Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

The keys to data resilience: Hindsight, foresight and preparing for the unexpected

By W. Curtis Preston
data-center-freepik1170x658.jpg

Image via Freepik

September 20, 2022

They say hindsight is 20/20, and disaster recovery planning has been no exception to that. It’s easy to look into the past — especially someone else’s — and say, “I would have done something different.” While it’s important to look back on past events, being resilient means anticipating what’s to come in the future and preparing accordingly, especially in light of climate change. 


It is no secret that temperatures and the frequency of natural disasters are rising. 

Sweltering heat waves are taking out power grids, floods are devastating entire towns, and fires continue to rage longer, hotter and more frequently. Part of keeping data secure is being prepared in advance for exactly these sorts of situations.  


 It’s easy to look at your data center, with its redundant power and cooling, automated notification systems, and modern data protection system and think that you don’t have to worry about such things. However, think about all that redundancy in the light of some of the events of the past few years:


●    Both Google and Oracle data centers in the U.K. recently struggled to keep up with the increased demands on their cooling systems and were knocked offline when temperatures rose to a record 104 degrees. Think of the catastrophic events that could happen if even your redundant cooling system went offline due to overuse. 

●    In the U.S., wildfires have tragically taken out entire towns and the data centers that go with them. And although the infamous OVHcloud fire of 2021 was not caused by a wildfire, it just reinforces the idea that no single approach can protect you from everything.

●    Finally, the increasing risks of widespread flooding from superstorms and hurricanes means that unless all your data is stored on the top of a hill, you should seriously consider diversifying where you store your backups. 


It’s important to understand that any loss of service for your business can have significant business implications. A customer who switches to a competitor during your outage may never return. Showing up on the news as a cautionary tale is never good for a brand.


This is why it is important to look at these major disasters and ask yourself (and your team) hard questions about your potential response and if it would be any different from the companies that lost everything in such events. Are you using redundant systems in the cloud to ensure you can resume operation after such an event, or even fail over to them before a looming disaster? Is your disaster recovery system impervious to major disasters that take out the infrastructure you rely on to deliver service? If your data center has no power or internet access and is inaccessible for multiple weeks, can your disaster recovery plan accommodate that?


Going Beyond a Hindsight Approach 

If you’re unsure of the answers to these questions, then it’s past time for introspection. Follow these steps to ensure you can respond efficiently to a disaster.

  • Step one: Define and agree to recovery SLAs (RTO & RPO) for each part of the business.
  • Step two: Develop fully-automated backups that “just happen” without human intervention.
  • Step three: Consider using a Software as a Service (SaaS)-based backup and disaster recovery system that will ensure your protection copies are stored very far from anything that would do your data center damage.
  • Step four: Consider using a modern system that can automatically perform your disaster recovery in the cloud, again ensuring you can resume operation even before the disaster strikes.


Look at the headline-creating stories of data loss in the last few years, and ask yourself if you’d be prepared if that happened to your business. If the answer is no, take a look at the list above and start making better plans before it’s too late.

KEYWORDS: climate security cyber security data center disaster recovery risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

W curtis preston

W. Curtis Preston, also known as Mr. Backup. has been in the backup and recovery industry for over 25 years. Curtis has designed and implemented backup systems for the world’s largest companies, is the author of three O’Reilly books on the topic, as well as the webmaster of backupcentral.com. After following the industry for more than two decades, Preston joined Druva and is now its Chief Technical Evangelist.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Top 3 Misconceptions About Data After Death - Security Magazine

    Salesforce policy change poses grave security implications

    See More
  • hurricane-freepik

    Taking stock of your disaster response plan during hurricane season

    See More
  • cloud-security-freepik1170x658v5.jpg

    Preparing for the unexpected: 5 benefits of cloud disaster recovery

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • Physical Security and Safety: A Field Guide for the Practitioner

  • The Complete Guide to Physical Security

See More Products

Events

View AllSubmit An Event
  • January 16, 2025

    Preparing for the 2025 Threat Landscape

    ON DEMAND: In 2024, businesses faced a barrage of critical events with far-reaching impacts. From record-breaking storms and costly infrastructure failures to contentious election cycles and sophisticated cyberattacks, companies are navigating an increasingly complicated threat landscape.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing