Why you need a disaster recovery plan

Every business, no matter its size or location, should have a comprehensive disaster recovery plan.

A disaster can be classed as anything that will put your business at risk, such as cyber-attacks, equipment malfunctioning or a natural disaster such as a fire or flood, which can destroy everything.

When a disaster strikes it can seem like the end of the world. We help put a plan in place, so you can carry on operating as normal.

Types of disasters

A disaster can be caused by both human error and nature, with some more likely to occur than others. These are the most common types:

  • Application/software or machine failures such as a laptop or computer
  • Structural damage at your building or workspace
  • Network failure
  • Virus or security breach
  • Data centre disaster caused by fire, flood, or power failure

No business can afford long-term downtime. If a disaster occurs and your business isn’t prepared, the long term impact could be severe.

Our experience tells us that recovery from significant data loss is tough, and many businesses fail once they have experienced data loss and did not have a recovery plan in place.

SCS Technology Solutions can set up disaster recovery to ensure this doesn’t happen to you.

SCS Ablaze

Peace of mind disaster recovery

One of the promises to our customers is that we will never let them down and to do this we complete careful planning when it comes to implementing a strategy for your business.

Our disaster recovery allows us to quickly respond to unplanned incidents that threaten your hardware and software, networks, procedures and people.

To reduce downtime for your company, we use a blend of on-site and off-site recovery to get you back up and running in no time, regardless of the event.

As we constantly monitor your servers and data 24/7, we are often aware of problems before you are. Our disaster recovery involves:

  • Using an external tape or hard drive on-site that has a copy of all the data to restore it to the systems
  • Remotely storing a copy of your most recent data
  • As soon as we are aware of the loss of data, we can begin the recovery process

Disaster recovery means peace of mind and reduced impact on your business.

Take advantage of our FREE IT review

Straight from our customers...

Mundy’s have used SCS for a period in excess of 15 years and during that time we have found them to be 100% reliable. They are quick to respond to all questions, queries and IT related issues which we put to them (no matter how trivial they are). We would recommend their services to all sectors.

121 years combined technical experience

SCS Technology Solutions was established in 1995, and has become a preferred partner in the region.

Gold Microsoft Partner since 2007

Our status as a Gold Microsoft Partner makes us the best-qualified IT organisation in the region.

Qualified engineers to Microsoft standards

Our Microsoft Certified engineers offer guaranteed and audited response times for all our services.

1hr 43m average response time

Our impressive average response time to a server failure. We get you back up and running in no time.

Our FAQ's

Our most frequently asked questions about recovery.

If you would like to find out more information, please click below.

Send us your question

Q. My internet is down, how can I communicate with the outside world?

A.

In today’s world it’s critical to remain connected. It pays to have a backup internet connection installed with a different carrier, you could even consider a 4G backup connection. Combined with a failover-capable firewall/router you can seamlessly switch between internet connections in the event of your main line failing. Keeping everyone functioning while you fix the original internet connection.

Q. I’ve suffered a cyptolocker/ransomware infection. What do I do?!

A.

Immediately try to identify the source computer of infection and switch it off, or if necessary turn of all computers if it’s not clear which is infected– this is to stop it spreading any further. Usually the infected computer is the one that has a ransom note left on it. Do not be tempted to pay the ransom monies, there’s no guarantee you’ll get your data back. The recovery strategy now is to restore from backups or failover onto your backup servers while backup recovery is happening. If you’ve suffered an infection, its high-time you review your security software!

Q. If there’s loss/interruption of IT services; how can I keep business functioning?

A.

Firstly, it’s important to plan for these events – understanding your IT requirements is key to ensuring maximum uptime. Different technologies you use require alternate measures, so it’s important to execute a pre-determined plan using backup technologies that are adequate for your needs.

The scale of the incident must initially be established, as understanding the original fault will influence the recovery procedure. You may need to switch to backup infrastructure. The use of replicated virtual servers can be utilised in a total-loss situation, either hosted in another building on your site, or on the cloud. Network/Internet backups can be implemented with internet providers to provide fast connectivity to temporary services – so your choice of ISP is important. These services can then be used to migrate your IT requirements back onto replacement hardware if necessary.

Q. I can’t get into a folder on our server, what should I do?

A.

Server folders are protected so that users can only access certain locations, if you do not have permissions to access a required folder you will need to speak to your IT Administrator to have the permissions adjusted.

Book your FREE IT review

The digital landscape is constantly changing and, in order to keep your business ahead of the competition, you need to know you have the best available technology at your disposal.

We can offer you a FREE on-site IT evaluation of your current infrastructure with one of our certified engineers to assess your operation and provide a fully comprehensive report of our findings.

Book your FREE IT Review 01522 883636
Microsoft Gold
Intel Gold
WatchGuard One Logo
Cyber Essentials