However, there are other solutions available for small to medium sized businesses with critical business applications and data to protect.
There are vendors that can provide “hot sites” for IT disaster recovery.
These sites are fully configured data centers with commonly used hardware and software products.
These vendors can also provide data filtering and detection of malware threats, which enhance cyber security.
Businesses should develop an IT disaster recovery plan.
The impact of data loss or corruption from hardware failure, human error, hacking or malware could be significant.
A plan for data backup and restoration of electronic information is essential.Without one component of the “system,” the system may not run.Therefore, recovery strategies should be developed to anticipate the loss of one or more of the following system components: Some business applications cannot tolerate any downtime.Electronic data interchange (EDI) is used to transmit data including orders and payments from one company to another.Servers process information and store large amounts of data.The recovery time for an IT resource should match the recovery time objective for the business function or process that depends on the IT resource.Information technology systems require hardware, software, data and connectivity.Hardware at an alternate facility can be configured to run similar hardware and software applications when needed.Assuming data is backed up off-site or data is mirrored between the two sites, data can be restored at the alternate site and processing can continue.They utilize dual data centers capable of handling all data processing needs, which run in parallel with data mirrored or synchronized between the two centers.This is a very expensive solution that only larger companies can afford.