Even if you have well maintained threat protection, threats evolve. If infected, can you recover your data?

It almost goes without saying that, whether you are a small company or large multinational, IT systems are a crucial part of your business.   This means that a Disaster Recovery plan, as part of a bigger Business Continuity approach, is not optional.  An effective backup policy, well implemented, is your business’s last line of defence against a significant number of threats, including cybercrime.

A carefully crafted backup solution, regularly tested, means the you minimise loss of data and are back up and running within the shortest period of time.  M9 has seen 10 of our customers attacked over the last 2-3 years.  This excludes the day to day threats that we deter as a matter of course.  Of those attacks that penetrated sophisticated threat protection tools, largely as a result of user action, the second ring of protection, based on containment, was effective in isolating the impact of the incident.  In an isolated case the attack was internal, malicious and the impact was more widespread.  In every case no data was lost and every customer was fully operational within 24 hours.  The vast majority of users were unaware of any disruption to service.

Our success in dealing with this was down to a holistic view of security of which an effective and appropriate backup solution was critical.

What is considered a disaster and what is disaster recovery?

A disaster is an unforeseen event that will disrupt your organisations everyday operations, whether natural disasters or manmade.

Disaster recovery is the process of resuming normal operations following a disaster by giving your organisation access to critical systems and data which your company cannot function without, like regaining access to servers, hardware, software and connectivity.