Skip to main content
Skip table of contents

What is the recovery procedure in case of Application failure or cyber-attack?

In the event of an application failure or cyber-attack, the recovery procedure involves the following steps:

  1. Immediate Analysis: System experts promptly analyze the issue to determine the nature and extent of the problem.

  2. Restoration or Failover:

    • If the analysis indicates data corruption or loss, a full restore is performed from secure backups.

    • If the primary system is compromised, operations are shifted to the disaster recovery site to ensure continuity.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.