February 13, 2018 | by Kim Brand
You are hanging by a thread and you don’t even know it. Your Internet connection is delivered by two wires that connect to a box on the outside of your office – and all that separates you from disaster is a cable removed from a jack on the wall.
You store critical information important to the success of a case or the reputation of your firm on a server that is out of warranty. You ‘think’ you have a backup – but you can’t remember the last time you made one or where you keep it. Everything is working now. What could possibly break?
Computers have become so reliable that we seldom consider the possibility that something can go very wrong very quickly; credit that to the increased quality control that manufacturers achieve to remain competitive. The cost of a single support call can exceed the profit on a new PC. Warranty service is expensive too.
The fact is that thousands of PCs and servers in Indianapolis fail every year. Google, who operates millions of hard drives, expects 10% of them to fail every year. Translate that your office: If you operate a network of 20 PCs two of them are likely to stop working this year. If one of them is used by an attorney on a deadline you call that a VBD: Very Bad Day.
Given the hyper-dependence we have on our PCs, servers, networks and Internet one would assume that a reasonable person would array multiple defenses against the most common threats. In my experience, that assumption would be uncorroborated by the facts. Few firms are prepared.
Pair Threats with Defenses
Technology has provided us with tools that allow unparalleled productivity. And it would seem that these new gadgets create new threats to the safety of important information. But that would be incorrect; you only need to worry about three:
- Acts of God
- Acts of Violence
- Acts of Stupidity
Each requires a different defense. Offsite backups, surge suppressors and redundant hard drives are the best defenses against Acts of God. Anti-Virus and Anti-Malware software, secure passwords, firewalls and encryption programs repel miscreants who want to steal your data or destroy it. Mistakes and mishaps are the most common threats. A series of backups, good policies and procedures and frequent training can help defend against those.
Backups should be tested regularly. Don’t be put off by the complexity! Here is a simple backup audit rubric:
- Create a file
- Wait a while
- Delete it
- Attempt to get it back
Note the results:
- Did you get it back?
- Was it hard to do?
Practice this little procedure a few times a year. If you are lucky, you’ll never need to conduct the drill for real.
Maintenance of critical services is often overlooked in backup plans. Imagine that your Internet goes down. How would your firm cope without e-mail for two or three days? What if your phone system goes down? With modern VOIP systems they are likely to fail at the same time. Even simple problems can take a day to repair. Forget to renew your domain name? Misplace the bill for your DSL service? Maintenance in your building disconnects cables without warning? Each can take from hours to days to diagnose and repair.
A simple disaster recovery plan starts with an inventory of every service you depend on, whom to call when it breaks and what to do to work around an outage. Law firms depend on PCs and phone companies, Internet service and e-mail providers, network admins and software vendors. Assemble the contacts, account numbers, service agreements and work-arounds before you need them. The list should be updated frequently and audited.
Backup is not Disaster Recovery
Be aware that a good backup is far from a disaster recovery solution. I recommend protecting the entire ‘Value Stack’ on a server or a critical PC:
- Hardware: vendor , repair/replacement arrangements
- Operating System: licenses, activation codes, etc.
- Configuration: Users, Groups and Permissions
- Application Software: licenses and updates
Generally this means keeping an ‘image’ of the server or PC on multiple/inexpensive USB drives. Backup software may be included with your system . . . or added on. It may cost thousand dollars or more. But the cost is negligible compared to the potential loss.
Google these terms for more:
- Survivor or Statistic
- Full Server Failover
- Disaster Recovery Journal
Remember: An unmonitored backup system is like not having a backup at all. The most important part of a good backup plan? Making someone responsible to make sure it happens.