Business Continuity

Maintaining your services following a disruptive incident.

The average downtime for an SME is 27 hours per year (Computing Magazine). A Continuity Solution can pay for itself for 3 years by preventing just one day of downtime.

It is important to differentiate between backup and Business Continuity (BC).
While traditional backup solutions allow a business to survive after data loss, by providing data recovery, business continuity solutions enable you to operate as if the data was never lost in the first place. Backup typically relieves the frustration of a lost or damaged file and provides a 12-24 hour old copy of your data that needs to be installed on a new server. Building the new server ready to take your data may take many hours. Simple backup solutions are capable of protecting against data loss, but not against downtime. When a business experiences downtime it loses productivity, its ability to communicate, and most importantly its customers.

When considering any backup solution it is important to assess two key metrics. The first is RPO, or Recovery Point Objective. This figure represents how much data your business can afford to lose following an incident. For example, if you utilise a backup solution with an RPO of 1 hour, a backup can be taken once an hour. With this solution, you are comfortable with sacrificing up to an hour of data in the event of an outage. Both business continuity and traditional backup solutions can both provide good RPOs, with some Business Continuity solutions achieving RPOs of up to 5 minutes.

Where Datto Business Continuity truly differentiates itself is with the Recovery Time Objective, or RTO. RTO represents the minimum time your business can afford to be unable to service your customers through lack of critical systems and data. This is an essential figure to know, because even though data is backed up and secured from loss, a business cannot function properly until the data is recovered. True business continuity solutions can provide RTOs of just seconds. This is far superior to the weeks it can take to download large files from cloud online services, or the hours that it takes to recover entire systems.

Datto Logo

Contact Us and We'll Help you Work out your Recovery Time Objective

Recovery Time


I'd Like To Try Your Free
Disaster Recovery Audit
As detailed in the report The 10 Disaster Planning Essentials Advisory Guide

Please enter your name.
Please enter a valid email address.
Please check the required field.
Something went wrong. Please check your entries and try again.

To discover more, read:

To learn more, or if you would just like a friendly chat, contact us:

Why Fast London IT Consulting Is Key for Business Success

London IT consulting

As a growing business, it’s very important that your employees always have the resources they need to act on exciting opportunities. However, if you have an IT team that is slow and unresponsive, you might end up spending more time … Read moreWhy Fast London IT Consulting Is Key for Business Success

Implementing Cloud Collaboration with Managed Services London

managed services London

It’s very common today for businesses of all sizes to have employees working all over the world. Remote work is common, and it’s easier than ever for businesses to open new office locations as well. While this is incredible for … Read moreImplementing Cloud Collaboration with Managed Services London

How London IT Consulting Experts Help Block Phishing Attacks

London IT consulting

A versatile and forward-thinking London IT consulting team acts as a mentor to a business to ensure that a network is safe from phishing attacks. Malware is often unleashed through employee clicks in emails that should have been flagged for … Read moreHow London IT Consulting Experts Help Block Phishing Attacks

Endpoint Security and Managed I.T. Services in London

managed I.T. services London

One of the top reasons businesses have gravitated toward managed I.T. services in London is to ensure smooth remote access capabilities. Due to the emphasis on endpoints such as laptops and smartphones, it’s imperative for the I.T. team to take … Read moreEndpoint Security and Managed I.T. Services in London