Are Your Recovery Expectations Lined Up with Your Capabilities?

Let?s discuss the different perspectives to take into account as you establish your RTO and RPO standards.

RTO and RPO Establish Where the Point of No Return Lies

Just to contextualize what we mean when we reference your recovery time objective and recovery point objective, these metrics describe the worst-case scenario that you could still operate within. When it comes to your RTO, it is how long you can experience downtime before your business suffers irreparable harm, while your RPO outlines how much data you can lose before your operations become untenable.

Different elements of your business? IT will have different values where these variables are concerned, so each will need to have these values calculated separately.

So, if you could?if circumstances dictated?last five hours without access to your company email server before your business was irreversibly harmed, your RTO for your email server would be five hours. If you could only lose two hours’ worth of data at the most, you?d have an RPO of two hours.

How Can You Determine Your RTO and RPO?

There are a few steps that contribute to this calculation.

You need to figure out how much downtime costs your business in general. This process is fairly straightforward:

First, you need to establish how your business generates revenue, and the processes that specifically contribute to that monetary intake. Which of them requires your technology to be operational? Taking stock of these factors will help you with the calculations to come.

Next, you need to establish how much productivity is ultimately being lost. As you examine a downtime event, take the number of your users impacted, what the impact is on your productivity as a percentage, the average hourly salary of your employees, and how long your downtime lasted and multiply them all together. This will help you estimate the total impact that the downtime had, helping you determine what your RTO will amount to, and from there, project an RPO that will give you the information needed.

You can add more context to these measurements. For instance, certain systems experiencing downtime will have a greater impact than others, depending on your business? requirements. Your unique business situation will dictate how your calculations turn out.

Turn to Us for Assistance in Calculating (and Mitigating) Downtime

We have the expertise and experience needed to help you estimate what downtime could do to your business? and, more importantly, help you avoid it. Reach out to us at (603) 889-0800 to learn more.

Related Posts

Securing Your Wireless Network

Alter the Security Information on Your Router As with any account that is protected by a password, you will want to ensure that your router?s login information is changed to something much more secure than the default configuration that comes with the device. This is because any default credentials for router models can be found online and can easily be accessed by anyone that can use a Google se...

Implement Zero Trust Policies to Combat Ransomware

Yes, Ransomware is Common Enough to Warrant This Measure Ransomware infections, according to recent surveys, have affected three out of four professional organizations in some capacity over the past year. That?s a huge portion of businesses, and it?s no laughing matter. You need to protect yourself in any way you can. Ransomware can have various negative effects on your business, such as the foll...

Tip of the Week: Simple Privacy Steps on Android

Your Android device offers a lot of capabilities in its little frame, with many people relying on theirs to keep their lives organized and generally handled. Many businesses even rely on Android mobile devices. This should only reinforce how critical privacy and security are. In light of this, we’ve shared a few simple tips anyone can do to help make a smartphone that much more secure.  1...

Manage Guests and External Sharing in Teams

There will always be times when you have to invite guests and other external users to your Microsoft Teams meetings, especially if you want to take advantage of the many collaboration options offered through the platform. However, you need to be very careful with guests and external users–especially in today’s cybersecurity-centric world. Today we want to highlight some ideas to consider for yo...