Think Carefully Before You Pay For Cloud Downtime Insurance

As cloud computing becomes ubiquitous, more companies are exposed to incidents that cause downtime, which can be disastrous. According to Gartner, the average cost of IT downtime is a staggering $5,600 per minute. And then there are those additional costs that don’t necessarily show up as monetary losses, such as the cost of an interruption that pulls IT people away from their regular work to get your company back up and running.

It is one reason why cloud downtime insurance has taken off in recent years. Downtime insurance providers cover clients for short-term cloud outages, network crashes, and platform failures that last up to 24 hours.

They happen often. Cloud insurance provider Parametrix says that, on average, one of the three major public cloud providers - Microsoft Azure, AWS, and Google Cloud - has an outage lasting at least 30 minutes every three weeks. Cloud downtime insurance can be a helpful safety net for businesses, but it is not a complete solution. It’s important to remember that this kind of insurance can’t guarantee that your business remains in operation during a period of downtime.

Yes, the insurance will cover you for any short-term losses you incur. But it will not cover the loss of goodwill, damage to your brand image, and loss of customer loyalty when your business can’t deliver.

Instead of relying 100% on cloud downtime insurance, organisations should pursue these three strategies to weather cloud downtime and other unexpected events.

Have A Sound Recovery Plan

Think your data is safe and secure when you move it to a cloud provider? Think again. Last year, a fire at the data centre of French web hosting service OVHcloud (Europe’s largest cloud provider) caused the loss of massive amounts of customer data. It impacted government agencies, e-commerce companies, and banks, among others.

Backing up your data to the cloud or on-premise is a critical and cost-effective first step in any disaster recovery plan. But it’s only the first step. It would help if you also had a plan to quickly recover your data in an emergency. Think of your business journey as a trip on a cruise ship. Just as a cruise ship regularly tests its lifeboats (weekly, in case you’re wondering), you should test your recovery plan often. You should simulate disruptions and see how well your recovery plan works. You should also regularly test your backup images and fix any problems. Your recovery plan is your lifeboat.

Implement Your Backup & Recovery Solution

Cloud security is not solely the responsibility of your cloud provider. It’s your responsibility as well. Cloud providers usually promise to secure their infrastructure and services. But securing operating systems, platforms, and data—that’s on you. Cloud providers will not guarantee the safety of your data. No matter what cloud platform you use, the data is still owned by you, not the provider.

Many cloud providers recommend that their customers use third-party software to protect their data.

You can comprehensively secure your data with a reliable cloud backup and recovery solution. You can also get the control you need. You should implement a cloud backup and recovery solution that protects your data by automatically backing up your information every 15 minutes and gives you multiple points of recovery. This guarantees that your data is continuously protected while providing quick access and visibility to it 24/7.

Be Proactive: Be Data Resilient

A lot of companies don’t test their data recovery plans. Many don’t even have a recovery plan. Don’t be like them. Have a recovery plan and test it often. Be proactive, not reactive. Be data resilient.

A data resilience strategy ensures business continuity in the event of a disruption. It is built on recovery point objectives (RPOs) and recovery time objectives (RTOs), and you should regularly test to guarantee that the RPOs and RTOs can be achieved. Your RPO determines your backup frequency. In essence, it’s your tolerance for data loss. Some organizations can tolerate a data loss of 24 hours, so they back up their data every 24 hours. Their RPO is 24.

Other organisations, such as those in finance and healthcare, absolutely cannot tolerate a data loss of 24 hours. Their RPOs are set to milliseconds.

Your RTO measures the downtime you can accept between a data loss and recovery. It’s how long you can be down before your business incurs severe damages. Your RTO determines your disaster recovery plan investment. If your RTO is one hour, you need to invest in solutions that get you back up and running within an hour.

Establishing your RPO and RTO and then implementing the solutions you need to achieve them are the keys to data resilience.

Final Takeaway

We live in a world of growing cyber security threats, more frequent natural disasters, and black swan events arriving in flocks. Every day, organizations are brought to their knees out of the blue. That’s why more of them are purchasing cloud downtime insurance. But it is critical to realize that this type of insurance alone does not constitute a data protection plan.

It is best viewed as a complement to your backup and recovery efforts. Never consider it a replacement.

Florian Malecki, Executive is VP Marketing at Arcserve

You Might Also Read: 

Data Protection Must Be a Part of Every Cyber Security Strategy:

 

« Microsoft Disrupts Russian Spies
EU Still Blocking Social Media Users' Data Transfer »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Prosperon Networks

Prosperon Networks

Prosperon Networks support SMB to Enterprise networks through the provisioning of network monitoring software, customisation, consultancy and installation.

MIIS Cyber Initiative

MIIS Cyber Initiative

The Cyber Initiative's mission is to assess the impact of the information age on security, peace and communications.

Norton

Norton

NortonLifeLock is dedicated to helping secure the devices, identities, online privacy, and home and family needs of approximately 50 million consumers.

Picus Security

Picus Security

Huge gaps often exists between the "perceived"​ and "actual"​ IT security level of an organization. Picus Security continuously assesses security controls and reveals deficient ones before hackers do.

Computing Technology Industry Association (CompTIA)

Computing Technology Industry Association (CompTIA)

CompTIA is dedicated to advancing industry growth through its educational programs, market research, networking events, professional certifications, and public policy advocacy.

SCIS Security

SCIS Security

SCIS Security provides affordable cyber security services and solutions to small to medium sized businesses and homes.

Fedco International

Fedco International

Fedco International is an IT and SCADA ICS Security consultancy firm.

Armis

Armis

Armis offers the markets leading asset intelligence platform designed to address the new threat landscape that connected devices create.

Hub One

Hub One

Hub One is a leading player in digital transformation with expertise in broadband connectivity, business solutions for traceability and mobility, IOT in industrial environments and cybersecurity.

Scythe

Scythe

SCYTHE is a next generation red team platform for continuous and realistic enterprise risk assessments.

Secured Communications

Secured Communications

Secured Communications has developed the only unified secure communications platform trusted by public safety and counter terrorism professionals around the world.

Zephyr Project

Zephyr Project

The Zephyr Project strives to deliver the best-in-class RTOS for connected resource-constrained devices, built to be secure and safe.

Probity

Probity

Probity Inc. is a certified software development and systems engineering company, providing support to federal government and national defense related clients.

InfoSec4TC

InfoSec4TC

InfoSec4tc is an online Information Security Courses, Training, and Consultancy provider.

Focus Digitech

Focus Digitech

Focus Digitech helps you with your digital transformation journey with our main core offerings of Cloud, Cybersecurity, Analytics and DevOps.

SecurEnvoy

SecurEnvoy

SecurEnvoy are a leader in designing zero access trust solutions using the latest cutting-edge technologies, to protect your users, devices and data, whatever the location.