SlideShare ist ein Scribd-Unternehmen logo
1 von 45
IT SECURIT Y FOR LIBRARIES
PART 3: DISASTER RECOVERY
B R I A N P I C H M A N | E V O LV E P R O J E C T
@ B P I C H M A N O N T W I T T E R !
IDENTIFYING THREATS
• “Act of God”
– Tornado, Flood, Fire
• ”Act of Evil”
– Break-ins, Hacking, Physical Damage, Viruses
• “Act of Error”
– Accidental Deletions, Hardware Failure, Software Glitches
• Loss of Services (could be caused by above)
– Internet, Power, Heating/Cooling, Phone, Building Issues
RECOVERABLE RISKS
• Risks with Provided Services:
– Internet
– Phone
– Power
• Risks with Created Data
– Corruption
– Loss
• Risk with Owned Systems
– Errors or Corruption
– Failure or Loss
A GOOD RECOVERY PLAN INCLUDES
• Monitoring
– Systems need to be actively monitored
• Recoverable Backups and Systems
– Systems need to have data backed up
• Redundancy
– Systems need to be redundant to mitigate risk of device or service failure, having failover
devices and services is important to ensure uptime.
• TESTING
– I’m going to say this a few times.
COST OF DOWNTIME
• RESEARCH HIGHLIGHTS:
• Data loss and downtime costs enterprises $1.7 trillion1
• Companies on average lost 400%2 more data over the last two years (equivalent to 24
million emails3 each)
• 71% of IT professionals are not fully confident in their ability to recover information
following an incident
• 51% of organizations lack a disaster recovery plan for emerging workloads4; just 6% have
plans for big data, hybrid cloud and mobile
• Only 2% of organizations are data protection “Leaders”; 11% “Adopters”; 87% are behind
the curve
• China, Hong Kong, The Netherlands, Singapore and the US lead protection maturity;
Switzerland, Turkey and the UAE lag behind
• Companies with three or more vendors lost three times as much data as those with a
single-vendor strategy
https://www.emc.com/about/news/press/2014/20141202-
A DISASTER PLAN IS ABOUT
• Ensuring Redundancy and Recovery
• Planning and Preparation:
– Risk Management
– Risk Assessment
– Risk Mitigation
– Business Continuity
• If a Disaster Occurs:
– Response
– Relief
– Recovery
– Restoration
SERVICES: INTERNET AND PHONE
• Internet is a core component for day to day operations
– Connecting to an ILS
• What makes up your connection to the outside world?
• ISP = Internet Service Provider
ISP Modem Firewall Switches
Servers
Computers
ISPs
Modem Firewall Switches
Servers
Computers
Modem Most latest gen firewalls are able to
handle two internet connections and
“round-robin” and do “failover”
Usually pick two different mediums:
Cable
Telephone
Satellite
…
Having two different internet connections across two
different modems will help mitigate risk of a Service
Provider Failure
Other considerations include hardware failure and
redundancy. Having a spare firewall (or using two
firewalls to load balance) can help mitigate risk.
SERVICES: POWER
• Having Battery Power Supplies / UPS
for your server and network
equipment can help ensure uptime
– Time for Generators to kick on
– Gives you enough time to power down
the machines versus an abrupt power
loss.
• Have generators if your business
requires you to have power in your
building consistently.
– If you are considered a shelter or a
heating place it should be a
requirement.
CHOOSING A BATTERY BACKUP-
CONSUMPTION
• How much power does your devices
consume?
– You can do the math using server tools
that measure consumption of power at
peak times.
– You can also get a watt meter and test
average consumption over an
extended period of time.
– Some fancy rack mounted power strips
have power consumption built in.
CHOOSING A BATTERY BACKUP-
LOAD TIME
• You will want to make sure your UPS
can power your network long enough
to get what you need to get done (in
terms of powering down) or length of
time for the generator to kick in.
CHOOSING A BATTERY BACKUP-
FEATURES
• Power supplies should be plugged into
your network
– To give you real time reporting of load
(so you can add more UPSs if need)
– To tell you battery health
– Sending alerts at thresholds
• Power Failure
• Over usage
• Battery is almost drained
DATA IS EXPENSIVE
• Financial Records for 7 years
– SOX ( Sarbanes–Oxley Act of 2002 )
• Cost of a “data record”
– On average, the cost of such a record containing healthcare information is $363 (and also
employee records are known to be this much if including social information
– At the end of May 2015, the Ponemon Institute released its annual “Cost of Data Breach
Study.” Researchers estimated that the average cost of each lost or stolen record containing
sensitive and confidential information was $154.
– Verizon has the concept from a per-record perspective, claiming an average cost of just 58
cents for each lost or stolen file.
WHAT CAN HAPPEN TO MY DATA?
• It can be corrupted!
– Someone makes changes to a file. Accidental deletion, purposeful manipulation, script goes
rouge.
– Can impact system performance
• It can be lost!
– Server goes down, disappears, etc.
– Spreadsheets, employee files, payroll, flyers, data about events
– Website Data, Catalog Data, Hosted Applications…gone!
– Email!
• Hardware failure
WAYS TO BACK UP
CALENDAR
• Monthly Full Back Up
• Hourly/Daily Incremental Back Ups
• Weekly Differential
• Back Ups should also be stored off-site.
– Either Weekly Differentials and/or Monthly Back Ups
– This fixes the “what if the place was taken out a storm”
BACK UP MEDIUMS
Type Pros Cons
External
Drives*
Inexpensive
Fastest media for backups
Easily portable
Readable on variety of computers
More fragile than other media
Ruggedized versions available (pricey)
May require special power supply
NAS
(Network
Area
Storage)*
Backups are more automated and
controlled.
More Security.
Can be remotely monitored with ease.
Can be more expensive depending on
automation.
Requires setup and network configurations.
Bandwidth
May require the NAS OS to read if NAS
Hardware Failure
Tape
Drives
Inexpensive
Durable
Easily portable
Reliable
Expensive
Compatibility issues
May require additional software
SLOW
Cloud Off Premise by another group. Expensive and less control of your “data”
Outdated Media:
USB Flash Drives
Optical Disks
*Solid State Drives would be more expensive but less risk of hardware failure (no mechanical parts)
DEVICES!
• “Personal Cloud Storage” devices
– Western Digital EX series
DEVICES!
• “Personal Cloud Storage” devices
– QNAP
DEVICES!
• Unitrends
– Enterprise Level Back Up
SYMANTEC BACKUP EXEC
ACRONIS BACK UP
REPLICATION
• You can also replicate your servers (with all of its data) to multiple locations.
– This isn’t the best for protecting of “corrupted” data
• IE Crypto Locker
– However this offers redundancy!
• Replication is running the exact same server environment on different:
– Hardware (preferred)
– VM (less preferred)
https://cloud.google.com/sql/docs/mysql/replication/
http://www.recode.net/2017/3/2/14792636/amazon-aws-internet-outage-cause-human-error-incorrect-
DATA CENTERS
• Host your environment in someone
else’s data center
– Latisys
– RackSpace
• You rely on them to provide
redundancy and security
– However, if your network is down, you
have no way to connect to the data
center.
APPLICATION HOSTING AND BACK UP
• Two Layers
– Server Front End: Runs the “pretty” stuff like windows, graphics, and public facing display.
– Server Back End: Usually a “database”.
• It is harder to replicate databases, so most people will replicate front ends (for load
balancing) and back up the databases.
HIGH AVAILABILITY
MONITORING IS IMPORTANT
• Monitor your servers to prevent issues before they happen. Things to monitor for:
– Network Drops (means it can be device failure or network issue)
– Temperature of Devices (prevent overheating)
– Server Processes (if a server is running to high for too long something could be wrong)
– Storage Space (running out of space can corrupt an entire system)
– Memory Usage
– Database Errors
NIAGOS
PINGDOM
TEST YOUR PLAN
• Test Your Back Ups
– Do a recovery on a different server to
ensure accuracy and time how long it
takes to recover
• Test Your Redundancy
– Remove a network, server, and
determine if fail over occurs.
– Time these!
• Test Test Test.
DIFFERENCES BETWEEN…
• An Emergency Response Plan
– What to do immediately if an incident occurs.
• Business Continuity Plan
– Address the immediate response AND short and long term continued performance of
essential business functions
• While you make your disaster plan, you should work to mitigate as many risks, and
then plan for the risks you couldn’t mitigate.
LAYOUT OF A “DISASTER PLAN”
TO RECAP
• Risk Assessments to determine what the risks are and how to handle them.
– Using the risk matrix; determine how much effort will be needed (and at what costs)
• Plans in place if there is some sort of failure.
– Using the options presented, what makes the most sense to you?
– Who are the contacts?
• Test.
– Most important part of the entire disaster recovery process.
LINKS!
https://view.officeapps.live.co
m/op/view.aspx?src=http://cd
n.ttgtmedia.com/searchDisast
erRecovery/downloads/Search
DisasterRecovery_IT_DisasterR
ecoveryTemplate.doc
STORIES
• Crypto Locker:
– Brought a business to a halt for
three days.
– Email Access Missing Back Ups
• Server Failure on Accounting Server
– Was right before tax season.
• SAN Failure
– Brought entire business down when
EMC drives failed and there was no
alerting set up (on a RAID).
QUESTIONS
• Brian Pichman
• bpichman@evolveproject.or
g
• Twitter: @bpichman

Weitere ähnliche Inhalte

Was ist angesagt?

IT Geek Week 2016 - Introduction To Cloud Computing
IT Geek Week 2016 - Introduction To Cloud ComputingIT Geek Week 2016 - Introduction To Cloud Computing
IT Geek Week 2016 - Introduction To Cloud ComputingHaim Ateya
 
Cloud computing in a nutshell
Cloud computing in a nutshellCloud computing in a nutshell
Cloud computing in a nutshellMehmet Gonullu
 
Security as an Enabler – Cloud Security
Security as an Enabler – Cloud SecuritySecurity as an Enabler – Cloud Security
Security as an Enabler – Cloud SecurityTom Laszewski
 
A Journey To The Cloud - An Introduction To Cloud Computing
A Journey To The Cloud - An Introduction To Cloud Computing A Journey To The Cloud - An Introduction To Cloud Computing
A Journey To The Cloud - An Introduction To Cloud Computing Haim Ateya
 
Building Bulletproof Infrastructure on AWS
Building Bulletproof Infrastructure on AWSBuilding Bulletproof Infrastructure on AWS
Building Bulletproof Infrastructure on AWS2nd Watch
 
Big data application using hadoop in cloud [Smart Refrigerator]
Big data application using hadoop in cloud [Smart Refrigerator] Big data application using hadoop in cloud [Smart Refrigerator]
Big data application using hadoop in cloud [Smart Refrigerator] Pushkar Bhandari
 
Backup on the cloud 10.1.13
Backup on the cloud 10.1.13Backup on the cloud 10.1.13
Backup on the cloud 10.1.132nd Watch
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionTom Laszewski
 
AWS Summit Auckland - Running your Enterprise Windows Workload on AWS
AWS Summit Auckland  - Running your Enterprise Windows Workload on AWSAWS Summit Auckland  - Running your Enterprise Windows Workload on AWS
AWS Summit Auckland - Running your Enterprise Windows Workload on AWSAmazon Web Services
 
Secure Hadoop as a Service - Session Sponsored by Intel
Secure Hadoop as a Service - Session Sponsored by IntelSecure Hadoop as a Service - Session Sponsored by Intel
Secure Hadoop as a Service - Session Sponsored by IntelAmazon Web Services
 
AWS re:Invent 2016: Bring Microsoft Applications to AWS to Save Money and Sta...
AWS re:Invent 2016: Bring Microsoft Applications to AWS to Save Money and Sta...AWS re:Invent 2016: Bring Microsoft Applications to AWS to Save Money and Sta...
AWS re:Invent 2016: Bring Microsoft Applications to AWS to Save Money and Sta...Amazon Web Services
 
Enterprise Cloud Architecture Best Practices
Enterprise Cloud Architecture Best PracticesEnterprise Cloud Architecture Best Practices
Enterprise Cloud Architecture Best PracticesDavid Veksler
 
Cloud Architecture best practices
Cloud Architecture best practicesCloud Architecture best practices
Cloud Architecture best practicesOmid Vahdaty
 

Was ist angesagt? (17)

IT Geek Week 2016 - Introduction To Cloud Computing
IT Geek Week 2016 - Introduction To Cloud ComputingIT Geek Week 2016 - Introduction To Cloud Computing
IT Geek Week 2016 - Introduction To Cloud Computing
 
Cloud computing in a nutshell
Cloud computing in a nutshellCloud computing in a nutshell
Cloud computing in a nutshell
 
Security as an Enabler – Cloud Security
Security as an Enabler – Cloud SecuritySecurity as an Enabler – Cloud Security
Security as an Enabler – Cloud Security
 
A Journey To The Cloud - An Introduction To Cloud Computing
A Journey To The Cloud - An Introduction To Cloud Computing A Journey To The Cloud - An Introduction To Cloud Computing
A Journey To The Cloud - An Introduction To Cloud Computing
 
Building Bulletproof Infrastructure on AWS
Building Bulletproof Infrastructure on AWSBuilding Bulletproof Infrastructure on AWS
Building Bulletproof Infrastructure on AWS
 
Big data application using hadoop in cloud [Smart Refrigerator]
Big data application using hadoop in cloud [Smart Refrigerator] Big data application using hadoop in cloud [Smart Refrigerator]
Big data application using hadoop in cloud [Smart Refrigerator]
 
AWS Lambda
AWS LambdaAWS Lambda
AWS Lambda
 
Backup on the cloud 10.1.13
Backup on the cloud 10.1.13Backup on the cloud 10.1.13
Backup on the cloud 10.1.13
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps session
 
Enterprise Journey to the Cloud
Enterprise Journey to the CloudEnterprise Journey to the Cloud
Enterprise Journey to the Cloud
 
AWS Summit Auckland - Running your Enterprise Windows Workload on AWS
AWS Summit Auckland  - Running your Enterprise Windows Workload on AWSAWS Summit Auckland  - Running your Enterprise Windows Workload on AWS
AWS Summit Auckland - Running your Enterprise Windows Workload on AWS
 
Secure Hadoop as a Service - Session Sponsored by Intel
Secure Hadoop as a Service - Session Sponsored by IntelSecure Hadoop as a Service - Session Sponsored by Intel
Secure Hadoop as a Service - Session Sponsored by Intel
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
Cloud1 Computing 01
Cloud1 Computing 01Cloud1 Computing 01
Cloud1 Computing 01
 
AWS re:Invent 2016: Bring Microsoft Applications to AWS to Save Money and Sta...
AWS re:Invent 2016: Bring Microsoft Applications to AWS to Save Money and Sta...AWS re:Invent 2016: Bring Microsoft Applications to AWS to Save Money and Sta...
AWS re:Invent 2016: Bring Microsoft Applications to AWS to Save Money and Sta...
 
Enterprise Cloud Architecture Best Practices
Enterprise Cloud Architecture Best PracticesEnterprise Cloud Architecture Best Practices
Enterprise Cloud Architecture Best Practices
 
Cloud Architecture best practices
Cloud Architecture best practicesCloud Architecture best practices
Cloud Architecture best practices
 

Andere mochten auch

Big Talk From Small Libraries 2017 - Digitize It Yourself: A Method of In-Hou...
Big Talk From Small Libraries 2017 - Digitize It Yourself: A Method of In-Hou...Big Talk From Small Libraries 2017 - Digitize It Yourself: A Method of In-Hou...
Big Talk From Small Libraries 2017 - Digitize It Yourself: A Method of In-Hou...Nebraska Library Commission
 
Empowering Global Research in Biodiversity: The Biodiversity Heritage Library
Empowering Global Research in Biodiversity: The Biodiversity Heritage LibraryEmpowering Global Research in Biodiversity: The Biodiversity Heritage Library
Empowering Global Research in Biodiversity: The Biodiversity Heritage LibraryMartin Kalfatovic
 
Wikipedia and Libraries: what’s in it for you?
Wikipedia and Libraries: what’s in it for you?Wikipedia and Libraries: what’s in it for you?
Wikipedia and Libraries: what’s in it for you?OCLC
 
LIBER Webinar: 23 Things About Research Data Management
LIBER Webinar: 23 Things About Research Data ManagementLIBER Webinar: 23 Things About Research Data Management
LIBER Webinar: 23 Things About Research Data ManagementLIBER Europe
 
LIBER Webinar: Are the FAIR Data Principles really fair?
LIBER Webinar: Are the FAIR Data Principles really fair?LIBER Webinar: Are the FAIR Data Principles really fair?
LIBER Webinar: Are the FAIR Data Principles really fair?LIBER Europe
 
What Do Users Want from Our Website?
What Do Users Want from Our Website?What Do Users Want from Our Website?
What Do Users Want from Our Website?Suhui Ho
 
Uses of Library Collections
Uses of Library CollectionsUses of Library Collections
Uses of Library Collectionsbenosteen
 
Europeana Network Association Members Council Meeting, The Hague by Sergiu Go...
Europeana Network Association Members Council Meeting, The Hague by Sergiu Go...Europeana Network Association Members Council Meeting, The Hague by Sergiu Go...
Europeana Network Association Members Council Meeting, The Hague by Sergiu Go...Europeana
 
Moving from Niche to Mainstream: the Evolution of the UCD Digital Library
Moving from Niche to Mainstream: the Evolution of the UCD Digital LibraryMoving from Niche to Mainstream: the Evolution of the UCD Digital Library
Moving from Niche to Mainstream: the Evolution of the UCD Digital LibraryUCD Library
 
MongoDB NoSQL database a deep dive -MyWhitePaper
MongoDB  NoSQL database a deep dive -MyWhitePaperMongoDB  NoSQL database a deep dive -MyWhitePaper
MongoDB NoSQL database a deep dive -MyWhitePaperRajesh Kumar
 
Comparing 30 MongoDB operations with Oracle SQL statements
Comparing 30 MongoDB operations with Oracle SQL statementsComparing 30 MongoDB operations with Oracle SQL statements
Comparing 30 MongoDB operations with Oracle SQL statementsLucas Jellema
 
Europeana Tech - IIIF in Action
Europeana Tech - IIIF in ActionEuropeana Tech - IIIF in Action
Europeana Tech - IIIF in ActionGlen Robson
 
Customer Experience - On the Web, In the Library, In the Community
Customer Experience - On the Web, In the Library, In the CommunityCustomer Experience - On the Web, In the Library, In the Community
Customer Experience - On the Web, In the Library, In the CommunityDavid King
 
BL Labs CityLIS Talk
BL Labs CityLIS TalkBL Labs CityLIS Talk
BL Labs CityLIS Talklabsbl
 
Semantic annotation of digital libraries. A model for science communication
Semantic annotation of digital libraries. A model for science communicationSemantic annotation of digital libraries. A model for science communication
Semantic annotation of digital libraries. A model for science communicationFrancesca Di Donato
 
DAYOR: Digital Cultural Heritage Research Network
DAYOR: Digital Cultural Heritage Research NetworkDAYOR: Digital Cultural Heritage Research Network
DAYOR: Digital Cultural Heritage Research NetworkAndrea Wallace
 
NCompass Live: Project Outcome: Measuring the True Impact of Public Libraries
NCompass Live: Project Outcome: Measuring the True Impact of Public LibrariesNCompass Live: Project Outcome: Measuring the True Impact of Public Libraries
NCompass Live: Project Outcome: Measuring the True Impact of Public LibrariesNebraska Library Commission
 

Andere mochten auch (20)

Build Features Not Apps
Build Features Not AppsBuild Features Not Apps
Build Features Not Apps
 
Big Talk From Small Libraries 2017 - Digitize It Yourself: A Method of In-Hou...
Big Talk From Small Libraries 2017 - Digitize It Yourself: A Method of In-Hou...Big Talk From Small Libraries 2017 - Digitize It Yourself: A Method of In-Hou...
Big Talk From Small Libraries 2017 - Digitize It Yourself: A Method of In-Hou...
 
Empowering Global Research in Biodiversity: The Biodiversity Heritage Library
Empowering Global Research in Biodiversity: The Biodiversity Heritage LibraryEmpowering Global Research in Biodiversity: The Biodiversity Heritage Library
Empowering Global Research in Biodiversity: The Biodiversity Heritage Library
 
Wikipedia and Libraries: what’s in it for you?
Wikipedia and Libraries: what’s in it for you?Wikipedia and Libraries: what’s in it for you?
Wikipedia and Libraries: what’s in it for you?
 
LIBER Webinar: 23 Things About Research Data Management
LIBER Webinar: 23 Things About Research Data ManagementLIBER Webinar: 23 Things About Research Data Management
LIBER Webinar: 23 Things About Research Data Management
 
LIBER Webinar: Are the FAIR Data Principles really fair?
LIBER Webinar: Are the FAIR Data Principles really fair?LIBER Webinar: Are the FAIR Data Principles really fair?
LIBER Webinar: Are the FAIR Data Principles really fair?
 
What Do Users Want from Our Website?
What Do Users Want from Our Website?What Do Users Want from Our Website?
What Do Users Want from Our Website?
 
Uses of Library Collections
Uses of Library CollectionsUses of Library Collections
Uses of Library Collections
 
Europeana Network Association Members Council Meeting, The Hague by Sergiu Go...
Europeana Network Association Members Council Meeting, The Hague by Sergiu Go...Europeana Network Association Members Council Meeting, The Hague by Sergiu Go...
Europeana Network Association Members Council Meeting, The Hague by Sergiu Go...
 
Moving from Niche to Mainstream: the Evolution of the UCD Digital Library
Moving from Niche to Mainstream: the Evolution of the UCD Digital LibraryMoving from Niche to Mainstream: the Evolution of the UCD Digital Library
Moving from Niche to Mainstream: the Evolution of the UCD Digital Library
 
MongoDB NoSQL database a deep dive -MyWhitePaper
MongoDB  NoSQL database a deep dive -MyWhitePaperMongoDB  NoSQL database a deep dive -MyWhitePaper
MongoDB NoSQL database a deep dive -MyWhitePaper
 
Comparing 30 MongoDB operations with Oracle SQL statements
Comparing 30 MongoDB operations with Oracle SQL statementsComparing 30 MongoDB operations with Oracle SQL statements
Comparing 30 MongoDB operations with Oracle SQL statements
 
Digital Scholarship at the British Library: Collecting, Collaboration and Res...
Digital Scholarship at the British Library: Collecting, Collaboration and Res...Digital Scholarship at the British Library: Collecting, Collaboration and Res...
Digital Scholarship at the British Library: Collecting, Collaboration and Res...
 
Europeana Tech - IIIF in Action
Europeana Tech - IIIF in ActionEuropeana Tech - IIIF in Action
Europeana Tech - IIIF in Action
 
Customer Experience - On the Web, In the Library, In the Community
Customer Experience - On the Web, In the Library, In the CommunityCustomer Experience - On the Web, In the Library, In the Community
Customer Experience - On the Web, In the Library, In the Community
 
BL Labs CityLIS Talk
BL Labs CityLIS TalkBL Labs CityLIS Talk
BL Labs CityLIS Talk
 
Digital Scholarship at the British Library by Stella Wisdom
Digital Scholarship at the British Library by Stella WisdomDigital Scholarship at the British Library by Stella Wisdom
Digital Scholarship at the British Library by Stella Wisdom
 
Semantic annotation of digital libraries. A model for science communication
Semantic annotation of digital libraries. A model for science communicationSemantic annotation of digital libraries. A model for science communication
Semantic annotation of digital libraries. A model for science communication
 
DAYOR: Digital Cultural Heritage Research Network
DAYOR: Digital Cultural Heritage Research NetworkDAYOR: Digital Cultural Heritage Research Network
DAYOR: Digital Cultural Heritage Research Network
 
NCompass Live: Project Outcome: Measuring the True Impact of Public Libraries
NCompass Live: Project Outcome: Measuring the True Impact of Public LibrariesNCompass Live: Project Outcome: Measuring the True Impact of Public Libraries
NCompass Live: Project Outcome: Measuring the True Impact of Public Libraries
 

Ähnlich wie IT Security Disaster Recovery Plans for Libraries

04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-conceptsMuhammad Ahad
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfBabyBoy55
 
501 ch 9 implementing controls
501 ch 9 implementing controls501 ch 9 implementing controls
501 ch 9 implementing controlsgocybersec
 
Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Karel Kannel
 
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgInformation Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgEric Vanderburg
 
Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013Steven Williams
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!MarketingArrowECS_CZ
 
CS5032 Lecture 20: Dependable infrastructure 2
CS5032 Lecture 20: Dependable infrastructure 2CS5032 Lecture 20: Dependable infrastructure 2
CS5032 Lecture 20: Dependable infrastructure 2John Rooksby
 
Science DMZ security
Science DMZ securityScience DMZ security
Science DMZ securityJisc
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1misecho
 
05. performance-concepts-26-slides
05. performance-concepts-26-slides05. performance-concepts-26-slides
05. performance-concepts-26-slidesMuhammad Ahad
 
3 - Grid Computing.pptx
3 - Grid Computing.pptx3 - Grid Computing.pptx
3 - Grid Computing.pptxRiazSalim1
 
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...Splunk
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 

Ähnlich wie IT Security Disaster Recovery Plans for Libraries (20)

04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-concepts
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
 
Network security
Network securityNetwork security
Network security
 
501 ch 9 implementing controls
501 ch 9 implementing controls501 ch 9 implementing controls
501 ch 9 implementing controls
 
Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021
 
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgInformation Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
 
Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
CS5032 Lecture 20: Dependable infrastructure 2
CS5032 Lecture 20: Dependable infrastructure 2CS5032 Lecture 20: Dependable infrastructure 2
CS5032 Lecture 20: Dependable infrastructure 2
 
Science DMZ security
Science DMZ securityScience DMZ security
Science DMZ security
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Chap11
Chap11Chap11
Chap11
 
Chap11
Chap11Chap11
Chap11
 
Mis
MisMis
Mis
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
05. performance-concepts-26-slides
05. performance-concepts-26-slides05. performance-concepts-26-slides
05. performance-concepts-26-slides
 
3 - Grid Computing.pptx
3 - Grid Computing.pptx3 - Grid Computing.pptx
3 - Grid Computing.pptx
 
Mis
MisMis
Mis
 
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...
Virtual Gov Day - IT Operations Breakout - Jennifer Green, R&D Scientist, Los...
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 

Mehr von Brian Pichman

AI Coding, Tools for Building AI (TBLC AI Conference)
AI Coding, Tools for Building AI (TBLC AI Conference)AI Coding, Tools for Building AI (TBLC AI Conference)
AI Coding, Tools for Building AI (TBLC AI Conference)Brian Pichman
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024Brian Pichman
 
Community Health & Welfare: Seniors & Memory Care
Community Health & Welfare: Seniors & Memory CareCommunity Health & Welfare: Seniors & Memory Care
Community Health & Welfare: Seniors & Memory CareBrian Pichman
 
Robotics in Libraries - Education and Automation
Robotics in Libraries - Education and AutomationRobotics in Libraries - Education and Automation
Robotics in Libraries - Education and AutomationBrian Pichman
 
NCompass Live - Pretty Sweet Tech - Evolve Project
NCompass Live - Pretty Sweet Tech - Evolve ProjectNCompass Live - Pretty Sweet Tech - Evolve Project
NCompass Live - Pretty Sweet Tech - Evolve ProjectBrian Pichman
 
AI tools in Scholarly Research and Publishing
AI tools in Scholarly Research and PublishingAI tools in Scholarly Research and Publishing
AI tools in Scholarly Research and PublishingBrian Pichman
 
Tech Trends 2024 and Beyond - AI and VR and MOre
Tech Trends 2024 and Beyond - AI and VR and MOreTech Trends 2024 and Beyond - AI and VR and MOre
Tech Trends 2024 and Beyond - AI and VR and MOreBrian Pichman
 
Content Creation and Social Media Tools for Libraries
Content Creation and Social Media Tools for LibrariesContent Creation and Social Media Tools for Libraries
Content Creation and Social Media Tools for LibrariesBrian Pichman
 
Artificial Intelligence (AI) – Powering Data and Conversations.pptx
Artificial Intelligence (AI) – Powering Data and Conversations.pptxArtificial Intelligence (AI) – Powering Data and Conversations.pptx
Artificial Intelligence (AI) – Powering Data and Conversations.pptxBrian Pichman
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
NCompass Live: AI: The Modern Day Pandora's Box
NCompass Live: AI: The Modern Day Pandora's BoxNCompass Live: AI: The Modern Day Pandora's Box
NCompass Live: AI: The Modern Day Pandora's BoxBrian Pichman
 
Lets Chat AI - and Not Just ChatGPT
Lets Chat AI - and Not Just ChatGPTLets Chat AI - and Not Just ChatGPT
Lets Chat AI - and Not Just ChatGPTBrian Pichman
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
Lets Chat AI – And Not Just ChatGPT
Lets Chat AI – And Not Just ChatGPTLets Chat AI – And Not Just ChatGPT
Lets Chat AI – And Not Just ChatGPTBrian Pichman
 
STEM Programming Ideas at the Library.pdf
STEM Programming Ideas at the Library.pdfSTEM Programming Ideas at the Library.pdf
STEM Programming Ideas at the Library.pdfBrian Pichman
 
Getting Started With Using AI In Libraries (PLAN)
Getting Started With Using AI In Libraries (PLAN)Getting Started With Using AI In Libraries (PLAN)
Getting Started With Using AI In Libraries (PLAN)Brian Pichman
 

Mehr von Brian Pichman (20)

AI Coding, Tools for Building AI (TBLC AI Conference)
AI Coding, Tools for Building AI (TBLC AI Conference)AI Coding, Tools for Building AI (TBLC AI Conference)
AI Coding, Tools for Building AI (TBLC AI Conference)
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024
 
Community Health & Welfare: Seniors & Memory Care
Community Health & Welfare: Seniors & Memory CareCommunity Health & Welfare: Seniors & Memory Care
Community Health & Welfare: Seniors & Memory Care
 
Robotics in Libraries - Education and Automation
Robotics in Libraries - Education and AutomationRobotics in Libraries - Education and Automation
Robotics in Libraries - Education and Automation
 
NCompass Live - Pretty Sweet Tech - Evolve Project
NCompass Live - Pretty Sweet Tech - Evolve ProjectNCompass Live - Pretty Sweet Tech - Evolve Project
NCompass Live - Pretty Sweet Tech - Evolve Project
 
AI tools in Scholarly Research and Publishing
AI tools in Scholarly Research and PublishingAI tools in Scholarly Research and Publishing
AI tools in Scholarly Research and Publishing
 
Tech Trends 2024 and Beyond - AI and VR and MOre
Tech Trends 2024 and Beyond - AI and VR and MOreTech Trends 2024 and Beyond - AI and VR and MOre
Tech Trends 2024 and Beyond - AI and VR and MOre
 
Content Creation and Social Media Tools for Libraries
Content Creation and Social Media Tools for LibrariesContent Creation and Social Media Tools for Libraries
Content Creation and Social Media Tools for Libraries
 
Artificial Intelligence (AI) – Powering Data and Conversations.pptx
Artificial Intelligence (AI) – Powering Data and Conversations.pptxArtificial Intelligence (AI) – Powering Data and Conversations.pptx
Artificial Intelligence (AI) – Powering Data and Conversations.pptx
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
40 Day Challenge
40 Day Challenge40 Day Challenge
40 Day Challenge
 
NCompass Live: AI: The Modern Day Pandora's Box
NCompass Live: AI: The Modern Day Pandora's BoxNCompass Live: AI: The Modern Day Pandora's Box
NCompass Live: AI: The Modern Day Pandora's Box
 
Lets Chat AI - and Not Just ChatGPT
Lets Chat AI - and Not Just ChatGPTLets Chat AI - and Not Just ChatGPT
Lets Chat AI - and Not Just ChatGPT
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
CES 2023
CES 2023CES 2023
CES 2023
 
Lets Chat AI – And Not Just ChatGPT
Lets Chat AI – And Not Just ChatGPTLets Chat AI – And Not Just ChatGPT
Lets Chat AI – And Not Just ChatGPT
 
STEM Programming Ideas at the Library.pdf
STEM Programming Ideas at the Library.pdfSTEM Programming Ideas at the Library.pdf
STEM Programming Ideas at the Library.pdf
 
Getting Started With Using AI In Libraries (PLAN)
Getting Started With Using AI In Libraries (PLAN)Getting Started With Using AI In Libraries (PLAN)
Getting Started With Using AI In Libraries (PLAN)
 

Kürzlich hochgeladen

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Kürzlich hochgeladen (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

IT Security Disaster Recovery Plans for Libraries

  • 1. IT SECURIT Y FOR LIBRARIES PART 3: DISASTER RECOVERY B R I A N P I C H M A N | E V O LV E P R O J E C T @ B P I C H M A N O N T W I T T E R !
  • 2.
  • 3. IDENTIFYING THREATS • “Act of God” – Tornado, Flood, Fire • ”Act of Evil” – Break-ins, Hacking, Physical Damage, Viruses • “Act of Error” – Accidental Deletions, Hardware Failure, Software Glitches • Loss of Services (could be caused by above) – Internet, Power, Heating/Cooling, Phone, Building Issues
  • 4. RECOVERABLE RISKS • Risks with Provided Services: – Internet – Phone – Power • Risks with Created Data – Corruption – Loss • Risk with Owned Systems – Errors or Corruption – Failure or Loss
  • 5.
  • 6. A GOOD RECOVERY PLAN INCLUDES • Monitoring – Systems need to be actively monitored • Recoverable Backups and Systems – Systems need to have data backed up • Redundancy – Systems need to be redundant to mitigate risk of device or service failure, having failover devices and services is important to ensure uptime. • TESTING – I’m going to say this a few times.
  • 7.
  • 8. COST OF DOWNTIME • RESEARCH HIGHLIGHTS: • Data loss and downtime costs enterprises $1.7 trillion1 • Companies on average lost 400%2 more data over the last two years (equivalent to 24 million emails3 each) • 71% of IT professionals are not fully confident in their ability to recover information following an incident • 51% of organizations lack a disaster recovery plan for emerging workloads4; just 6% have plans for big data, hybrid cloud and mobile • Only 2% of organizations are data protection “Leaders”; 11% “Adopters”; 87% are behind the curve • China, Hong Kong, The Netherlands, Singapore and the US lead protection maturity; Switzerland, Turkey and the UAE lag behind • Companies with three or more vendors lost three times as much data as those with a single-vendor strategy https://www.emc.com/about/news/press/2014/20141202-
  • 9. A DISASTER PLAN IS ABOUT • Ensuring Redundancy and Recovery • Planning and Preparation: – Risk Management – Risk Assessment – Risk Mitigation – Business Continuity • If a Disaster Occurs: – Response – Relief – Recovery – Restoration
  • 10. SERVICES: INTERNET AND PHONE • Internet is a core component for day to day operations – Connecting to an ILS • What makes up your connection to the outside world? • ISP = Internet Service Provider ISP Modem Firewall Switches Servers Computers
  • 11. ISPs Modem Firewall Switches Servers Computers Modem Most latest gen firewalls are able to handle two internet connections and “round-robin” and do “failover” Usually pick two different mediums: Cable Telephone Satellite … Having two different internet connections across two different modems will help mitigate risk of a Service Provider Failure Other considerations include hardware failure and redundancy. Having a spare firewall (or using two firewalls to load balance) can help mitigate risk.
  • 12. SERVICES: POWER • Having Battery Power Supplies / UPS for your server and network equipment can help ensure uptime – Time for Generators to kick on – Gives you enough time to power down the machines versus an abrupt power loss. • Have generators if your business requires you to have power in your building consistently. – If you are considered a shelter or a heating place it should be a requirement.
  • 13. CHOOSING A BATTERY BACKUP- CONSUMPTION • How much power does your devices consume? – You can do the math using server tools that measure consumption of power at peak times. – You can also get a watt meter and test average consumption over an extended period of time. – Some fancy rack mounted power strips have power consumption built in.
  • 14. CHOOSING A BATTERY BACKUP- LOAD TIME • You will want to make sure your UPS can power your network long enough to get what you need to get done (in terms of powering down) or length of time for the generator to kick in.
  • 15. CHOOSING A BATTERY BACKUP- FEATURES • Power supplies should be plugged into your network – To give you real time reporting of load (so you can add more UPSs if need) – To tell you battery health – Sending alerts at thresholds • Power Failure • Over usage • Battery is almost drained
  • 16. DATA IS EXPENSIVE • Financial Records for 7 years – SOX ( Sarbanes–Oxley Act of 2002 ) • Cost of a “data record” – On average, the cost of such a record containing healthcare information is $363 (and also employee records are known to be this much if including social information – At the end of May 2015, the Ponemon Institute released its annual “Cost of Data Breach Study.” Researchers estimated that the average cost of each lost or stolen record containing sensitive and confidential information was $154. – Verizon has the concept from a per-record perspective, claiming an average cost of just 58 cents for each lost or stolen file.
  • 17.
  • 18. WHAT CAN HAPPEN TO MY DATA? • It can be corrupted! – Someone makes changes to a file. Accidental deletion, purposeful manipulation, script goes rouge. – Can impact system performance • It can be lost! – Server goes down, disappears, etc. – Spreadsheets, employee files, payroll, flyers, data about events – Website Data, Catalog Data, Hosted Applications…gone! – Email! • Hardware failure
  • 20. CALENDAR • Monthly Full Back Up • Hourly/Daily Incremental Back Ups • Weekly Differential • Back Ups should also be stored off-site. – Either Weekly Differentials and/or Monthly Back Ups – This fixes the “what if the place was taken out a storm”
  • 21. BACK UP MEDIUMS Type Pros Cons External Drives* Inexpensive Fastest media for backups Easily portable Readable on variety of computers More fragile than other media Ruggedized versions available (pricey) May require special power supply NAS (Network Area Storage)* Backups are more automated and controlled. More Security. Can be remotely monitored with ease. Can be more expensive depending on automation. Requires setup and network configurations. Bandwidth May require the NAS OS to read if NAS Hardware Failure Tape Drives Inexpensive Durable Easily portable Reliable Expensive Compatibility issues May require additional software SLOW Cloud Off Premise by another group. Expensive and less control of your “data” Outdated Media: USB Flash Drives Optical Disks *Solid State Drives would be more expensive but less risk of hardware failure (no mechanical parts)
  • 22.
  • 23. DEVICES! • “Personal Cloud Storage” devices – Western Digital EX series
  • 24. DEVICES! • “Personal Cloud Storage” devices – QNAP
  • 28. REPLICATION • You can also replicate your servers (with all of its data) to multiple locations. – This isn’t the best for protecting of “corrupted” data • IE Crypto Locker – However this offers redundancy! • Replication is running the exact same server environment on different: – Hardware (preferred) – VM (less preferred)
  • 29.
  • 32. DATA CENTERS • Host your environment in someone else’s data center – Latisys – RackSpace • You rely on them to provide redundancy and security – However, if your network is down, you have no way to connect to the data center.
  • 33. APPLICATION HOSTING AND BACK UP • Two Layers – Server Front End: Runs the “pretty” stuff like windows, graphics, and public facing display. – Server Back End: Usually a “database”. • It is harder to replicate databases, so most people will replicate front ends (for load balancing) and back up the databases.
  • 35. MONITORING IS IMPORTANT • Monitor your servers to prevent issues before they happen. Things to monitor for: – Network Drops (means it can be device failure or network issue) – Temperature of Devices (prevent overheating) – Server Processes (if a server is running to high for too long something could be wrong) – Storage Space (running out of space can corrupt an entire system) – Memory Usage – Database Errors
  • 36.
  • 39. TEST YOUR PLAN • Test Your Back Ups – Do a recovery on a different server to ensure accuracy and time how long it takes to recover • Test Your Redundancy – Remove a network, server, and determine if fail over occurs. – Time these! • Test Test Test.
  • 40. DIFFERENCES BETWEEN… • An Emergency Response Plan – What to do immediately if an incident occurs. • Business Continuity Plan – Address the immediate response AND short and long term continued performance of essential business functions • While you make your disaster plan, you should work to mitigate as many risks, and then plan for the risks you couldn’t mitigate.
  • 41. LAYOUT OF A “DISASTER PLAN”
  • 42. TO RECAP • Risk Assessments to determine what the risks are and how to handle them. – Using the risk matrix; determine how much effort will be needed (and at what costs) • Plans in place if there is some sort of failure. – Using the options presented, what makes the most sense to you? – Who are the contacts? • Test. – Most important part of the entire disaster recovery process.
  • 44. STORIES • Crypto Locker: – Brought a business to a halt for three days. – Email Access Missing Back Ups • Server Failure on Accounting Server – Was right before tax season. • SAN Failure – Brought entire business down when EMC drives failed and there was no alerting set up (on a RAID).
  • 45. QUESTIONS • Brian Pichman • bpichman@evolveproject.or g • Twitter: @bpichman