Disasters come in many forms that all require different strategies to combat. REM implements a plethora of safeguards and procedures to keep all of our assets and all of our customer assets safe.
We start by housing our production computer equipment in an access controlled data centre that is climate controlled, has redundant power supplies and multiple network feeds to virtually eliminate infrastructure downtime.
We continue the infrastructure safe guards by maintaining duplicate servers for all of critical components that can be switched on in the event of an individual server failures.
We run nightly backups of databases and files that are stored onsite for up to 14 days and stored offsite in 2 different locations for up to 30 days.
We also take various snapshots throughout the year that become last resort “back to good” checkpoints that we keep offline to protect against threats that are undetectable and rare but can potentially take down entire organizations such as zero day malicious exploits.
We understand the importance of backups, but we understand that recovery trumps the importance of backups. To that end, we perform multiple fire-drill style recovery exercises that put all hands on deck to prove that REM’s various backups– do in fact – work in a recovery scenario. We understand that “anything can happen” but we do our absolute best to make sure those options are limited and mitigated.