GREEN Animation Studio Lewis, Rob, Richard. Introduction Where are the Copies of the Plan Stored? Who and How Do We Call A Disaster? What’s covered in.

Slides:



Advertisements
Similar presentations
Why Plan Ahead? Limit Susceptibility Limit Risk Contain Material Loss Contain Human Impact Limit Down-Time Ensure Longevity FEMA Fact: 80% of businesses.
Advertisements

1 Remote Off-Site Backup BE PREPARED! Dont let a loss of data shutdown your business!
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
CLEARSPACE Digital Document Archiving system INTRODUCTION Digital Document Archiving is the process of capturing paper documents through scanning and.
Security and Control Soetam Rizky. Why Systems Are Vulnerable ?
Information Technology Disaster Recovery Awareness Program.
Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
Business Plug-In B4 MIS Infrastructures.
Vital Records Management A Briefing for Federal Agencies National Archives and Records Administration Northeast Region Pentagon, September 11, 2004.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
John Sell March 17, Disaster Recovery Emergency Management Incident Control including all Press Releases Communication to all employees Temporary.
Business Continuity Planning Jeremy Stacy. Objectives Understand the steps in Business Continuity Planning Understand the terminology used in Business.
Backups Rob Limbaugh March 2, Agenda  Explain of a Backup and purpose  Habits  Discuss Types  Risk/Scope  Disasters and Recovery.
Remote On-line Backup Service. How safe is your business data?
© 2008 Kroll Ontrack Inc.| Ontrack PowerControls 5.1 The ultimate “power tool” for SharePoint administrators.
Processing Integrity and Availability Controls
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FIVE INFRASTRUCTURES: SUSTAINABLE TECHNOLOGIES CHAPTER.
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
1.  Consider: What are my Hazard Risks & consequences?  Awareness to storm and flood risks ◦ Winds ◦ Floods ◦ Nor’easter ◦ Snow/Ice Storms ◦ Hurricane.
1 AQA ICT AS Level © Nelson Thornes Backup and its importance.
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
Contingency Planning Drew Hunt Network Security Officer Valley Medical Center.
© 2009 Kroll Ontrack Inc.| Ontrack PowerControls 6.0 for SharePoint™ A Better Way to Search and Restore.
CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE
Creating an IT Disaster Recovery Plan.  Disaster Recovery vs Business Continuity  Events  Plan Development  Determining which services (thus servers)
Business Crisis and Continuity Management (BCCM) Class Session
Services Tailored Around You® Business Contingency Planning Overview July 2013.
November 2009 Network Disaster Recovery October 2014.
Datasheets I: Create a table by entering data – You type, Access listens Lesson 18 By the end of this lesson you will be able to complete the following:
Disaster Recovery Strategies & criteria for evaluation of information management strategies.
EPMA. Overview of Servpro Large loss capability Emergency Ready Profile.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Developing a Disaster Recovery Plan Bb World ’06 San Diego, Calif. Poster Session Presented by Crystal Nielsen, M.A. Instructional Technologist Northwest.
1 Natural Disasters Solution: Fire up a new PC, install the business programs and immediately restore access to payroll. In a matter of hours, the client.
1 SECURITY & HIPAA DATA ENSURE INC. 798 PARK AVE. NW SUITE 204 NORTON, VA (276) D E.
Managing Technology and Information Chapter 15. Distinguish between data and information and explain the role of management information systems in business.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Principles of Incident Response and Disaster Recovery
Your business runs even when your server doesn’t DR Recommendation November 2011.
Developing Plans and Procedures
Microsoft ® Office Access ™ 2007 Training Datasheets I: Create a table by entering data ICT Staff Development presents:
Business Continuity Plan Fikrat Rafikov Luke Chmilenko.
11 DISASTER RECOVERY Chapter 13. Chapter 13: DISASTER RECOVERY2 OVERVIEW  Back up server data using the Backup utility and the Ntbackup command  Restore.
Documentation David M. Shapiro David M. Shapiro Disaster Planning and Recovery Consultants 4030 Wake Forest Road, Raleigh NC Tel: (919)
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Note1 (Admi1) Overview of administering security.
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Disaster Recovery.
Business Continuity. Business continuity... “Drive thy business or it will drive thee.” —Benjamin Franklin ( ), American entrepreneur, statesman,
HalFILE 2.1 Network Protection & Disaster Recovery.
Presented by, MySQL & O’Reilly Media, Inc. Top considerations for backup of MySQL Dmitri Joukovski, Zmanda.
The aim of producing a backup strategy is to make sure that a computer system can be returned to its original state if data has been lost or corrupted.
Backing Up and Restoring Databases by Using the SQL Server 2000.
Managing Data & Information Procedures & Techniques.
Disaster Recovery 2015 Indiana Statewide Payroll Conference Michael Ievoli-Client Support Specialist IV, Major Accounts September 16, 2015 Copyright ©
Recovery from the earthquake Takashi Sasaki. Disaster recovery “Disaster” comes from human error or hardware failure was considered before We were preparing.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
Backups for Azure SQL Databases and SQL Server instances running on Azure Virtual Machines Session on backup to Azure feature (manual and managed) in SQL.
Planning for Application Recovery
CompTIA Security+ Study Guide (SY0-401)
Discovering Computers 2010: Living in a Digital World Chapter 14
CHAPTER OVERVIEW SECTION 5.1 – MIS INFRASTRUCTURE
How to survive a ransomware attack and live to tell about it
Business Contingency Planning
Back Up and Restore? Piece of Cake!
IT INFRASTRUCTURES Business-Driven Technologies
Backup and restoration of data, redundancy
Understanding Back-End Systems
BUSINESS CONTINUITY PLAN
BUSINESS CONTINUITY PLAN
Presentation transcript:

GREEN Animation Studio Lewis, Rob, Richard

Introduction Where are the Copies of the Plan Stored? Who and How Do We Call A Disaster? What’s covered in the BCP thus far? o Internal Flooding Affecting 3D Rendering Services o Human Accidental Cause Affecting Payroll o Extreme Winter Weather affecting Sales

Function: Sales Overview: Snowstorm/Heavy Winter Storm doesn’t allow sales employees to enter office in a safe manner Recovery Procedure: VPN! Work From Home! Secondary VPN Must be turned on! RTO: 48 Hours. Sales must continue… Directions: Turning on The secondary VPN in a few easy steps Dependencies: 1 Employee within building

Function: 3D Rendering Overview: Flooding has indirectly shutdown the 3D rendering services. End of the company! Recovery Procedure: Shutdown, relocate, recover. RTO: 3 Hours during business hours. 6 hours during off- work hours. Up to 10 hrs during weekends Alternate Site: ABC Data Services with logistical and technical support Dependencies: 3 Rd party contractor, Internet access, undamaged critical hardware

Function: Payroll Overview: – Employee data is accidentally destroyed through human accidents. – Infrequent backups leads to irrecoverable changes. Recovery Procedure: – Most recent backup restored – Any changes to information with paper records should be entered into digital – Restored data compared and missing data gathered from employees RTO: 48 Hours or 24 Hours, depending on pay periods Dependencies: – Automated Payroll system – Accounts intact – VPN system – employee account server