• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • MARKETS & PRODUCTS
    • Markets


      Construction

      Cybersecurity

      Fixed Gas & Flame Detection

      General Industry

      Healthcare

      HVAC-R

      Oil & Gas

      Training

      Utilities

      Products


      Combustion Analysis

      Confined Space

      Connected Work

      Corporate

      Fall Protection

      Fixed Gas & Flame Detection

      Gas Analysis

      General

      Head Protection

      Heat Stress

      Leak Detection

      Portable Gas Detection

      Refrigerant Analysis

      Respiratory Protection

      Column
  • SUBSCRIBE

Building an Effective Information Security Program with Business Continuity and Disaster Recovery

2 Min Read | Jan 6, 2023

Reading Time: 2 minutesIn this space, we have covered different ways to build an Information Security program utilizing a defense-in-depth approach. If the protections that have been put in place fail, the final stop gap in protecting the business is your Business Continuity, Disaster Recovery, Incident Response Plan.

January 6, 2023 by Melina Mangino

Reading Time: 2 minutes

In this space, we have covered different ways to build an Information Security program utilizing a defense-in-depth approach. The previous articles identified ways to quickly protect your program in a significant manner as well as planning on how to better secure for the future. Unfortunately, zero-day attacks, nation state and APT actors, human error, and IT sprawl continually add complexity, cost, and chaos to protecting your environment.

If the protections that have been put in place fail, the final stop gap in protecting the business is your Business Continuity (BC), Disaster Recovery (DR), Incident Response Plan (IRP).

As these plans are created, keep in mind things like recovery time objective (RTO) and recovery point objective (RPO). RTO is the maximum length of time that an organization expects to return to normal operations after an outage. RPO on the other hand is the maximum amount of data loss the organization can handle.

  • Business Continuity focuses on keeping an organization operational during a disaster
  • Disaster Recovery for restoring data access and IT infrastructure
  • Incident Response Plan everything you would do in an incident kept in a manner accessible when systems are down such as redundant, encrypted USB’s.

The next steps should include identifying critical data and systems that need to be protected, determining the appropriate method for backing up these systems, as well as a routine schedule of creating and testing backups.

There are many different types of backups that can be performed based on how long the data will be stored, how quickly it would need to be recovered, and RTO/RPO.

Cloud backup systems typically offer 3 tiers of backup site based on how they are prepared and how quickly they need to be operational. An ‘air-gapped‘ backup is completely disconnected from the network so that it is not impacted by any disaster.

Now that you have a plan and backups are being performed, there’s still the final step of routine testing of backup files to ensure that you can restore essential data when it’s needed.

If you fail to plan, you are planning to fail!

Benjamin Franklin

Recommended for You

Cybersecurity

Communicating Information Security Goals

February 1, 2024
2 Min Read
Cybersecurity

Plan for a Secure New Year

January 1, 2024
< 1 Minute Read
Cybersecurity

Building a Third Party Risk Management Program

March 1, 2024
2 Min Read
MSA Cyber Security
Cybersecurity

Securing Your Office Email Environment

April 2, 2024
2 Min Read
Share:

Footer

MSA MISSION: That men and women may work in safety and that they, their families, and their communities may live in health throughout the world.

MSASafety.com

  • Construction
  • General Industry
  • Oil & Gas
  • HVAC-R
  • Utilities
  • Fixed Gas & Flame Detection
  • Fire Service
MSA on Facebook   MSA on X   MSA on Instagram   MSA on LinkedIn   MSA on YouTube  

Contact

  • blog@msasafety.com
  • 1-800-672-2222
  • View All Contact Info
  • Subscribe

Other MSA Blogs

  • Fire Service – The Scene
  • FieldServer – The Safety Connection

© 2024 MSA. All rights reserved.

© 2025 MSA . All rights reserved.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT