Cloud, hosting, and remote access technologies make it possible for firms and their staff to work from anywhere they choose. Unfortunately, many firms haven't updated their risk assessments, internal procedures, data backup and archiving strategies, and documentation since the days of Windows 95 and Novell NetWare. Identify areas of critical weakness, or threats, in your backup and recovery systems; classify your applications as "critical" or "non-critical;" and define the order of recovery. Discuss how widespread hosting of email, web portals and web applications can render many backup, disaster recovery, and business continuity strategies obsolete.
Email Address: | |
Password: |