Skip to main content


Understanding RTO (Recovery time objectives)

By: Danny Poull, V.P. Network Operations Center
Running business continuity and disaster recovery scenarios and exercises are nothing new to the CIO. It can be easy to get overwhelmed with these exercises, and one should break it down and take it one step at a time. Following this rough guideline below, you will be able to run the exercise for your own company, and also get you the data to support your conversation with management.  At the end of the day, you need to be to realistic with management, so they understand the risk and recovery before an emergency and not after.
The first place you want to start is with RTO (Recovery Time Objective). The best way to figure this out, is to break down IT by application or system. For example, one organization might have Office365 for email, a Fileshare with Quickbooks, a CRM for sales, and a SQL application for production/operations. You need to look at the items individually.
Application RTO Office365/Email 1 hour Voice /Phones/ Call Center 1 Day …
Recent posts
The CCC Process Through the Eyes of a Project ManagerKevin Jermyn, Sr. Project Manager Originally shared June 12, 2018
CCC Technologies successful upgrades/Migrations in the Avaya CM world all start with developing a project plan with emphasis on minimum risk to customer and end user.
To start, CCC Account Executives and Design Engineers engage the Project Manager, Lead Engineer, and the VP of operations once the design and customer needs are realized and developed.  We collaborate with design changes to maximize flexibility and minimize risk, which allows for less down time for the customer.  Most designs will end up with new equipment or the customer moving to a virtual environment; some with a mix of both.
Once a project is in house, the PM and Engineer discuss deploying the solution. We look at multiple sites or single sites with the same savvy.
Whether new servers or virtual servers, the key is to stand up the new servers/gateways with the existing environment.  We can now test new…

Be Proactive: How to Avoid Potential Network Failures

Be Proactive: How to Avoid Potential Network Failures For small- to medium-sized businesses (SMBs), an IT network failure can be devastating because they don't have the resources of large corporations to bounce back from such disasters. Preparation against such devastation may be the only course for them to avoid failure and survive with the least damage if failure occurs. SMBs must be proactive in recognizing the eventuality of a cyber attack or human error that can cause data loss and disrupt business continuity. This is what needs to be done to help prevent a potential failure. Be prepared: Being proactive is an essential step for preparation against a disaster. There are two ways to determine how to best prepare to prevent potential failure of your infrastructure. First, you need to identify the weaknesses throughout your systems, and second, determine how you are going to eliminate those weaknesses and protect your network. Identify the weaknesses: Determine how and why your s…

It is Heaven! Using the Cloud to Challenge Big Business

It is Heaven! Using the Cloud to Challenge Big Business Has anyone suggested you begin moving your business to the cloud? Cloud data storage or cloud computing? What is this, anyhow? And isn't it something for huge companies? In the last post we explained what cloud computing is. Simply put, it is the offsite storage of your data, and perhaps even the software packages you use. The primary benefit is pretty straightforward. Somebody else pays for all the hardware and support costs needed to store your data. You pack up all your own servers, wiring, etc. and take them to the recycling center, and save money. But is that all it is? There is a much stronger case for a small business to incorporate the cloud in their business model. The cloud allows you to become competitive with the big players in your industry. The traditional issue holding back small business: they do not have the capital to create the infrastructure to compete with large firms. They are too small to enjoy econo…

5 Ways SMBs Can Save Money on Security

5 Ways SMBs Can Save Money on Security Small-to-medium sized businesses and large enterprises may seem worlds apart, but they face many of the same cyber-security threats. In fact, in recent years, cyber-criminals have increasingly targeted SMBs. This is because it’s widely known that SMBs have a smaller budget, and less in-house expertise, to devote to protection. Thankfully, there are several things SMBs can do today to get more from even the most limited security budget. And, no, we aren’t talking about cutting corners. Far too often, SMBs cut the wrong corners and it ends up costing them more money in the long run. It’s a matter of taking a smarter approach to security. Here are five smart approaches to take Prioritize - Every business has specific areas or assets critical to its core operations. Seek the input of valued staff and team members to determine what these are. Is there certain data that would be catastrophic if it was lost or stolen? If hackers compromise a …

Four Key Components of a Robust Security Plan Every SMB Must Know

Four Key Components of a Robust Security Plan Every SMB Must Know Most businesses are now technology dependent. This means security concerns aren’t just worrisome to large corporate enterprises anymore, but also the neighborhood sandwich shop, the main street tax advisor, and the local non-profit. Regardless of size or type, practically any organization has valuable digital assets and data that should not be breached under any circumstances. This makes it the responsibility of every business, especially those collecting and storing customer/client information, to implement a multipronged approach to safeguard such information. Yes, we’re looking at you, Mr. Pizza Shop Owner who has our names, addresses, phone numbers, and credit card information stored to make future ordering easier and hassle free. Today’s SMB Needs a Robust Security Plan
Protecting your business and its reputation comes down to developing, implementing, and monitoring a robust security plan that adequately addresses…