Security+: Disaster Recovery Security - Security Boulevard

Security+: Disaster Recovery Security


The Security+ certification exam is one of the most important certifications anyone in the technology industry can obtain. The Security+ certification validates that you have established the core knowledge and baseline skills to perform security functions in a professional technology environment.

The Security+ certification exam covers many aspects of security like risk management, risk mitigation, threat management, intrusion detection, access management, cryptography, PKI, and disaster recovery. Disaster recovery can be a very important part of security many times when security breaches happen backups are needed for recovery. Disaster recovery has become an even more important part of security with the recent popularity of ransomware.

Disaster Recovery is one of the most important things any network admin can plan for in the information technology industry. Companies that do not plan for disaster recovery usually never recover from a disaster. Unplanned disasters can result in a loss of business and data that can cripple any company.

Any Security+ certified administrator will tell you to write a disaster recovery plan. Your disaster recovery plan should be available in multiple locations outlining in detail the plan in the case of a disaster. This plan will include all information you will need to recover your business it the case of a disaster. These documents contain locations of software, contact information, network documentation and much more. Many of these plans, if written properly, are 100 or more pages in length and need to be updated yearly as servers and software get updated or decommissioned.

Do you have Backups?

One of the main aspects of disaster recovery that is vital is backups. There are hundreds of backup solutions available for your organization. You will need to determine what backup solution is best for your company based on cost and the needs of your environment.

There are (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by InfoSec Resources. Read the original post at: