What is a risk assessment?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Once a business impact analysis (BIA) has been completed, you will have an excellent view of how your organization operates, what it needs to operate, and how quickly critical systems and data must be recovered for the business unit to resume normal operations. It’s also important to identify external and internal risks and threats to the operational issues identified in the BIA.
Conduct a risk assessment to identify situations that may produce disruptive events to your organization. For example, an internal threat may be the potential for an employee to damage a server, corrupt a critical application, or shut down power to critical systems. External threats can range from severe weather to earthquakes, unauthorized entry into your building, or vandalism.
The risk assessment not only identifies the external and internal risks and threats, it can also identify your organization's vulnerabilities. Analyzing each threat for likelihood of occurrence and potential damage rendered will help you pinpoint specific threat conditions you will address in your disaster recovery plans. Combine this risk data with BIA results and you will be able to zero in on those business functions that are at the greatest risk and represent the greatest potential loss to the organization.
Dig Deeper on Disaster Recovery Planning-Management
Related Q&A from Paul Kirvan
For those organizations that believe 'It will never happen to me,' options to a formal business continuity/disaster recovery plan do exist if the ...continue reading
Business continuity and corporate resilience go hand in hand, and play a role in an organization's disaster recovery plan. Learn their differences ...continue reading
Thinking of activating disaster recovery as a service? As you start this important process, consider these best practices that will help protect your...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.