IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Why knowing your data is key to disaster recovery

There are 13 types of data crucial to your firm's infrastructure - can you list them all?

data center on fire

What is the most important task carried out by your company or clients' IT infrastructure? Take a second to think about it. It's a key question regardless of whether you're integrating technologies into your own firm, or attempting to plan an integration strategy for an ongoing or prospective customer. 

Picture all the IT processes going on at any one time (perhaps it'd be best to grab a pen and paper here) and map them out. What feeds into what? Which tasks and databases could you 'turn off' and still be able to run the business at near optimal capacity?  

It's not as simple a question as you might have thought, but it's one that should be asked whenever integrating or selling any new technology. With IT outages increasingly plaguing organisations across all sectors, it has never been more important to know your systems inside and out to understand which workloads are dependent on one another, and to have a mechanism that can get you back online quickly. 

Test your systems to death

There are a host of data that play a role in your firm's infrastructure. Generally speaking, there are 13 types: big data; structured, unstructured and semi-structured data; time-stamped data; machine data; spatiotemporal data; open data; dark data; real-time data; genomics data; operational data; high-dimensional data; unverified outdated data; and translytic Data.

The definitions of each kind get increasingly murkier, and it's not necessary to know the minutiae of what each byte is made up of. The main point is that it's vital to know what processes the data is responsible for and how readily available it is.

The only way to know all of this is to carry out a full system audit, and to begin with it can be quite an ugly sight. You don't know what you need unless you know what you're missing, which is why it's so important to carry out disaster recovery (DR) testing. 

A DR test puts the IT infrastructure in a worst-case scenario and provides administrators with the knowledge of how long it would take them to recover data, restore business-critical applications and resume normal service. It's a practice that can be neglected, but it's necessary nonetheless. Without DR testing and the subsequent creation of a disaster recovery plan, organisations will likely see that the IT system that they may have spent a lot of money on is ill-equipped to execute as and when it is needed 

There are different types of DR testing available to you. The simplest, the plan review, is where the administrators responsible for the plan will thoroughly scrutinise it to identify any inconsistencies or missing elements. The 'tabletop test' meanwhile involves stakeholders walking through the plan step-by-step to determine if they know what they have to do, and if there may be any errors. 

The most intensive is a full-blown simulation where a variety of disaster situations are played out to see if and how quickly the team can get crucial systems back online and fully operational. All of these methods have their pros and cons, but all work towards the common goal of giving you a full overview of the system. 

There's no 'silver bullet' for IT outages

With a full understanding of the system, administrators can then implement mechanisms to get their systems back online, and fast, in the face of a disaster. The best way to do this is by adopting a zero-day approach to architecture. This approach allows organisations to prioritise workloads, and minimises downtime without having to worry about lost data. 

A zero-day recovery architecture is a service that enables administrators to quickly bring work code or data into operation in the event of any outages, without having to worry about whether the workload is still compromised. 

An evolution of the 3-2-1 backup rule (three copies of your data stored on two different media and one backup kept offsite), zero-day recovery enables an IT department to partner with the cyber team and create a set of policies which define the architecture for what they want to do with data backups being stored offsite, normally in the cloud. This policy assigns an appropriate storage cost and therefore recovery time to each workload according to its strategic value to the business. It could, for example, mean that a particular workload needs to be brought back into the system within 20 minutes while another workload can wait a couple of days.

Anyone who claims to have a miraculous 'silver bullet' for IT outages that prevents them altogether should be treated with a great deal of suspicion. We can mitigate the effects, but we can't eliminate them altogether. Whether it's a malicious case of ransomware, or simply an environmental situation like power outages or a loose connection, outages will happen. The most important thing IT administrators can do now is to make sure that when those outages do happen, downtime is minimised and recovery time is as quick as possible.

Alex Fagioli is CEO of Tectrade

Featured Resources

Four strategies for building a hybrid workplace that works

All indications are that the future of work is hybrid, if it's not here already

Free webinar

The digital marketer’s guide to contextual insights and trends

How to use contextual intelligence to uncover new insights and inform strategies

Free Download

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk

Free Download

Building a modern strategy for analytics and machine learning success

Turning into business value

Free Download

Recommended

Palo Alto and Deloitte to deliver managed security services in the US
Managed service provider (MSP)

Palo Alto and Deloitte to deliver managed security services in the US

17 May 2022
US and EU thrash out plans to avert chip production “subsidy race”
Hardware

US and EU thrash out plans to avert chip production “subsidy race”

17 May 2022
Red Hat reveals new software supply chain security pattern
Software

Red Hat reveals new software supply chain security pattern

11 May 2022
Red Hat Enterprise Linux 9 aims to fuel innovation in the open hybrid cloud
hybrid cloud

Red Hat Enterprise Linux 9 aims to fuel innovation in the open hybrid cloud

11 May 2022

Most Popular

Windows Server admins say latest Patch Tuesday broke authentication policies
Server & storage

Windows Server admins say latest Patch Tuesday broke authentication policies

12 May 2022
Costa Rica declares state of emergency following Conti ransomware attack
ransomware

Costa Rica declares state of emergency following Conti ransomware attack

10 May 2022
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

13 May 2022