However, your business must have a virtual private network (VPN) or some type of remote system access such as Webmail...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
in order for employees to be able to access data remotely. It's also essential that your most critical systems are able to failover outside your building(s) or to another third-party data center in the event they're affected so your staff can still connect to them. Also, a well thought out communications plan among employees and managers is likely going to be needed. Remember to sit down with key people from IT, business operations, and HR and think through various scenarios. You'll likely never be able to have everything in place for every possible disaster recovery (DR) situation, but at least having some semblance of a contingency plan will put you ahead of the curve.
Related Q&A from Kevin Beaver
When replacing an email security gateway, should a Web security gateway be used or another email gateway? Expert Kevin Beaver explains.continue reading
Expert Kevin Beaver explains how organizations should address end-of-software development dates, and what they ultimately mean to enterprise security.continue reading
Are read-only domain controllers a more secure option for setting up domain services in a DMZ than using a separate domain? Expert Kevin Beaver ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.