Disaster Recovery Services: Overview
Given the meteoric rise of Internet business transactions and the development of powerful mainframe-quality information technology systems for small and mid-size businesses, it should come as no surprise that organizations of all types and sizes are increasingly dependent on information technology, computer systems/servers, and electronic storage devices to run their operations.

Customer records, vendor transactions, supply orders, transportation schedules and details, employee files, market analyses, inventory, medical records, financial transactions, manufacturing schedules and legislative actions are all created, saved and transmitted via computer systems, servers, storage devices and Internet equipment.

Devices and equipment that are subject to an increasing number of threats and perils.

At one time, the words “disaster recovery” conjured up visions of equipment irreparably damaged or destroyed by hurricanes, tornados, floods, fires, or collapsed roofs from snow and ice – all acts of nature.

As recent occurrences have so vividly demonstrated in the United States, dangerous acts of nature continue to exist – and threaten our technological infrastructure. But new dangers have been added. These dangers arise from acts of terror and acts of malice.

IBM has reported that network attacks against critical infrastructure providers such as utilities, telecommunications companies and government agencies surged 55 percent from July to August 2004. Since July 2004, IBM has seen a 27 percent increase in overall network attacks against all monitored enterprises and businesses. And data are not yet available on the number of computers, servers, storage and IT devices that were completely destroyed in the tragedy of 9/11.

Compounding the situation are what have been termed “acts of malice” from disgruntled employees. In 2003, a report issued jointly by the Computer Security Institute and the San Francisco FBI Computer Intrusion Squad noted that disgruntled employees were a major source of IT attacks. Although such attacks focus primarily on laptop theft, denial of service attacks and Internet misuse, there have been reports of hardware destruction and IT system sabotage.

Clearly, the need for a comprehensive Disaster Recovery Equipment Replacement Plan is greater than ever. El Camino Disaster Recovery Services has over 20 years in providing such a service.
slide01

Home  »  Overview  »  Definition  »  Benefits  » 
FAQ  »  Contact Us   » 

All contents copyright ©2014 El Camino Disaster Recovery.
All rights reserved.