Disaster Recovery and Planning

By: Security Cube  09-12-2011

Every business and organization can experience a serious incident which can prevent it from continuing normal operations. This can happen any day, at any time. The potential causes are numerous and vary: flood, explosion, computer malfunction, accident, grievous act.. the list is endless.

It is vital that the organization takes the development and maintenance of the disaster recovery plan seriously. It is not a task that can be left orleft until someone finds enough time to deal with itas a serious incident can, of course, occur at any time.


It is good practice for the organization's Board or Governing Body to demonstrate a clear commitment to establishing and maintaining an effective disaster recovery planning process.

All management and staff should be informed that a disaster recovery plan is required in order to ensure that essential functions of the organization are able to continue in the event of serious, adverse circumstances.


Having obtained the full backing? of the organization, the person or team developing the plan needs to  carefully prepare.

A good place to start is to create a list of all necessary documents and information. Where this may include documents containing sensitive information, extra care must be taken to ensure that confidentiality is not compromised.

To assist, we have prepared a list of documents and information which could be included as part of this exercise.


The disaster recovery plan should include a descriptive list of the organization's major business areas. This list should rank the areas in order of importance to the overall organization.

Each item should include a brief description of the business process and main dependencies on systems, communications, personnel, and information / data.

To assist, we have prepared a list of functional areas/processes which could be included as part of this exercise. Contact us for more information

Contact Security Cube

Email - none provided

Print this page

Other products and services from Security Cube


Application Security and Certification

An organization that earns our enterprise certification has secured its mission-critical business systems, networks, applications and physical environments, including its external perimeter, internal networked infrastructure, wireless environment, desktops and analog modems, and physical and human/administrative environment.


Application Vulnerability

Security Cube Web Audit provides a thorough review of all web applications, and a comprehensive report of vulnerabilities and the necessary steps required to address any existing or potential breaches in security. Enables developers to identify programming oversights that result in web security flaws and non-compliance;• provides a prioritization of issues;• provides repair recommendations.


Infrastructure Security Compliance

To train and maintain internal resources and to maintain compliance can be costly in terms of time and money.Security Cube's security compliance service is designed to monitor systems and networks against industry-established standards.


Black Box Security Testing

All Security Cube reports are customized to reflect requested reporting requirements, and include an executive summary, a full outline of all the steps performed, detailed technical findings, and recommendations. This test ensures that the application can tolerate and manage 'heavy load' usage, such as complex numerical values, large number of inputs, large number of queries etc.