From Chaos to Control: Navigating the Importance of Disaster Recovery in Cybersecurity

Fortune Edema
3 min readMar 9


Greetings fellow cybersecurity enthusiasts!

I am thrilled to continue this journey with you as we dive into the world of disaster recovery (DR). Over the past few weeks, we have explored incident response and business continuity, and now it’s time to address what happens when all else fails — enter the DR plan.

Even with the most well-planned incident response and business continuity strategies in place, some damage is inevitable. Data loss, service delays, and other disruptions can occur, leaving us wondering how to return to normalcy. This is where the DR plan comes into play.

So, what exactly is DR? Essentially, it’s the process of restoring IT and communication systems needed by an organization during and after a disruption. While business continuity focuses on maintaining critical business functions, DR is all about getting IT and communications back up and running at full capacity.

Let’s take a look at a real-life example. In Chicago, a hospital took 200 days to discover a compromise. However, the hospital couldn’t simply revert to its last backup because it was infected with time-based malware that would corrupt all the data on the system as soon as it was restored. Instead, they had to go back nearly a year prior to the incident and restore the remaining data piece by piece to avoid reinfection. This situation emphasizes the importance of multiple levels of backup and retention periods to meet the needs of the organization.

Now, let’s explore the components of a DR plan. Depending on the size of the organization and the number of people involved in the DR effort, various types of plan documents are used for different audiences. These documents include an executive summary, department-specific plans, technical guides, full copies of the plan for critical DR team members, and checklists for certain individuals.

Critical DR team members will use checklists to guide their actions amidst the chaos of a disaster. IT personnel will have technical guides to help them get alternate sites up and running, and managers and public relations personnel will have high-level documents to help them communicate the issue accurately.

Incident response, business continuity, and disaster recovery plans all focus on the availability aspect of the CIA triad and the importance of maintaining availability for business operations. While these plans may seem to overlap, they are distinct and vital to the survival of any organization facing unusual operating conditions.

I hope you’ve enjoyed this journey so far, and I look forward to exploring more cybersecurity topics with you in the future. Thanks for reading, and until next time — stay safe!



Fortune Edema

Information Security Associate ISO IEC 27001 ||Tech Enthusiast||InfoSec Researcher|| Jnr SOC Analyst ||Security Awareness||Computer Science Student