Latest news of interest from Janco's news feed

Disaster Recovery Planning, Job Descriptions, Salary Survey, Business Continuity, ITSM, SOA, Compliance, SOX, and HIPAA

The Janco News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:

    • IT Standard News Feed - 30 items

    • Not all disasters are equal

      Disaster recovery, or DR, is one of those subjects that can be discussed not only at length, but also from many different perspectives. The process of recovering from a storm or other natural disaster that affects people and infrastructure across a wide geographic region is clearly not the same as that required for a business to recover from the impact of, say, a fire at a central warehouse. But no matter at what level one talks about disaster recovery, there are key two metrics, two goals that will inevitably be discussed: the time it takes to recover, to “get back to normal,” and the state or condition to which one can hope to recover.

      These same metrics are central to any discussion of recovery from IT disasters, such as the loss of a server or data center or just the loss of a file or data object. Most commonly, experts in DR planning talk about an organization’s recovery expectations in terms of their “Recovery Time Objective” and their “Recovery Point Objective.”

      Recovery Time Objective (RTO) describes the goal for how quickly data is to be recovered and made available to users after the failure or loss of a system. For example, some companies may be willing to tolerate six to 24 hours of “downtime,” while others (e.g., large online retailers) are willing to wait only a minute or two.

      Recovery Point Objective (RPO) measures the completeness of the data and/or application functionality ultimately recovered. For instance, one shop may be willing to accept the loss (and subsequent manual re-creation) of a day’s worth of transactions, while another may be willing to tolerate the loss of only transactions that were in process at the very moment the system failed.

      - more info


      Backup makes disaster recovery business continuity daunting

      DR BC BC-DR is daunting. BC-DR requires offsite duplicate data, infrastructure, storage, systems, networks, floor space, rack space, cables, power, cooling, etc. Far too many organizations take a look at the cost and decide they just can’t afford it. Per the May 2010 Information Week Business Continuity Disaster Recovery published survey of the Global 2000 (681 respondents), 37% said they had no current BC-DR plan of which 68% of those said it was because it is too expensive and too complicated. The better question is whether they can afford not to have it. It has been proven that 95% of those organizations that failed to recover their data and systems within two weeks of a disaster were out of business within two years. This is not a pretty picture. Regrettably, the consequences of poor BC-DR preparedness will only come to light when there is a disaster. Up until then, it is a hypothetical risk. Unless an IT organization has experienced a disaster, they are far more likely to tolerate the incredible risk.

      - more info


      Secrutiy threates increase

      Cybercrime continues to evolve and grow in both scale and sophistication. As social networking becomes ever more deeply embedded in our everyday lives, it has become an ever more fertile hunting ground for those who would steal and abuse our personal information, and compromise and misuse our computer systems to gain financial advantage by stealing our personal or corporate funds or obtaining illicit funds from advertisers or spammers.

      Just companies have changed their habits to accommodate new technologies and new ways of conducting their everyday business, so security providers have needed to implement new strategies to cope with the massive growth in new malware and new attack vectors.

      Client Server Management

      Keeping track of these continuous and rapid changes is a demanding and complex task, but one that will doubtless be rewarding to the diligent and conscientious. Knowledge is power, and understanding the dangers posed by the modern interconnected world is the first step toward keeping one’s identity, possessions and finances safe and secure.

      - more info


      Net neutrality stalled in Congress

      A network neutrality proposal floated by members of the U.S. House Energy and Commerce Committee has stalled.

      The proposals would have prohibited wired broadband providers from "unjustly or unreasonably" discriminating against legal Web traffic, but would not apply that prohibition to mobile providers. The bill would have prohibited all broadband providers from blocking consumer access to websites and from blocking legal websites, and it would have prohibited the U.S. Federal Communications Commission from reclassifying broadband as a regulated common-carrier service for two years.

      The committee may try to push forward on net neutrality legislation after November's elections, he said, when a lame-duck session of Congress is likely.

      - more info


      Recent Backup Critical For Disaster Recovery

      It has been proven over time that most data recovery requests are for relatively recent data, and that there is a direct correlation between the age of data and the possibility that it would be required for restore purposes. Most restore requests are driven by issues such as an inadvertently deleted file or data corruption that is introduced by a virus or a hacker.

      Backup Policy

      Typically these problems are discovered within several hours or at most a few days from when they first occur, resulting in restore requests for more recent data. In general, the only time you may need to restore data that has already been archived would be in the event of a disaster that physically destroys computer equipment and facilities, such as an earthquake or a tornado. While it pays to be prepared against these occurrences, they are very rare.

      The Backup and Backup Retention Policy Template has been used to create customized policies for well over 2,000 enterprises world wide. This policy in concert with the Record Mangement Policy Template are must have Best Practices Tools for CIOs and IT professionals.

      For example, factors that CIOs and IT professionals need to consider for backup retention include:

      • Business and regulatory requirements - regulatory compliance and data preservation
      • Economic and budgetary concerns - doing more with less
      • Data loss prevention and information protection - protect, preserve and serve
      • Environmental and business sustainment - green and economically efficient
      • Maximize IT resource effectiveness and return on investment (ROI)
      • Reduce total cost ownership (TCO) of IT resources and service delivery

      Order PolicySample Policy

      With the ever changing economic climate and security threats, downtime and data loss pose intolerable risks to every business today. From CIOs to the Executive Suite, managers have seen the importance of business uptime and data protection to continued success, productivity and profitability. The Disaster Planning Template provides a road map to the most effective strategies and technologies to protect data and provide fast recovery should data be lost or corrupted due to accident or malicious action.

      - more info