{"id":1162,"date":"2018-03-13T04:38:29","date_gmt":"2018-03-13T01:38:29","guid":{"rendered":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/?page_id=1162"},"modified":"2018-03-14T15:53:39","modified_gmt":"2018-03-14T12:53:39","slug":"disaster-recovery","status":"publish","type":"page","link":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/services\/continuity-resilience-recovery\/disaster-recovery\/","title":{"rendered":"Disaster Recovery"},"content":{"rendered":"<!--[fluid]--><!--{content}-->    <!--[section]-->\n\t\t<style>\n.bd-section-1396687306{background-color:#0aa6ce;}\n.bd-section-1396687306{\n\ttext-align:  center;\n}\n<\/style>\t\t<section id=section33 class=\" bd-section-1396687306 bd-page-width  bd-tagstyles\" data-section-title=\"Section\">\n\t\t\t<div class=\"bd-container-inner bd-margins clearfix\">\n\t\t\t\t<!--{content}-->\n\t\t\t\t\t<!--[image]--><style>\n.additional-class-312241808{width:100%;}<\/style><img src=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-content\/uploads\/2017\/12\/disaster-recovery.jpg\" alt=\"Disaster Recovery, Continuity, Resilience &amp; Recovery, Information Technology Disaster Recovery Planning\" class=\" additional-class-312241808   bd-imagestyles bd-own-margins\"><!--{content}--><!--{\/content}--><!--[\/image]-->\t\t\t\t<!--{\/content}-->\n\t\t\t<\/div>\n\t\t<\/section>\n\t<!--[\/section]-->\n<!--{\/content}--><!--[\/fluid]-->\n    <!--[section]-->\n\t\t\t\t<section id=section5 class=\" bd-section-573603528  bd-tagstyles\" data-section-title=\"\">\n\t\t\t<div class=\"bd-container-inner bd-margins clearfix\">\n\t\t\t\t<!--{content}-->\n\t\t\t\t\t    <!--[columns]-->\n        <style>\n.bd-layoutcontainer-126657648 > .bd-container-inner > .container-fluid > .row{height:100%;margin:0px;}\n.bd-layoutcontainer-126657648 > .bd-container-inner > .container-fluid > .row > div{padding:0px;}\n.bd-layoutcontainer-126657648  > .bd-container-inner > .container-fluid:after{display:none;}<\/style><style>\n.bd-layoutcontainer-126657648 > .bd-container-inner > .container-fluid, .bd-layoutcontainer-126657648 > .bd-container-inner > .container-fluid > .row{height:100%;}<\/style><style>.bd-layoutcontainer-126657648 > .bd-container-inner > .container-fluid {padding-left: 0; padding-right: 0;}<\/style>        <style>\n.bd-layoutcolumn-2087752868{background-color:#ffffff;min-height:250px;-webkit-box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);-o-box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);-ms-box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);-moz-box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);margin:-4em 2em 2em;padding:2em;border-radius:20px;}\n@media (max-width: 767px) {.bd-layoutcolumn-2087752868{margin:-2em 1em 2em;}}<\/style>        <div class=\" bd-layoutcontainer-126657648  bd-columns bd-no-margins\">\n            <div class=\"bd-container-inner\">\n                <div class=\"container-fluid\">\n                    <div class=\"row bd-row-flex bd-row-align-middle\">\n                        <!--{content}-->\n                                <!--[column]-->\n        <div class=\"col-lg-12 bd-columnwrapper-2087752868\">\n            <div class=\"bd-column  bd-layoutcolumn-2087752868  bd-no-margins\">\n                <div class=\"bd-vertical-align-wrapper\">\n                    <!--{content}-->\n                        <!--[html]--><style>\n.additional-class-231610753{padding-right:1em;padding-left:1em;}<\/style><style><\/style><div class=\"bd-tagstyles  additional-class-231610753 \"><div class=\"bd-container-inner bd-content-element\"><!--{content}--><h1>Disaster Recovery (DR)<\/h1>\r\n<h5 style=\"text-align:center\"><b>Continuity, Resilience & Recovery<\/b><\/h5>\r\n\r\n<p>A disaster can be anything that puts an organization's operations at risk, from a cyber attack to equipment failures to natural disasters. The goal with DR is for a business to continue operating as close to normal as possible. The disaster recovery process includes planning and testing, and may involve a separate physical site for restoring operations.<\/p>\r\n\r\n<p>Businesses use information technology to quickly and effectively process information. Employees use electronic mail and Voice Over Internet Protocol (VOIP) telephone systems to communicate. Electronic data interchange (EDI) is used to transmit data including orders and payments from one company to another. Servers process information and store large amounts of data. Desktop computers, laptops and wireless devices are used by employees to create, process, manage and communicate information. What do you when your information technology stops working?<\/p>\r\n\r\n<h3><b>Resources for Information Technology Disaster Recovery Planning<\/b><\/h3>\r\n<ul>\r\n<li>Computer Security Resource Center <\/li>\r\n<li>Contingency Planning Guide for Federal Information Systems <\/li>\r\n<li>Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities<\/li>\r\n<li>Building An Information Technology Security Awareness and Training Program<\/li>\r\n<li>IT Standards, Guidelines, and Tools and Techniques for Audit and Assurance and Control Professionals<\/li>\r\n\r\n<\/ul>\r\n\r\n\r\n<h3>Components Needed<\/h3>\r\n\r\n<ul>\r\n  \r\n    <li>Information Technology Disaster Recovery Planning policy statement, plan overview and main goals of the plan.<\/li>\r\n    <li>Key personnel and DR team contact information.<\/li>\r\n    <li>Description of emergency response actions immediately following an incident.<\/li>\r\n    <li>A diagram of the entire network and recovery site.<\/li>\r\n    <li>Directions for how to reach the recovery site.<\/li>\r\n    <li>A list of software and systems that will be used in the recovery.<\/li>\r\n    <li>Sample templates for a variety of technology recoveries, including technical documentation from vendors.<\/li>\r\n    <li>Tips for dealing with the media.<\/li>\r\n    <li>Summary of insurance coverage.<\/li>\r\n    <li>Proposed actions for dealing with financial and legal issues.<\/li>\r\n    <li>Ready-to-use forms to help complete the plan.<\/li>\r\n\r\n<\/ul><!--{\/content}--><\/div><\/div><!--[\/html]-->                    <!--{\/content}-->\n                <\/div>\n            <\/div>\n        <\/div>\n    <!--[\/column]-->\n                        <!--{\/content}-->\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    <!--[\/columns]-->\n\t\t\t\t<!--{\/content}-->\n\t\t\t<\/div>\n\t\t<\/section>\n\t<!--[\/section]-->\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":2326,"parent":1158,"menu_order":6,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages\/1162"}],"collection":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/comments?post=1162"}],"version-history":[{"count":0,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages\/1162\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages\/1158"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/media\/2326"}],"wp:attachment":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/media?parent=1162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}