What is the recovery procedure in case of Application failure or cyber-attack?
In the event of an application failure or cyber-attack, the recovery procedure involves the following steps:
Immediate Analysis: System experts promptly analyze the issue to determine the nature and extent of the problem.
Restoration or Failover:
If the analysis indicates data corruption or loss, a full restore is performed from secure backups.
If the primary system is compromised, operations are shifted to the disaster recovery site to ensure continuity.