenda
  • Book Review
  • Blogs
  • Finance
  • Growing Business
  • How To
  • Interviews
  • Marketing
  • SME Update
  • Starting Up
  • Technology
  • Wellness
  • Contact
Have an existing account? Sign In
Follow US
  • RSS
  • Terms And Conditions
  • Privacy Policy
  • Contact
  • Licensing
  • SEO
Copyright © 2014-2023 Ruby Theme Ltd. All Rights Reserved.

The Importance of Architecting a DR Plan to Enable Application Recovery in the Cloud

Start Your Business
Technology
Share
9 Min Read

Today being impacted by a cybersecurity incident is almost inevitable and it is not a question of if, or even when, but how often an organisation will be attacked. According to Veeam’s 2023 Data Protection Trends Report, which surveyed 4,200 business and IT leaders on their IT and data protection strategies and plans, 85% of organisations said they have had at least one ransomware attack in the last 12 months and 79% of respondents said they have a protection gap. Additionally, according to the UK’s Information Commissioner’s Office, one in three data breaches in 2022 were caused by ransomware. Therefore, as well as considering preventative cybersecurity measures, companies also need to think about whether and how they will recover from a malicious attack. How quickly they can recover their systems and applications and the cost of recovery to the business.

Do you have a plan?

A fundamental question every organisation should ask themselves is: Would we survive a cybersecurity attack?  Along with: Do we know our level of preparedness; do we know how to recover our critical applications; do we understand the risks the organisation faces and do we regularly test our recovery plans?

Here at 11:11 Systems, we know that recovering from a data-compromising cyberattack requires planning, investment, capabilities, procedures, and so much more. Additionally, we understand how important it is for organisations to recognise the difference between traditional disaster recovery, in response to incidents such as wildfires, earthquakes, and extreme weather conditions, and compromised data recovery in the event of a cybersecurity incident.

Unfortunately, as the statistics above highlight, the latter is the more likely and more impactful disaster recovery event and unfortunately an interruption to operations caused by a cyberattack can cost businesses an enormous amount, financially and reputationally.

Cyber and back-up teams must be aligned

Another key finding from the Veeam research was that the vast majority of organisations surveyed had a hybrid environment, with an even split across architectures and workloads in the cloud, in virtual set ups, and on-premises. The key takeaway here is that modern data protection solutions must provide equitable capabilities across all architectures (physical, virtual, and cloud). In addition, organisations should plan for workloads moving across clouds and even back on-premises, and data protection strategies should accommodate for that fluidity. This means cyber and back-up teams must be aligned, and back-up must be part of an organisation’s wider cybersecurity strategy and integrate with modern systems management.

Interestingly, the research went on to highlight that 37% of victim organisations of a ransomware attack had a no pay policy, but regardless of their policy 80% of companies paid the ransom anyway. More concerningly, 15 to 20% of those who paid still couldn’t recover their data.

So, what should an organisation do to ensure that it can recover important applications?

In our cloud-centric world, organisations are creating an incredible amount of applications and data to drive their operations. IT teams use complex software programmes and applications that rely on other applications, external services, distributed systems, and various data sources. Application recovery planning helps organisations quickly recover critical data, applications, or systems in case of an unexpected outage or a cyber incident.

Application recovery requires careful planning

Determining how to protect and recover an application can often be easier than determining how quickly your business needs that application recovered. Establishing the correct recovery point objective (RPO) targets at an application level is a critical part of DR planning.

It’s important to understand best practices for building an application recovery plan for both simple and complex applications. Especially with dependent external software programmes and services.

The key to this is understanding how different components of the application interact with each other. This involves identifying all the external services and dependencies that the application relies on and understanding how they work together.

The organisation needs to think about compatibility and verification

In other words what technology should it leverage and where is the best place to bring applications back up and running from a compatibility perspective? Key questions to consider here are:

  • Is my hypervisor and versioning compatible with the cloud solution?
  • Is my virtual guest hardware also compatible
  • How can I ensure that the architecture of my VMs is considered and compatible with the cloud

When considering connectivity, questions to think about include whether you have enough bandwidth to leverage cloud services as well as how to select the best cloud location for a positive and seamless end user experience.  Likewise, how can you validate that connectivity will allow the organisation to meet its RPO objectives?

In a complex hybrid environment with many different components, it is also important to consider application dependency and to map out how applications work, how they communicate, and which are dependent on each other.  To tackle these challenges, it is essential to understand the application architecture and the dependencies between its different components. This may involve conducting a detailed application analysis and identifying all external software services, systems, and dependencies.

This type of exercise should be undertaken on a continuous basis because the situation is dynamic and can change very quickly.  A deep understanding of application and infrastructure is critical to successful application recovery, as is understanding end user access and ensuring a seamless user experience.

So, what are the key steps an organisation should take to recover applications from an attack?

  1. Identify and isolate the affected systems: As soon as the attack gets detected, the first step is to identify the affected systems and isolate them from the rest of the network to prevent further spread of the infection.
  1. Assess the damage: The next step is to assess the extent of the damage caused by the attack, including the loss of data and the compromise of critical systems. This assessment will help determine the application recovery strategy.
  1. Restore from back-ups: If you have backups available, you can use them to restore the system to its previous state. To ensure data integrity and system functionality, you should thoroughly test the recovery process.
  1. Rebuild affected systems: If backups are unavailable or the data gets corrupted, you must rebuild the affected systems from scratch. This process involves rebuilding the operating system, applications, and data, which can be time-consuming and challenging.
  1. Improve security measures: Once the system has been restored or rebuilt, it is essential to improve the security posture to prevent attacks in the future.

To mitigate these risks, it is critical to have a robust application recovery DR plan in place that includes regular back-ups, testing, and security measures to prevent such attacks. Having a clear communication plan is vital to inform stakeholders of the situation and the recovery. As the statistics in the Veeam Data Protection Trends report highlight, having a DR plan for application recovery in the cloud isn’t an option —it’s a must.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Start Your Business November 3, 2023
Share this Article
Twitter LinkedIn Reddit Email Copy Link
  • RSS
  • Terms And Conditions
  • Privacy Policy
  • Contact
  • Licensing
  • SEO

Get the latest from us delivered straight to your inbox

Start Your Business Magazine: The Ultimate Business Start Up Guide provides information advice and guidance for entrepreneurs and new business start ups. Get the latest from us delivered directly to your inbox.

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site..

Read our privacy policy for more information.

Copyright 2023 Gambit Interactive Media Limited – All Rights Reserved.

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. Cookies are used for ads personalisation We do this to improve browsing experience as well as show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?