Business Continuity Management

The requirement for Business Continuity and Disaster Recovery are becoming more important due to the increasing reliance on IT in the modern world. No-one has a crystal ball that can predict the future and give notice of unexpected occurrences that could impact your organisation. This is why it is so important that organisations have a solid, sensible, relevant and tested Business Continuity Strategy. This is not only to ensure that your organisation continues to provide critical business requirements during unforeseen circumstances but also to maintain the organisation’s reputation within the business arena at all times. A considerable amount of damage can be inflicted on an organisation through adverse media coverage or loss of business reputation. Disaster Recovery is a sub-set of Business Continuity, they are normally considered at the same time but they are separate entities.

Business Continuity is the process of ensuring that an organisation’s critical business functions are available in line with the business requirements that depend on them and are able to survive critical business risks. This involves not only the availability of data, but includes all business requirements to deliver the organisation’s business services in a timely manner for example the infrastructure, IT and personnel. A sensible approach is to conduct a Business Impact Assessment to determine the business critical aspects and the associated risks of your organisation (please follow the links to see a more detailed review of Business Continuity Management and Disaster Recover Strategies, and also how Regency IT Consulting can provide a Business Impact Assessment tailored to your organisation).

Flyer - Business Continuity Management Strategy (237 downloads)

 

Components of Information Risk

Risk is a combination of three main component factors:

  • Asset – The starting point for any information risk is the asset – information asset examples can range from an A4 paper sheet containing a single business concept to a  complex internet-based network architecture employed to process your entire business data;
  • Threat – Next is the threat to your information assets, whether in human form from malice or accident, or from natural hazards; and,
  • Vulnerability – Finally, the vulnerability that all information assets carry; paper documents, if not appropriately filed may be easily misplaced for example. On the other hand an internet-based network can often be hacked without user knowledge.

Through further analysis of each of these main component factors measurable values can be determined to assist in business – including cost-based – risk-management decisions.

Please read our Flyer for more information on this topic.

Flyer - Components of Information Risk (201 downloads)