disaster recovery planning

27
IT Disaster Recovery for Medical Practices High Level Overview November, 2010 3-13 1 www.keystone-it.com

Upload: keystone-it

Post on 18-Jul-2015

59 views

Category:

Healthcare


1 download

TRANSCRIPT

Page 1: Disaster Recovery Planning

IT Disaster Recovery for Medical Practices

High Level Overview November, 2010

3-13 1 www.keystone-it.com

Page 2: Disaster Recovery Planning

Agenda

•  Business Continuity, DR and Data Backup • HIPAA Regulatory Concerns •  Scenario: “Your Worst Nightmare” • Disaster Recovery Planning •  Business Costs of Data •  The Recommended Solution •  Factors to Consider

3-13 2 www.keystone-it.com

Page 3: Disaster Recovery Planning

Business Continuity, DR and Data Backup }  What's the difference between business continuity planning, disaster

recovery planning, and back ups? }  Business Continuity encompasses Disaster Recovery, Backups and even

business succession planning. It provides the strategy and process involved to make sure your company survives the loss of key individuals, data, equipment, or facilities.

}  Disaster Recovery typically refers how companies recover from large scale disasters, like an earthquake or the terrorist attacks such as that on the World Trade Center.

}  The basic building block of both is how you back up your data. On site, off-site, frequency, total, incremental…

}  Both business continuity plans and disaster recovery plans determine how a company will keep functioning after a disruptive event until its normal facilities and capabilities are restored.

3-13 3 www.keystone-it.com

Page 4: Disaster Recovery Planning

Regulatory Concerns }  HIPAA Privacy Rule – General guidelines relative to

Protected Health Information (PHI)

}  HIPAA Security Rule – Specifically regarding electronic PHI (ePHI) }  Two considerations:

}  General Access }  Emergency Access

3-13 4 www.keystone-it.com

Page 5: Disaster Recovery Planning

HIPAA Security Rule General Access: }  The Security Rule defines General Access in §164.304 as:

}  “the ability or the means necessary to read, write, modify, or communicate data/information or otherwise use any system resource.”

3-13 5 www.keystone-it.com

Page 6: Disaster Recovery Planning

HIPAA Security Rule Emergency Access: }  The Security Rule defines the Emergency Access Procedure in

§164.312. }  This specification requires a covered entity to:

}  “…establish procedures for obtaining necessary electronic protected health information during an emergency….”

}  Procedures must be established beforehand to instruct workforce members on possible ways to gain access to needed ePHI in a situation in which normal environmental systems, such as electrical power, have been severely damaged or rendered inoperative due to a natural or manmade disaster.”

3-13 6 www.keystone-it.com

Page 7: Disaster Recovery Planning

This means….

YOU MUST HAVE A DISASTER RECOVERY PLAN!

3/21/13 www.keystone-it.com 7

Page 8: Disaster Recovery Planning

By the Numbers }  93% of companies that lost their data for 10 days or more

filed for bankruptcy within one year of the disaster, and 50% filed for bankruptcy immediately. (Source: National Archives & Records Administration in Washington.)

}  20% of small to medium businesses will suffer a major disaster causing loss of critical data every 5 years. (Source: Richmond House Group)

}  This year, 40% of small to medium businesses that manage their own network and use the Internet for more than e-mail will have their network accessed by a hacker, and more than 50% won’t even know they were attacked. (Source: Gartner Group)

3-13 8 www.keystone-it.com

Page 9: Disaster Recovery Planning

By the Numbers }  About 70% of business people have experienced (or will

experience) data loss due to accidental deletion, disk or system failure, viruses, fire or some other disaster (Source: Carbonite, an online backup service)

3-13 9 www.keystone-it.com

Page 10: Disaster Recovery Planning

Close Your Eyes……

A case for change

3-13 10 www.keystone-it.com

Page 11: Disaster Recovery Planning

You Ask Yourself…. }  Is everyone ok? }  What do we do now? }  Do we have backups? }  Who owns the data? …YOU DO!

3-13 11 www.keystone-it.com

Page 12: Disaster Recovery Planning

Disaster Recovery Plan }  Create a Disaster Recovery Plan NOW!

}  Document step by step recovery procedures necessary for you to completely rebuild infrastructure and restore data

}  Include personal contact information on all stakeholders, vendors, contractors, and personnel

}  Test the plan… }  Rehearse }  Run test data restores }  Time yourself...

}  Disseminate the DRP }  Make several copies }  Store off-site

3-13 12 www.keystone-it.com

Page 13: Disaster Recovery Planning

Causes of Catastrophic Data Loss }  Natural Disaster

}  Hurricanes }  Floods }  Fires }  Lightning }  Power Surges

}  Man-made Disaster }  Viruses }  Theft }  Hardware damaged }  Software corrupted }  Human error

Are You Ready?

3-13 13 www.keystone-it.com

Page 14: Disaster Recovery Planning

Are You Ready? Little Sioux Scout Ranch, Iowa

3-13 14 www.keystone-it.com

Page 15: Disaster Recovery Planning

Are You Ready? New Orleans

3-13 15 www.keystone-it.com

Page 16: Disaster Recovery Planning

Are You Ready?

3-13 16 www.keystone-it.com

Page 17: Disaster Recovery Planning

Business Costs of Data } The value of data varies significantly among industries, the size of the company and even by an application within the same firm. The lost business opportunity due to a website outage for a small law firm may be inconsequential. The cost to a company such as Amazon, American Express, eBay or Visa may be on the order of several million dollars per hour.

} To determine the value of data, answer the following questions: } What are the costs for lost data per hour for the applications that are being protected? } What are the costs for delayed processing (data not lost, although application isn't running for some time) on a per hour basis?

3-13 17 www.keystone-it.com

Page 18: Disaster Recovery Planning

A Comprehensive Solution Must…

Valuable Data &

Minimize Downtime!

Protect

3-13 18 www.keystone-it.com

Page 19: Disaster Recovery Planning

BDR – The Recommended Solution

BDR = Backup & Disaster Recovery Server

3-13 19 www.keystone-it.com

Page 20: Disaster Recovery Planning

BDR - 1,000 Foot View

Network Operations Center

Secondary Data Center Primary Data Center

3-13 20 www.keystone-it.com

Page 21: Disaster Recovery Planning

BDR Solution Details }  On-site and Off-site Backups }  No hardware investment – Service based

}  HAAS: Hardware As A Service

}  A Microsoft Windows Server-only solution }  A BDR is required at each location where servers exist }  Block Level Backups vs. File-level }  Incremental Forever Methodology - near real-time

backup (every 15 minutes) }  Security: 256 AES Encryption on NAS and off-site }  HIPAA Compliant

3-13 21 www.keystone-it.com

Page 22: Disaster Recovery Planning

State-of-the-Art Technology

}  Standby server - NAS speedily converts to a virtual server and business continues within minutes

}  Allows for seamless, daily off-site, HIPAA-compliant storage

}  Data stored at multiple highly available, highly secure Data Centers

}  Easy web-based restoration of files }  BDR provides capability to perform bare metal

restores to dissimilar hardware

3-13 22 www.keystone-it.com

Page 23: Disaster Recovery Planning

Restoration and Virtualization

}  Restore MS-SQL databases, individual files, file folders, email messages, and Exchange mailboxes

}  In the event of catastrophe (such as a natural disaster or fire), a new NAS will be imaged at our collocation facility and sent shipped overnight.

}  For HIPAA compliance, data will never be hosted, only stored at a collocation facility. It is encrypted without the encryption key; it won’t be accessible by 3rd parties.

3-13 23 www.keystone-it.com

Page 24: Disaster Recovery Planning

Factors to Consider

}  A viable solution should cover all the computing platforms in the business that it is being utilized.

}  Off-site and on-site backups should occur at regular intervals to meet individual clients’ needs.

}  Backups should occur rapidly and seamlessly to avoid interfering with server performance while the backup process is being executed.

3-13 24 www.keystone-it.com

Page 25: Disaster Recovery Planning

Factors to Consider

}  For best results, off-site backup should be provided at a hardened, secure data center, and that has a high level of physical security in place along with internet and power redundancy

}  Data should be secure on-site as well as off-site by using a high level of encryption per regulatory guidelines for PHI.

}  The encryption key should be kept in a secure location (such as the DRP document) either by the end-client themselves, or their respective solution provider

3-13 25 www.keystone-it.com

Page 26: Disaster Recovery Planning

Factors to Consider }  It’s important to know the recovery time frame following

a server crash or catastrophe. The procedure for rebounding must not be complex, but rather, comprised of a few simple, straight-forward steps recorded in a DRP document.

}  Ensure that there are no hidden fees — the cost to maintain and manage the solution on a weekly, monthly, and annual basis — plus any labor expenditures — should be taken into consideration before signing a deal.

}  Are you being provided with coverage 24 hours per day, 365 days per year?

3-13 26 www.keystone-it.com

Page 27: Disaster Recovery Planning

Questions?

3-13 27 www.keystone-it.com

[email protected]