In the risk evaluation phase, there are a number of key areas that must be covered. One of the most important is to understand probable threats. In an ideal world, which most of us have noticed does not exist, we would identify and protect ourselves against all threats to ensure that our business continues to survive. Obviously, we are constrained by other factors such as budgets, time and priorities and need to apply cost benefit analysis to ensure we are protecting the most critical business functions.
A second important step is to identify all probable threats and prioritize them. Threats, typically, can be classified in several ways such as internal/external, man-made/natural, primary/secondary, accidental/intentional, controllable/not controllable, warning/no warning, frequency, duration, speed of onset etc. While classifying threats is helpful in terms of understanding their characteristics and potential controls, grouping and understanding by business impact is also important. Obviously, the same impact can result from a number of different threats.
Identifying mission critical business processes and systems is another fundamental building block of the business continuity plan. After your critical business processes and systems and probable threats are established, the next step is to identify vulnerabilities and loss potential. This requires an extensive scan of the organization to identify vulnerabilities and then analysis to understand those vulnerabilities which would have the greatest impact on your critical business processes and the organization. This starts to clarify and quantify potential losses, which helps to establish priorities.
Following the identification of the most probable threats and vulnerabilities, an analysis of existing controls is needed. This spans physical security as well as people, processes, data, communications and asset protection. Some controls such as physical security and data backup are obvious. Other controls required are often less obvious, but they can be identified through the risk evaluation process.
Once the key building blocks of critical business functions, most probable threats, vulnerabilities and controls are identified, the next stage is to develop an understanding of the probability of threats factored by the severity or impact of the threats. This leads to the business impact analysis phase which establishes priorities for protection.
The goal is to minimize threats, impacts and downtime and to mitigate any losses. Fundamentally, the goal is to protect your people, protect your data, protect your vital communications, protect your assets and to protect your brand and reputation. Overall, of course, the goal is to ensure your business continues to operate and to do it in a cost-effective way meeting standards of reasonable and prudent judgment.
About The Author
Robert Mahood has significant technology and management experience in data communications, internet, storage, disaster recovery and data recovery. He is currently the president of Midwest Data Recovery. www.midwestdatarecovery.com
bmahood@midwestdatarecovery.com, 312 907 2100 or 866 786 2595
![]() |
|
![]() |
|
![]() |
|
![]() |
The following scenario's have probably been repeated thousands of times,... Read More
ITS ALL IN THE PLANNING - PREPARING FOR THE UNTHINKABLE*... Read More
Viruses, software failures, power failures, human errors, hard drive failures... Read More
June 25, 2005Seagate Technologies' web site now indicates the company... Read More
If you have spent the time to increase your computer's... Read More
As someone who has seen quite a few hard drive... Read More
Business impact analysis is a critical part of the business... Read More
If you aren't prepared in advance, you will most likely... Read More
Vision Backup 10 Enterprise is an advanced and easy-to-use backup... Read More
Data recovery is a tricky thing, and if you've somehow... Read More
Backup on business computers is typically not the user's concern... Read More
"Why should you be afraid?", I can hear you ask.I... Read More
There is a common problem that happens with lot of... Read More
It might be more fun to talk about those free... Read More
Bill gates provided a ready made option in Microsoft windows,... Read More
If you're like most small business owners, your computer data... Read More
Losing files on your computer can be a frightening experience... Read More
Oh the perils of collecting those precious photos on your... Read More
Spyware elimination software is designed to detect and eliminate spyware.... Read More
Backups of company data are carried out for two main... Read More
Why should you backup your data on the Internet?There are... Read More
It's 10pm. Do you know where your data is?Data. Small... Read More
Essentially, the plan addresses the who, what, where, why and... Read More
A Tornado? In Birmingham? In The United Kingdom? Unthinkable!Yes, in... Read More
How long have you been doing business online? Whether you... Read More
Six months ago my computer crashed. When I turned my... Read More
As a home computer owner, one of the greatest threats... Read More
The best defense against a loss of data is a... Read More
We all know we have to backup regularly, but those... Read More
In the first part of this article series, I talked... Read More
If You are running an Online Work at home Business... Read More
Imagine that you have been working on a file for... Read More
Hackers, hurricanes, fires, flooding, power outages, denial of service attacks,... Read More
It is not rocket science, we all know that we... Read More
Viruses, software failures, power failures, human errors, hard drive failures... Read More
Your worst nightmare just became a horrifying reality. You keep... Read More
With Adware, SpyWare, E-Mail Viruses, Java Script Viruses and Hardware... Read More
Almost everyone who has used a computer has experienced a... Read More
What to backup, and what to loseThe oldest "computer expression"... Read More
Backups of company data are carried out for two main... Read More
If you aren't prepared in advance, you will most likely... Read More
It's one thing to loose data and money because of... Read More
Imagine that you have been working on a file for... Read More
Whenever disaster strikes the most critical asset that every company... Read More
In the risk evaluation phase, there are a number of... Read More
Bill gates provided a ready made option in Microsoft windows,... Read More
The following scenario's have probably been repeated thousands of times,... Read More
"We apologize for the inconvenience, but Windows could not be... Read More
If You are running an Online Work at home Business... Read More
How long have you been doing business online? Whether you... Read More
As a home computer owner, one of the greatest threats... Read More
The risk analysis and business impact analysis have identified risks... Read More
Okay, computers a machine, right? Okay, maybe not yours. You... Read More
If you have spent the time to increase your computer's... Read More
In the first part of this article series, I talked... Read More
"Why should you be afraid?", I can hear you ask.I... Read More
We all know we have to backup regularly, but those... Read More
Helping your business survive in the event of an unforeseen... Read More
June 25, 2005Seagate Technologies' web site now indicates the company... Read More
Statistics show two out of five businesses go out of... Read More
Oh the perils of collecting those precious photos on your... Read More
Why should you backup your data on the Internet?There are... Read More
It might be more fun to talk about those free... Read More
Software programmers recognize the importance of data files, and thankfully,... Read More
Data recovery is a tricky thing, and if you've somehow... Read More
Backup on business computers is typically not the user's concern... Read More
Data Recovery & Computer Backup |