It's important for businesses to have a disaster recovery plan that accounts for new technological initiatives.

Disaster recovery planning must account for changing technologies

As businesses continue to implement new technologies in the digital age, it’s important for decision-makers to ensure that the right precautions are taken, in order to protect an organization from data breaches.

Disaster recovery planning has to include new initiatives as well as older ones. That way, companies will have a better chance of having quick business resumption should their business fall prey to cyber criminals.

One new technology that is becoming more prevalent in daily operations is cloud computing. Panelists at the annual State of the Net technology policy conference discussed what companies should take into consideration when trying to integrate their systems. 

Robert Holleyman, president and CEO of the software trade group BSA, said at the event that it’s necessary for policymakers to be as educated as possible. Cloud computing might be gaining popularity, but when key stakeholders are well-informed, it helps the initiative become more than just a buzz word.

Deven McGraw, director of the Health Privacy Project at the Center for Democracy and Technology, a Washington digital rights group, spoke at the conference and said that healthcare has a high degree of misinformation when it comes to the cloud.

“Healthcare also has an issue of uncertainty and this issue of control,” McGraw said. “I think it’s a very scary proposition for a lot of healthcare providers to think about having their data management functions not within their four walls. They’re responsible for that data, they know that, and the idea that they would cede that, some portion of that, to somebody else and yet still be liable for those decisions is very scary.”

This blog has previously discussed the importance of data security, especially within the healthcare industry. Working with a firm that specializes in disaster recovery consulting can help organizations conduct thorough risk assessments, which can ensure a faster recovery process should a data breach occur.