-
- Do I need antivirus on my mobile phone?
- Where Can I Get Free Cyber Security Advice?
- Are security assessments needed within education settings?
- Do I need to worry about security of cloud-based systems we use?
- We’re a small company do we need to worry about cyber security?
- I have anti-virus software do I need more than this?
-
- What is the Best Antivirus Software?
- Who Should Be Responsible for Security in a Business?
- What is Microsoft SecureScore?
- What Does a Virtual CISO Do?
- How Secure Are Chromebooks?
- Can I Use the Same Password Everywhere?
- What is a Vulnerability Assessment?
- What is DR?
- How Long Should My Password Be?
- What is a Password Manager?
- How Often Should I Change My Password?
- What is a Business Continuity Plan?
-
- Does ISO 27001 Cover GDPR?
- What is HIPAA?
- What is PCI DSS?
- How is Cyber Essentials Assessed?
- What are the ISO 27001 Controls?
- How Long Are Cyber Essentials Certificates Valid For?
- Does Cyber Essentials Cover GDPR?
- What is Cyber Essentials?
- What is the Difference Between Cyber Essentials and Cyber Essentials PLUS?
- What are the benefits of ISO 27001?
- What is ISO 27001?
-
- What is Ethical Hacking?
- What is XSS?
- What is WAF?
- What is VPN?
- What is TVM?
- What is SSO?
- What is SQLI?
- What is SOAR?
- What is SIEM?
- What is RBAC?
- What is RAT?
- What is PCI-DSS?
- What is OSINT?
- What is NIST?
- What is NCSC?
- What is MFA?
- What is MAC?
- What is ISO?
- What is IPS?
- What is IOT?
- What is IOC?
- What is IDS?
- What is HTTPS?
- What is HIPAA?
- What is GDPR?
- What is EDR?
- What is DLP?
- What is DDoS?
- What is DOS?
- What is DAC?
- What is CVSS?
- What is CND?
- What is CISSP?
- What is CISO?
- What is the CIA Triad?
- What is AV?
- What is AC?
- What is APT?
- What is 2FA?
- What is a Virtual CISO or vCISO?
- What is Blue Teaming?
- What is Purple Teaming?
- What is a Zero-Day Vulnerability?
- What is a Zero-Day Attack?
- What is XSS (Cross-Site Scripting)?
- What is a Worm?
- What is White Teaming?
- What is Whaling?
- What is a Watering Hole Attack?
- What is Vulnerability?
- What is a VPN (Virtual Private Network)?
- What is a Virus?
- What is URL Injection?
- What is a Trojan?
- What is a Threat Actor?
- What is Steganography?
- What is SQL Injection?
- What is Spyware?
- What is Website Spoofing?
- What is Spear-Phishing?
- What is Spam?
- What is Social Engineering?
- What is Smishing?
- What is Single Sign-On (SSO)?
- What is Sextortion?
- What is a Sandbox?
- What is Salting?
- What is an RPO (Recovery Point Objective)?
- What is a Rootkit?
- What is a Remote Access Trojan (RAT)?
- What is Red Teaming?
- What is Ransomware?
- What is PII (Personally Identifiable Information)?
- What is a firewall?
- What is "cyber security"?
- Show all articles ( 60 ) Collapse Articles
What is DR?
0 out Of 5 Stars
5 Stars | 0% | |
4 Stars | 0% | |
3 Stars | 0% | |
2 Stars | 0% | |
1 Stars | 0% |
- Main
- Securing your business
- What is DR?
DR stands for Disaster Recovery, the process of returning to normal operations following any event that causes significant disruption to your business.
What defines a ‘disaster’ and the associated DR response will likely be different from one business to the next, but whether recovering from a ransomware attack, a power outage or a natural disaster affecting facilities or communications, the road to getting your business operating as normal should be detailed in your Disaster Recovery Plan.
A Disaster Recovery Plan is a documented set of processes and procedures that should detail precisely how your business will recover from a given disaster scenario. It is critical that your DR plan is tested regularly to make sure it is still valid, but also simply to make sure it works- if disaster does strike you need to be confident you can get your business back up and running as quickly and smoothly as possible. You can’t afford to be in the situation where your business is unable to operate and you don’t know how, or worse- are unable to recover it.
You should also consider that DR isn’t just about recovering your IT, it’s about recovering your business. Although regaining access to data, email and telephony will feature heavily it should also cover logistical considerations such as alternative work locations and even the welfare of your staff. You may be confident you can recover your key sales database for example, but if your sales staff can’t work then your business isn’t working either.
0 out Of 5 Stars
5 Stars | 0% | |
4 Stars | 0% | |
3 Stars | 0% | |
2 Stars | 0% | |
1 Stars | 0% |