Business Continuity Planning Services

To ensure that strategies and plans are in place to counteract interruptions to business activities and to protect critical business processes from the effects of major failures of information systems or disasters and to ensure their timely resumption, organizations need to develop an organisation-wide business continuity strategy and programme, which is supported by a resilient technical infrastructure and an effective crisis management capability. Futthermore need to develop, maintain and regularly test business continuity plans and arrangements (sometimes referred to as disaster recovery plans) for critical business processes and applications throughout the organisation.

Our Business Continuity Planning Services aim to provide you a set of documented actions to perform in the event of a disaster or emergency affecting your organization's business applications and technical infrastructure, enabling critical business processes to be resumed within critical timescales.

Each business continuity plan is developed in conjunction with business representatives and is based on a set of scenarios of possible disasters. The business continuity plan may even include arrangements for resuming critical business processes by using alternative facilities (e.g., via reciprocal arrangements with another organisation or a contract with a specialist provider of business continuity arrangements).

  •  Conditions for their invocation
  •  Sufficient detail so that they can be followed by individuals who do not normally carry them out.
  •  Arrangements for the secure storage of plans (e.g., off-site), and their retrieval in case of emergency.
  •  A schedule of recovery tasks and activities to be carried out including emergency, fall-back and resumption procedures (in priority order)
  •  The responsibilities for carrying out each task and activity (including deputies)
  •  Information security controls to be applied during and following invocation of the business continuity plan (to ensure the confidentiality, integrity and availability of information remains protected)
  •  Details of tasks to be undertaken following recovery and restoration (e.g., checking that systems and information are restored to the same state they were in before the business continuity plan was invoked).
  •  Identity and access management systems and access control mechanisms
  •  Network protection tools, such as firewalls, Intrusion Detection Systems (IDS) and corporate network gateways
  •  Malware protection software (including programme code and signature files).
  • Cryptographic solutions and public key infrastructure components (e.g., Certification Authorities (CAs) and Registration Authorities (RAs)).