{"id":12737,"date":"2018-10-25T06:11:06","date_gmt":"2018-10-25T06:11:06","guid":{"rendered":"https:\/\/www.sandbox.backupassist.com\/blog\/?p=12737"},"modified":"2019-11-15T03:12:52","modified_gmt":"2019-11-15T03:12:52","slug":"it-outage-best-practice-guide","status":"publish","type":"post","link":"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide","title":{"rendered":"IT Outage Best Practice Guide"},"content":{"rendered":"<h3>Introduction<\/h3>\n<p><strong>Outages happen.<\/strong> Whether you\u2019re providing or receiving an IT-based service, it\u2019s a cardinal truth. And from management to employees, outages are a horrible pain.<\/p>\n<p>When they do happen, it\u2019s your best practices that will see you through the other side. Because in the heat of the moment, things can quickly get out of hand.<\/p>\n<p>This guide is a simple step-by-step primer on what to do for both planned and unplanned outages, and how to get your business back on its feet.<\/p>\n<h3>Making an Emergency Plan<\/h3>\n<p><center><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/icon-emergency-plan-279x300.png\" alt=\"\" width=\"150\" height=\"161\"><\/center><\/p>\n<p>You\u2019re probably not surprised to hear this, but your best strategy is to prepare well ahead of an outage. An emergency plan brings order to the chaos, clearly identifies who should do what, and gives you all the details you need to deal with a crisis.<\/p>\n<p><strong>If you\u2019re reading this guide and you\u2019re not in the middle of an outage right now, this should be your first step.<\/strong> Doing the work now will save you time during an Outage.<\/p>\n<p><strong>If you are in the middle of an outage, skip this section and go right to \u2018Dealing with an Unplanned Outage\u2019.&nbsp;<\/strong>As a side note, add \u2018Making an Emergency Plan\u2019 to your post-mortem for when the outage is resolved.<\/p>\n<p><center><strong>What Your Plan(s) Should Include<\/strong><\/center><\/p>\n<p><strong>Contact details:<\/strong> Your emergency plan should have contact details for management, IT, and other involved parties. This should also include private contact details.<\/p>\n<p>Even though some people may hate being on call, it\u2019s essential to have a strategy to deal with incidents no matter what time they occur. It\u2019s highly recommended to let people go off-call after dealing with an incident (Usually 24 hours).<\/p>\n<p>This will lessen resentment for being on call, act as a positive reward for having successfully dealt with the outage, and let them deal with their fatigue (Minimizing social and\/or health issues).<\/p>\n<p><strong>Types of Outage:<\/strong> You want to write a plan for every sort of unplanned or planned outage that can occur, because they will require different steps to resolve them.<\/p>\n<p>Spend a LOT of time thinking about the sort of outages that can occur with any ITbased service. E.g. Are you hosted on Google Cloud? What happens if the Gmail goes out during a Google Cloud Outage? What happens if there\u2019s a weather event and your phone service is knocked out? What happens if Slack is unavailable?<\/p>\n<p>This is a plan for the worst, so think of the worst!<\/p>\n<p><strong>Steps to Resolution:<\/strong> The steps or checklist for how to resolve the outage. You can use this guide as a framework for writing this.<\/p>\n<p>You want to also include any special procedures your IT-based service or infrastructure requires to work with. E.g. Server \/ program shutdown order, how to bring a single one offline, who and where to obtain passwords from, etc.)<\/p>\n<p><strong>Assign Clear Responsibility:<\/strong> Detail exactly who is responsible for carrying out the steps above, so there\u2019s no confusion or doubt. All anyone needs to do is check the plan to see who needs to be contacted, or who should be doing what.<\/p>\n<p>You can use some simple monitoring platforms to inform the people responsible when an issue occurs.<\/p>\n<p>Make sure there is one clear person in charge called the \u2018Incident Commander\u2019. This means you won\u2019t end up with a scenario in which there\u2019s \u2018too many cooks\u2019 or people in charge.<\/p>\n<p>Also, make sure the people involved have the authorization to fix the outage quickly. E.g. If power goes down in the building, it\u2019s not an IT problem\u2014who has the authority to get it fixed quickly?<\/p>\n<p><strong>SLAs:<\/strong> Make sure to include which outages are covered by a Service Level Agreement (SLA)! This way, you\u2019re not rushing around during an emergency demanding your Service Provider fix the problem, only to find out your SLA doesn\u2019t cover it and you wasted valuable time.<\/p>\n<p>Remember to keep your SLAs in a known, safe spot for when this time comes.<\/p>\n<p><strong>Escalations:<\/strong> Detail in your plan the additional steps you need to take if things are getting held up. E.g. If the problem cannot be easily fixed, if the SLA provider exceeds the time limit, if a large data loss has occurred or will occur, etc.<\/p>\n<p>This way, your plan will cover both minor and major incidents, especially if they become progressively worse. You can also use a monitoring program to provide automatic escalation if the issue is not resolved, sending a message to the next person in the chain.<\/p>\n<p><strong>Internal Communications:<\/strong> Before an outage even occurs, there should be a means of conference set up. This should ideally be something that leaves a record, like a&nbsp;Slack room named #outage. Think of it as a war room for when things go wrong. You also might want to use a issue and project tracking software like JIRA.<\/p>\n<p>Phone calls and verbal conversations have no accountability, so these should be your last resort method. If you must go with this, have a situation room set aside and take notes during the whole process.<\/p>\n<p><strong>External Communications:<\/strong> Identify if your customers are going to be impacted by an outage, and how you\u2019re going to keep them in the loop. You\u2019ll want more than one medium for this. E.g. E-mail, social media, website, etc.<\/p>\n<p><strong>Hardware and Network Description:<\/strong> A list of the hardware and network information that is relevant to a particular outage. All this information will be relevant to the person(s) trying to resolve the situation.<\/p>\n<p><strong>Emergency Laptop:<\/strong> Make sure IT has at least one laptop available for an outage that is kept updated.<\/p>\n<p><strong>Automate What You Can:<\/strong> Human error is the top cause of most disasters, so you want to minimize the human factor as much as possible (E.g. Automated backup schedules). This should also reduce the workload during an outage. Identify anything that would chew up time or effort, and see if it can be automated.<\/p>\n<p><strong>Multiple Plan Copies:<\/strong> Once you\u2019re done with your plan, make sure you have hard copies in certain, predefined places around your company, and a digital one on your company\u2019s intranet.<\/p>\n<h3>Dealing with an Unplanned Outage<\/h3>\n<p><center><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/icon-warning-300x281.png\" alt=\"\" width=\"150\" height=\"140\"><\/center><center><strong>Disaster has struck. You\u2019re experiencing an unplanned outage! Here are the steps you need to take to get through to the other side intact.<\/strong><\/center><\/p>\n<p><strong>Confirm that it is, in fact, an outage <\/strong><\/p>\n<p>Before you break the emergency glass and assemble the A-team, make sure you\u2019re not dealing with something else (Lag, internet being down, etc.). You don\u2019t want to tell your manager there\u2019s an outage when it\u2019s something mundane.<\/p>\n<p><strong>Determine the Cause <\/strong><\/p>\n<p>In a time-effective manner, determine the cause. Is it a programming error? DNS problem? Expired domain? Hardware failure?<\/p>\n<p>Just find out generally what you\u2019re dealing with. You don\u2019t want to exhaustively investigate the issue at the expense of not resolving it.<\/p>\n<p>Stay clear of blame through this entire process. Save it for the postmortem after the outage is fixed!<\/p>\n<p><strong>Get Out Your Emergency Plan (If Applicable) <\/strong><\/p>\n<p>If you followed our guide on page 3, \u2018Making an Emergency Plan\u2019, you should already have a plan in place that you can pull out for this scenario.<\/p>\n<p>If not, skip this step, and you\u2019re going to have to figure out everything as you go along.<\/p>\n<p><strong>Designate an Incident Commander <\/strong><\/p>\n<p>There should be one person in charge of dealing with the outage. If you\u2019ve written up an Emergency Plan, this person should already be designated. If not, you\u2019re going to have to choose someone now.<\/p>\n<p>The Incident Commander is the person who has the final decision-making authority, and is usually the first person to respond to an incident. They\u2019re running the show, and any task that isn\u2019t already assigned to someone falls to them.<\/p>\n<p>They will need to bring people in the loop that need to be involved, such as subject experts. Your Incident Commander is vital to resolving the outage.<\/p>\n<p>The Incident Commander will either need the authority to fix the outage quickly or be in contact with people who can.<\/p>\n<p><strong>Find out if the Incident is covered by an SLA <\/strong><\/p>\n<p>There\u2019s a chance that your particular outage is covered by a Service Level Agreement (SLA), and you may be able to outsource part or all of dealing with it.<\/p>\n<p>Find this out immediately and if you can get them to fix it. Escalate the problem if they don\u2019t complete it within an acceptable time limit, the problem can\u2019t be fixed by them, or you\u2019re at risk of large data loss.<\/p>\n<p>Even if you can\u2019t outsource fixing your outage, you may also have access to technical support relevant to this sort of outage, which could help you resolve it sooner.<\/p>\n<p><strong>Get the Right People Involved <\/strong><\/p>\n<p>Assuming you can\u2019t push dealing with the outage off to a Service Provider, your Incident Commander is going to need to get to work.<\/p>\n<p>The first thing they need to do is make sure the right people to be part of the process, particularly the Support Team. They\u2019re going to be fielding questions from your customers, so they need to know what\u2019s going on.<\/p>\n<p>You\u2019ll also need a point person or persons to field incoming calls dealing with the outage. Make sure to enable the support team to do their job.<\/p>\n<p>Communication is key. Ideally, you want it to be recorded, such as a Slack room. As mentioned in an earlier chapter, phone or verbal communication have no accountability, and you want a record for two reasons.<\/p>\n<p>1. So people can go back over what the Incident Commander told them to reaffirm what they\u2019re meant to be doing.<\/p>\n<p>2. For post-mortem analysis after the incident is over.<\/p>\n<p><strong>The Checklist <\/strong><\/p>\n<p>The Incident Commander will need to make a checklist of all the things that will need to be done to resolve the outage. This is best done with the input of the support team and any relevant parties.<\/p>\n<p>Include details on how to escalate the situation if one of these tasks cannot be completed or isn\u2019t being completed in the right amount of time.<\/p>\n<p><strong>In Case of Hacking <\/strong><\/p>\n<p>If your outage is the result of hacking, there are a number of other time-sensitive tasks that will need to be done.<\/p>\n<ul>\n<li>You will need to isolate the targeted machine(s).<\/li>\n<li>Make sure you have uncompromised backups of your business data.<\/li>\n<li>Sift through any logs, do forensics, and try to find other compromised systems.<\/li>\n<li>Back up any evidence gathered.<\/li>\n<li>Find out if the attacker can be identified and reported to the proper authorities.<\/li>\n<li>Any damage repairs that need to be done.<\/li>\n<\/ul>\n<p><strong>Regular Sitreps for Internal Stakeholders <\/strong><\/p>\n<p>Internal Stakeholders (E.g. Employees) probably don\u2019t want to know the nitty-gritty about the outage or what you\u2019re doing. Usually, they want to know some very specific things:<\/p>\n<ul>\n<li>How severe is the outage?<\/li>\n<li>What\u2019s its likely duration?<\/li>\n<li>What\u2019s being done to fix it?<\/li>\n<li>Who\u2019s working on it?<\/li>\n<\/ul>\n<p>Knowing this information isn\u2019t just a good way to keep them quiet, it also helps them do and plan their own jobs.<\/p>\n<p>The Incident Commander should be doing hourly situation reports (SitReps) to the whole company. It should answer the above questions in a concise manner and avoid unnecessary detail.<\/p>\n<p>You might even want to point them to a place where they can view these SitReps, such as an intranet page, or the discussions going on.<\/p>\n<p><strong>Automate Anything You Can <\/strong><\/p>\n<p>You don\u2019t have tons of time to spare, so automate anything you can. Not only does this remove the human element (one of the biggest reasons something can go wrong), it frees you to deal with other parts of the outage.<\/p>\n<p>It should be easy for your internal stakeholders to get info without contacting the Incident Commander, who has enough on their plate.<\/p>\n<p><strong>Don\u2019t Go Radio Silent <\/strong><\/p>\n<p>When dealing with internal stakeholders, the immediate instinct will be to shut them out to deal with the outage.<\/p>\n<p>Don\u2019t do this! While you should have avenues for people to find out about the incident, you want to be accessible, and nothing is more demoralizing than going radio silent.<\/p>\n<p>People should be able to contact the Incident Commander to find out more about the outage. It\u2019s a balancing act between keeping yourself focused on solving the outage and cutting people out completely, but it\u2019s a tightrope that needs to be walked.<\/p>\n<p><strong>Keep Customers Informed <\/strong><\/p>\n<p>Decide in advance how much you want customers to know. You don\u2019t need to tell them everything, but it\u2019s wise to tell them something and keep them informed. Craft your message carefully.<\/p>\n<p>An unplanned outage is a common way to lose customers, so you want to make sure you\u2019re as transparent as possible so they know you\u2019re dealing with the issue.<\/p>\n<p>Make sure you\u2019re using the right tone. You\u2019ll need to be concise, authoritative, and serious. While you may be tempted, don\u2019t try to joke or be cute\u2014remember, their business is being affected! Instead, you\u2019ll want to show humility, consideration, and don\u2019t be afraid to accept fault<\/p>\n<p>Ideally, you\u2019ll want to keep them informed every 30 minutes, even if there\u2019s nothing to report. Don\u2019t expect users to go to the status page. If they go to e-mail user support, send them all a reply when the incident is solved.<\/p>\n<p><strong>The Post Mortem <\/strong><\/p>\n<p>After the outage is finished, it\u2019s time to win back trust. If you followed the steps above, you\u2019ll have a detailed record and information on what happened and what was done to resolve it.<\/p>\n<p>Be accurate about what happened, what went wrong, and how you\u2019re going to prevent it from ever happening again. You can use this information to follow up with customers to regain their support. They want to know that there\u2019s no flaws anymore in your service, or you\u2019re in the process of fixing it.<\/p>\n<p>In the future, make preventing outages a priority by having your teams spend a portion of their time making proactive steps to prevent it from ever happening. It\u2019s less glamorous than rushing in to save the day, but your shareholders and customers will love you more for a service that never fails as opposed to one that breaks often and is quickly fixed.<\/p>\n<h3>Dealing with a Planned Outage<\/h3>\n<p><center><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/icon-planned-278x300.png\" alt=\"\" width=\"150\" height=\"162\"><\/center><center><strong>A planned outage may be less stressful than an unplanned one, but only if properly handled. You\u2019re still effectively ending an IT service for a period of time.<\/strong><\/center><\/p>\n<p><strong>Talk to Management <\/strong><\/p>\n<p>Planned outages usually happen as part of a project, one that you discuss with management beforehand. So first, you need to make sure they\u2019re in the loop.<\/p>\n<p><strong>Inform Your Users <\/strong><\/p>\n<p>If the outage is going to affect a number of users, you\u2019ll need to send out an e-mail ahead of time containing the following information:<\/p>\n<ul>\n<li>The time and date of the outage.<\/li>\n<li>The nature of the outage.<\/li>\n<li>Any possible effects of the outage.<\/li>\n<li>Any possible workarounds (Preferably with screenshots).<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>A step-by-step on dealing with planned and unplanned outages.<\/p>\n","protected":false},"author":2,"featured_media":12850,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[757],"tags":[],"class_list":["post-12737","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-resilience"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IT Outage Best Practice Guide - Cyber Resilience Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Outage Best Practice Guide - Cyber Resilience Blog\" \/>\n<meta property=\"og:description\" content=\"A step-by-step on dealing with planned and unplanned outages.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-25T06:11:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-15T03:12:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/IT-outages-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1236\" \/>\n\t<meta property=\"og:image:height\" content=\"591\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Linus Chang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linus Chang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide\"},\"author\":{\"name\":\"Linus Chang\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3\"},\"headline\":\"IT Outage Best Practice Guide\",\"datePublished\":\"2018-10-25T06:11:06+00:00\",\"dateModified\":\"2019-11-15T03:12:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide\"},\"wordCount\":2537,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/IT-outages-featured-image.jpg\",\"articleSection\":[\"Cyber Resilience\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide\",\"name\":\"IT Outage Best Practice Guide - Cyber Resilience Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/IT-outages-featured-image.jpg\",\"datePublished\":\"2018-10-25T06:11:06+00:00\",\"dateModified\":\"2019-11-15T03:12:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide#primaryimage\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/IT-outages-featured-image.jpg\",\"contentUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/IT-outages-featured-image.jpg\",\"width\":1236,\"height\":591},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sandbox.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Outage Best Practice Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sandbox.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3\",\"name\":\"Linus Chang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g\",\"caption\":\"Linus Chang\"},\"description\":\"*Founder &amp; Creator, BackupAssist* Linus Chang has been writing software since he was eight years old. He founded BackupAssist in 2002 \u2014 making him one of the longest-standing voices in Windows backup and data protection \u2014 and has spent the decades since talking to IT administrators around the world about what actually goes wrong, and why. His interest in data loss isn't abstract. Early in his career, he was working at the Monash University help desk when a student came in with a floppy disk that wouldn't read. They tried everything. None of their drives could read it either. The disk held her entire PhD dissertation \u2014 years of work \u2014 and it was the only copy. She broke down in tears. There was nothing he could do. Five years later, he wrote the first version of BackupAssist. Linus holds a Bachelor of Science in Computer Science and has held Microsoft Certified Solution Developer and Sun Certified Java Programmer credentials. More recently, he has completed digital forensics and cyber-security courses through the Black Hat Conference. He has spoken on information security and cryptography at Infosecurity Europe, addressed politicians and policymakers at Australian Parliament House, presented to SMB IT administrators at the IT Pro Experts Conference, and served as a guest lecturer to Cyber Security master's students at the University of Melbourne. On this blog, Linus writes about backup strategy and the technical side of cyber-resilience \u2014 drawing on 24 years of product development and direct conversation with the IT professionals BackupAssist is built for. [Connect with Linus on LinkedIn](https:\/\/www.linkedin.com\/in\/linuschang\/)\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/author\/linus-chang\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Outage Best Practice Guide - Cyber Resilience Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide","og_locale":"en_US","og_type":"article","og_title":"IT Outage Best Practice Guide - Cyber Resilience Blog","og_description":"A step-by-step on dealing with planned and unplanned outages.","og_url":"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide","og_site_name":"Cyber Resilience Blog","article_published_time":"2018-10-25T06:11:06+00:00","article_modified_time":"2019-11-15T03:12:52+00:00","og_image":[{"width":1236,"height":591,"url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/IT-outages-featured-image.jpg","type":"image\/jpeg"}],"author":"Linus Chang","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Linus Chang","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide#article","isPartOf":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide"},"author":{"name":"Linus Chang","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3"},"headline":"IT Outage Best Practice Guide","datePublished":"2018-10-25T06:11:06+00:00","dateModified":"2019-11-15T03:12:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide"},"wordCount":2537,"commentCount":0,"publisher":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide#primaryimage"},"thumbnailUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/IT-outages-featured-image.jpg","articleSection":["Cyber Resilience"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide","url":"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide","name":"IT Outage Best Practice Guide - Cyber Resilience Blog","isPartOf":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide#primaryimage"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide#primaryimage"},"thumbnailUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/IT-outages-featured-image.jpg","datePublished":"2018-10-25T06:11:06+00:00","dateModified":"2019-11-15T03:12:52+00:00","breadcrumb":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide#primaryimage","url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/IT-outages-featured-image.jpg","contentUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/IT-outages-featured-image.jpg","width":1236,"height":591},{"@type":"BreadcrumbList","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/it-outage-best-practice-guide#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sandbox.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"IT Outage Best Practice Guide"}]},{"@type":"WebSite","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#website","url":"https:\/\/www.sandbox.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sandbox.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.sandbox.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3","name":"Linus Chang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g","caption":"Linus Chang"},"description":"*Founder &amp; Creator, BackupAssist* Linus Chang has been writing software since he was eight years old. He founded BackupAssist in 2002 \u2014 making him one of the longest-standing voices in Windows backup and data protection \u2014 and has spent the decades since talking to IT administrators around the world about what actually goes wrong, and why. His interest in data loss isn't abstract. Early in his career, he was working at the Monash University help desk when a student came in with a floppy disk that wouldn't read. They tried everything. None of their drives could read it either. The disk held her entire PhD dissertation \u2014 years of work \u2014 and it was the only copy. She broke down in tears. There was nothing he could do. Five years later, he wrote the first version of BackupAssist. Linus holds a Bachelor of Science in Computer Science and has held Microsoft Certified Solution Developer and Sun Certified Java Programmer credentials. More recently, he has completed digital forensics and cyber-security courses through the Black Hat Conference. He has spoken on information security and cryptography at Infosecurity Europe, addressed politicians and policymakers at Australian Parliament House, presented to SMB IT administrators at the IT Pro Experts Conference, and served as a guest lecturer to Cyber Security master's students at the University of Melbourne. On this blog, Linus writes about backup strategy and the technical side of cyber-resilience \u2014 drawing on 24 years of product development and direct conversation with the IT professionals BackupAssist is built for. [Connect with Linus on LinkedIn](https:\/\/www.linkedin.com\/in\/linuschang\/)","url":"https:\/\/www.sandbox.backupassist.com\/blog\/author\/linus-chang"}]}},"_links":{"self":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/12737","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=12737"}],"version-history":[{"count":15,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/12737\/revisions"}],"predecessor-version":[{"id":12837,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/12737\/revisions\/12837"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/12850"}],"wp:attachment":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=12737"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=12737"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=12737"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}