More disaster recovery efforts going mobile

More disaster recovery efforts going mobile

January 21

Businesses have many options when it comes to disaster recovery, including virtualization and cloud computing, among others. Mobile technologies are also gaining steam as a viable solution to help companies communicate with staff members during major disruptions, according to a recent Computerworld report.

Michael Porier, managing director at consulting firm Protiviti, said companies with mobile strategies in place can send messages via voice, email and text so the recipient will have a greater chance of receiving the item during a disaster, Computerworld reported. This allows businesses to determine who is in harm’s way during such a disruption.

“The more mobile you can make your workforce, the better off you’ll be, so it’s certainly a tool CIOs need to think about from a business continuity perspective,” said Porier, according to Computerworld.

The movement toward mobility during disasters is gaining steam. The news provider cited a 2012 survey conducted by AT&T as an example of this trend. The study found that 67 percent of organizations include wireless technologies with their continuity plans.

BYOD also impacting disaster recovery
The bring-your-own-device (BYOD) movement taking place in the workplace is showing little signs of slowing as more employees opt to bring their own smartphones and tablets to work. According to the Computerworld report, businesses that embrace BYOD are more likely to leverage mobile technology successfully during a disaster compared to firms that fight the influx of employee-owned products.

There is a caveat with BYOD, however, according to a report by ABI Research. Since so many different platforms are accessing corporate infrastructures, firms are finding difficulty ensuring their networks are protected.

“Every smartphone subscriber end-point is a potential threat to the mobile network,” said ABI Senior Practice Director Jeff Orr. “Beyond device-specific implementations of hardware and software security, ABI Research cannot emphasize enough the need for a contextual approach: who, where, and what is being done.”

Companies that can employ non-intrusive BYOD policies can ensure their workers access the corporate network appropriately. Though the popularity of employee-owned devices in the workplace may have been met with some resistance in the past, businesses can use these tools to their advantage. In addition to protecting critical assets during a disaster, organizations can communicate with personnel to ensure they are out of harm’s way.