Irrespective of the cause of the disaster in question, the company is going to take preventive, detective, and corrective measures to ensure the continuity of its operations. The recovery plan starts with the selection of a recovery team that will be given different responsibilities in case of a disaster. Before coming up with corrective measures, preventive measures including installation of surveillance cameras and hiring more guards to secure the premises will be used to deal with issues before they become serious. If the functional areas of the company are entirely derailed, the company will move its manufacturing process to a new plant that suits its needs. Hence continuity will be assured.
Disaster Recovery for Business Continuity
Over the course of the year, our company has been going through some unforeseen issues which have resulted in a decline in revenues. The company has had to take the initiative to recover from the disasters and has tried as much to ensure that the same events do not recur in the future. As the team leader in the disaster recovery process, the team will have to rely on and strictly abide by directives given to help protect the company. As a result, this report will highlight the recovery plan made for the organization. Additionally, it will also point out the proper procedures and policies implemented that are unique to disaster recovery team personnel.
The DR plan will be expected to act whenever a disaster strikes and disrupts facilities used to process data. Therefore, the pre-planned actions highlighted within this document will be expected to make the recovery process easier and the usual operations of the organization will be resumed effectively (Cerullo & Cerullo, 2004). First, a team will be selected based on merit, and all the team members will be made responsible for different activities, for instance, risk assessment, hardware and software inventory, and the requirement analysis. Since the first step to planning is risk assessment, a team of two individuals will be given the mandate to identify and quantify risk and assess its effect on relevant business processes. In this case, risk assessment determines that security is the most threatening followed by the manufacturing process and ultimately the storage of critical data. In addition to assessing the risks, other individuals will be vested with the responsibility of identifying the core activities in the organization. That is, all the departments in the company will be assessed, and the most crucial and vulnerable departments will be identified. For these units, regular backup files will be created, and valuable contacts will be kept in a safe place to ensure that the central business can never be crippled (Wallace & Webber, 2011).
The best recovery strategy is one that is not used; as a result, preventive measures are vital to disaster recovery (Wallace & Webber, 2011). Depending on the risk in question, different strategies could be implemented to detect and act appropriately on the issues mentioned and ensure that it does not cripple operations. Some of the preventive measures that will be taken include the hiring of more guards and installing surveillance cameras around the facility to improve security. Moreover, dog patrols will especially be used at night to enhance this security. To avoid the derailing of manufacturing processes, initiatives taken will include the installation of a backup generator that would kick in case there is an issue with electricity. Manufacturing equipment will also be protected from power-related issues by the installation of power surge protectors and UPS, which means that normal operations could be resumed almost immediately.[“Write my essay for me?” Get help here.]
After assessing the most likely risks to occur and its possible effects, it is necessary to identify key personnel that will be responsible for the business resumption in the case of a disaster and equipment to be used. In this case, a managing director will be appointed by the board, as well as crucial members from key departments who will take over during the disaster. The next step in the recovery place will involve the selection of an alternate relocation area or office (Nollau, 2009). Conditions in the potential location identified should mimic those in the previous location by assessing whether it is accessible, whether it has the equipment and facilities required and the access to basic needs in the location. However, these relocations plans are also determined by other factors. For example, determining the length of the interruption, that is whether temporary or permanent, and the limit as to how long the alternate office could be held. The number of individuals to be relocated to the new or alternative office also needs to be determined, which in turn determines the plan for the office itself.
When a severe disaster strikes and operations have to be transferred to the new locations, the disaster recovery team needs to be vested with responsibility. The team of 11 individuals will have to be aware of what is required of them to ensure business continuity. Therefore, different people will be given different roles in the functional areas of the organization. To be precise, some will be responsible for computer backup, facilities, administrative functions, and the restoration of activities. I will be responsible for the coordination of the activities during the recovery as well as monitor the progress. This shows that all the individuals in the team will be crucial to its success and nothing will be accomplished without their input.[Need an essay writing service? Find help here.]
Cerullo, V., & Cerullo, M. J. (2004). Business continuity planning: A comprehensive approach. Information Systems Management, 21(3), 70-78.
Nollau, B. (2009). Disaster recovery and business continuity. Journal of GXP Compliance, 13(3), 51.
Wallace, M., & Webber, L. (2011). The disaster recovery handbook: A step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets (2nd ed.). New York, NY: American Management Association.
|System/ functional area
||External security threats
||Hiring more guards, installation of surveillance systems
||Sending guards to neutralize the situation
||Install/reinstall security measures destroyed
||Loss of power
Spoilage of equipment
|Installation of sensors, failure alerts, and inspection
||Using backup generators, switching manufacturing to the new location
||Fix the primary system soonest
||Loss of data
Corruption of data
|Installing security systems, data Backup
||Switching to the backup system
||Repairing the main server and reinstalling security measures