Introduction: The $10,000/Hour Question
Every IT environment will eventually face a disaster. Hardware fails. Ransomware encrypts. Hurricanes flood data centers. A human operator deletes the wrong directory. The question is not whether a disaster will occur — it is whether your organization can survive it.
The numbers are stark: Gartner estimates the average cost of IT downtime at $5,600/minute for enterprise organizations. For mid-market companies, IDC research puts the figure at $10,000–$50,000 per hour of unplanned downtime. And these figures count only direct costs — lost revenue and productivity — not the indirect costs: customer churn, reputation damage, regulatory penalties, and employee overtime.
Organizations with tested business continuity plans recover from disasters in a fraction of the time of organizations without plans. Organizations with mature BCDR programs experience 83% lower losses from major incidents than those without.
For MSPs, BCDR represents both a critical service delivery responsibility and a significant recurring revenue opportunity. Clients who experience a disaster without adequate preparation will leave. Clients who experience a disaster and recover quickly — because their MSP built a solid BCDR program — become advocates.
This guide gives you the technical and operational framework to implement BCDR effectively for your clients and your own operations.
BCP vs. DRP: Clearing Up the Terminology
Business Continuity Plan (BCP): The broader plan for how an organization maintains essential functions during and after a disaster. BCP encompasses people, processes, facilities, communications, and technology. Think of it as the "keep the lights on" plan.
Disaster Recovery Plan (DRP): The specific procedures for recovering IT systems and data after a disaster. DRP is a component of the broader BCP, focused specifically on technology recovery. Think of it as the technical "restore from backup" plan.
An organization can have IT systems recovering (DRP successful) but still fail to function if its people cannot communicate, its offices are inaccessible, or its key processes are undocumented (BCP failure).
MSPs primarily own the DRP — but should understand and inform the broader BCP context.
Core BCDR Concepts
Recovery Point Objective (RPO)
RPO is the maximum acceptable amount of data loss measured in time. It answers: "How far back in time can we afford to restore?"
- RPO of 24 hours: We can tolerate losing up to 24 hours of data. Daily backups satisfy this RPO.
- RPO of 1 hour: We can tolerate losing up to 1 hour of data. Backups or replication at least hourly required.
- RPO of 0: We cannot tolerate any data loss. Real-time synchronous replication required.
RPO drives backup frequency. It must be defined per application, not per organization — different systems have different data loss tolerances.
Recovery Time Objective (RTO)
RTO is the maximum acceptable downtime for a system or service. It answers: "How quickly must this system be restored?"
- RTO of 4 hours: The system must be recovered within 4 hours of a failure. Basic backup and restore can achieve this with proper procedures.
- RTO of 30 minutes: Rapid restore from local backup or snapshot. Requires local recovery infrastructure.
- RTO of 15 minutes: Standby systems or replication required. Hot standby or continuous replication technologies.
- RTO of 0 minutes: Requires high availability with automatic failover. No single point of failure.
RTO drives the recovery technology choice. Tighter RTO = higher infrastructure cost.
The RPO/RTO Matrix
| RTO \ RPO | 24 Hours | 4 Hours | 1 Hour | 15 Minutes |
|---|---|---|---|---|
| 24 Hours | Daily cloud backup | Hourly cloud backup | 15-min cloud backup | Near-continuous cloud backup |
| 4 Hours | Local backup + cloud | Local + hourly cloud | Local snapshot + cloud | Near-continuous local |
| 1 Hour | Local backup appliance | Local BCDR appliance | DRaaS with virtualization | Replication + DRaaS |
| 15 Minutes | Local BCDR virtualization | Local BCDR + failover | Active-active replication | Enterprise HA cluster |
Business Impact Analysis (BIA)
The Business Impact Analysis is the foundational document that drives all other BCDR decisions. It answers:
- What are the critical business processes?
- What systems support each process?
- What is the financial and operational impact of each system being unavailable?
- What are the maximum tolerable downtime and data loss for each system?
BIA process:
-
Identify business processes: Work with client stakeholders to list all business processes (order processing, invoicing, customer communication, manufacturing control, etc.)
-
Map to IT systems: Which IT systems support each business process?
-
Quantify impact: For each system, estimate:
- Revenue impact per hour of downtime
- Operational impact (employees unable to work)
- Regulatory impact (compliance violations triggered by downtime)
- Contractual impact (SLA penalties, customer commitments violated)
-
Define RTO and RPO: Based on the impact analysis, define what RTO and RPO each system requires to limit impact to acceptable levels.
-
Document dependencies: Systems rarely fail in isolation. Document which systems depend on others (application requires database, database requires storage, everything requires network).
BIA deliverable format:
| System | Business Process Supported | Revenue Impact/Hour | RTO Required | RPO Required |
|---|---|---|---|---|
| Email (Microsoft 365) | Customer communication | $5,000 | 4 hours | 1 hour |
| ERP system | Order processing, invoicing | $20,000 | 2 hours | 30 min |
| Domain controller | All user authentication | $50,000 | 1 hour | 4 hours |
| File server | Internal document access | $2,000 | 24 hours | 24 hours |
Disaster Scenario Planning
Effective DR planning addresses specific disaster scenarios, not just a generic "backup and restore." Different disasters require different responses.
Scenario 1: Hardware Failure
Most common type: Single server failure, storage controller failure, RAID degradation.
Recovery approach: Restore from backup to replacement hardware or virtualized environment. RTOs of 4–24 hours depending on hardware availability and backup type.
Key requirements:
- Tested bare-metal restore procedure
- Hardware spares or vendor support agreement with 4-hour hardware replacement
- Documented restore procedure that any technician can follow
Scenario 2: Ransomware Attack
Fastest growing threat: Ransomware attacks increased 87% year-over-year in 2025. Recovery from ransomware without adequate backups typically costs 5–10× more than recovery with clean backups.
Recovery approach: Isolate affected systems → identify scope of encryption → restore from clean, pre-infection backup → patch the vector that allowed the attack before reconnecting.
Critical BCDR requirements:
- Immutable backups: Backups that cannot be modified or deleted by ransomware (air-gapped, object storage with object lock, or managed cloud backup with separate credentials)
- Known-clean restore points: Ability to identify a backup that predates the encryption by verifying backup data integrity
- Network segmentation: So encryption cannot spread to backup infrastructure
- Documented isolation procedures: Technicians must know how to isolate affected systems quickly
Detection is recovery time: The faster you detect the ransomware, the less data is encrypted, and the more recent your clean restore point. This is why intelligent monitoring and anomaly detection directly reduces ransomware recovery cost.
CyberXper(opens in new tab) specializes in ransomware recovery for organizations that did not have adequate BCDR in place — their average engagement cost is dramatically higher than what a proper BCDR program would have cost the client.
Scenario 3: Natural Disaster / Facility Loss
Scenario: Building fire, flood, hurricane, tornado renders the office inaccessible or destroyed.
Recovery approach: Activate remote work infrastructure → recover to a cloud or colocation environment → communicate with employees, clients, and vendors.
Key requirements:
- Cloud or colocation disaster recovery site (not the same geographic area as primary)
- Remote work capability: VPN, cloud applications, BYOD policy
- Communication tree: How do you reach employees when the office is gone?
- Geographic backup separation: Backup copies must be in a different location than the primary site
Scenario 4: Cloud Provider Outage
Growing risk: As organizations move to cloud services, provider outages create significant exposure.
Recovery approach: Depends on architecture. For Microsoft 365/Google Workspace outages: communicate status, activate backup communication channels. For cloud-hosted applications: failover to secondary region or cached data.
Key requirements:
- Third-party backup of cloud data (Microsoft 365 backup is NOT enabled by default for deleted data beyond 93 days)
- Multi-region architecture for critical workloads
- Documented manual fallback procedures for cloud service outages
Scenario 5: Insider Threat / Accidental Deletion
Often overlooked: An administrator accidentally deletes a directory structure, or a disgruntled employee deliberately destroys data.
Recovery approach: Point-in-time restore to immediately before the deletion event.
Key requirements:
- File-level granular restore capability (not just full system restore)
- Versioning: Ability to restore previous versions of individual files
- Backup monitoring: Verify accidental deletion cannot also delete backup data
- Audit logging: Know who deleted what and when
BCDR Testing: The Most Overlooked Requirement
A backup that has never been tested is not a backup — it is a theory. BCDR plans that have never been tested will fail during actual disasters in ways that cannot be predicted.
The industry standard is to test DR procedures at least annually. Best practice is quarterly for critical systems. Testing reveals:
- Corrupted backup files that restore successfully during testing but would fail during disaster
- Procedures documented incorrectly or incompletely
- Dependencies not captured in the DR plan
- Skills gaps (technicians who documented the procedure have left)
- Timing realities (the procedure says "4 hours" but takes 8)
Three Types of BCDR Tests
Tabletop Exercise:
- Gather key stakeholders and walk through a disaster scenario verbally
- "Our primary server room just flooded. Walk me through what happens next."
- Identifies process gaps and communication failures without actual system disruption
- Duration: 2–4 hours
- Frequency: Quarterly
Functional Test (Partial):
- Actually execute recovery procedures for a subset of systems
- Restore a specific server to a test environment and verify it functions
- Does not affect production systems
- Duration: 4–8 hours
- Frequency: Semi-annually
Full Interrupt Test:
- Actually fail over to DR environment and run production operations from DR
- Tests the complete end-to-end recovery and confirms RTO/RPO are actually achievable
- Significant operational risk — requires careful planning and executive approval
- Duration: Full business day
- Frequency: Annually
Test documentation: Every test should produce a test report documenting:
- Scope of test
- Test date and participants
- Procedures followed
- Actual time to complete vs. documented RTO
- Issues discovered
- Action items for remediation
Auditors (SOC 2, ISO 27001, CMMC) will request DR test documentation. "We test regularly" without documented test records does not satisfy audit requirements.
BCDR as an MSP Service Offering
Disaster recovery is one of the highest-value managed services an MSP can offer, because the alternative to purchasing it — experiencing a disaster without it — is immediately and viscerally tangible.
BCDR Service Tiers
Basic BCDR ($150–$400/server/month):
- Daily backup to cloud storage (3-2-1 backup rule)
- Monthly backup verification
- Annual tabletop exercise
- 4-hour RTO / 24-hour RPO
Enhanced BCDR ($400–$800/server/month):
- Hourly incremental backup with image-based backup
- BCDR appliance with local virtualization capability
- Weekly backup testing
- Semi-annual functional DR test
- 1-hour RTO / 1-hour RPO
Enterprise BCDR ($800–$2,000/server/month):
- Near-continuous replication to cloud DR environment
- Automated failover testing monthly
- Annual full interrupt test
- 15-minute RTO / 15-minute RPO
- Dedicated BCDR manager
The Business Case for BCDR Selling
The conversation with clients who resist BCDR investment:
"Your monthly BCDR investment is $X. Your estimated revenue impact from a major incident is $Y per hour. If we can restore your critical systems in 4 hours rather than spending a week manually rebuilding from scratch — or worse, losing all data — the break-even on your BCDR investment is [X/Y × 4 hours]. How many months of service would you need before the first incident makes this the best investment your business ever made?"
This math is particularly compelling for clients who have already experienced an incident, or who operate in sectors with high regulatory exposure (where downtime triggers compliance penalties).
Building Your Own MSP BCDR
If you are advising clients on BCDR, you must have a robust BCDR program for your own operations.
Why MSP BCDR is uniquely critical: Your clients depend on you. If your RMM goes down, your clients are unmonitored. If your PSA goes down, ticketing stops. If your documentation system goes down, technicians cannot access credentials and procedures. MSP operational continuity is not optional.
MSP BCDR requirements:
- RMM platform: Redundancy provided by cloud vendor; ensure your own documentation and policies are backed up
- PSA/ticketing: Cloud-hosted with vendor-managed redundancy; backup tickets and client data weekly
- Documentation: Replicated across at least two independent services (primary + sync to backup)
- Financial/billing: Cloud accounting with automatic backup enabled
- Password management: Distributed with offline emergency access kit
- Staff communication: Primary (Teams/Slack) + backup (email + phone tree) documented
The MSP DR runbook: Document what happens if:
- Your primary RMM vendor has an outage — where do you find device health data?
- Your PSA goes down — how do you receive and track client requests?
- A senior technician is unavailable — where are the credentials and procedures?
- Your office is inaccessible — how does your team work remotely?
Regulatory Drivers for BCDR
BCDR is required, not optional, under multiple frameworks:
SOC 2 Availability Criterion: "The system is available for operation and use as committed." Supporting controls include backup and recovery testing.
HIPAA §164.308(a)(7): Contingency plan required, including data backup plan, disaster recovery plan, emergency mode operation plan, testing and revision procedures.
ISO 22301 (Business Continuity): The dedicated BCDR international standard. Increasingly required by enterprise clients and supply chain programs.
Cyber Insurance: Insurance underwriters now require documented and tested DR procedures as a condition of coverage. Cyber insurance without BCDR documentation either does not qualify or comes with exclusions that make it nearly worthless.
EU DORA (Digital Operational Resilience Act): Effective January 2025, requires financial sector organizations (and their IT service providers) to implement comprehensive digital operational resilience requirements including DR testing.
Frequently Asked Questions
What is the 3-2-1 backup rule? 3 copies of data, on 2 different media types, with 1 copy offsite. For example: production data (copy 1) on local servers (media 1) → local backup to NAS (copy 2, media 1) → cloud backup (copy 3, media 2, offsite). This rule is the minimum viable backup strategy.
How often should backups run? At minimum daily, with RPO requirements driving frequency. Critical databases may require hourly or continuous replication. Most modern backup solutions support incremental backups every 15–60 minutes without significant storage overhead.
Should I use Microsoft 365 backup? Microsoft provides limited native backup capabilities — deleted items are recoverable for 93 days by default, and litigation hold extends this. However, accidental bulk deletion, ransomware encryption of cloud data, and retention policy complexity are all risks that third-party Microsoft 365 backup (Veeam, Acronis, Backup for Microsoft 365) addresses. For any client with compliance requirements or meaningful data, third-party M365 backup is strongly recommended.
What is immutable backup and why does it matter for ransomware? Immutable backup means backup data cannot be modified or deleted during a defined retention period — even by administrators with elevated credentials. Object storage with Object Lock enabled (AWS S3 Object Lock, Azure Blob immutable storage) provides this. Standard backup infrastructure is vulnerable to ransomware that obtains backup software credentials. Immutable storage is not.
Conclusion
Business continuity and disaster recovery is not a technology decision — it is a business survival decision. Every hour of unplanned downtime has a quantifiable cost. Every tested DR plan dramatically reduces recovery time. Every MSP that helps clients survive a disaster earns a client for life.
Build BCDR into your standard managed services offering — at least basic backup and annual testing. Sell enhanced BCDR tiers as high-value add-ons. And practice what you preach by maintaining a documented, tested BCDR program for your own MSP operations.
For related coverage: patch management guide (a key element of ransomware prevention), cybersecurity compliance (BCDR requirements by framework), and infrastructure monitoring metrics (early warning for hardware failures). Start your NinjaIT trial for RMM monitoring that provides the early warning your BCDR depends on.
Ransomware Recovery: The Special Case in BCDR
Ransomware has fundamentally changed the BCDR calculus. Traditional disaster recovery assumes you are recovering from hardware failure or accidental deletion — scenarios where backup integrity is not in question. Ransomware adds a new dimension: the threat agent actively tries to compromise your backup before executing the encryption attack.
How Modern Ransomware Attacks Backups
Sophisticated ransomware operators follow a predictable playbook:
- Initial compromise: Gain foothold on one endpoint (phishing, vulnerability exploitation)
- Lateral movement: Spread to additional systems, seeking backup servers and admin credentials
- Backup neutralization: Delete VSS shadow copies, disable backup agents, encrypt backup storage accessible via mapped drives or network shares
- Encryption execution: Encrypt production data across all accessible systems
- Ransom demand: Present the demand after backup options have been eliminated
This sequence is why a backup that was adequate for hardware failures may be completely ineffective against ransomware. If the backup storage is accessible from the network during an attack, it is vulnerable.
Ransomware-Resistant Backup Architecture
Building backup infrastructure that survives ransomware requires layering defenses:
Layer 1: Offline/Air-gapped backup
At least one backup copy should be on media not continuously connected to the network:
- Tape backups (still the gold standard for air-gapped DR)
- USB drives rotated offsite (rotated frequently, not left connected)
- Cloud backup with access credentials not stored on any network device
Layer 2: Immutable cloud storage
Cloud object storage with Object Lock (AWS S3, Azure Blob, Backblaze B2 with Object Lock) provides write-once, read-many storage that cannot be deleted or modified during the retention period, even by credentials that are compromised:
Example AWS S3 Object Lock configuration:
Bucket type: Versioned
Object Lock mode: Compliance (cannot be overridden by admin)
Retention period: 30 days
Result: Any backup stored to this bucket cannot be deleted
or modified for 30 days, even with root credentials
Leading backup vendors with immutable storage support: Veeam (with AWS/Azure object storage), Acronis Cyber Backup, Datto (with built-in immutability), Druva.
Layer 3: Multi-factor authentication on backup consoles
Backup software credentials are high-value targets for ransomware operators. Protect backup console access with:
- MFA on the backup management console
- Dedicated service accounts for backup agents (not domain admin)
- Principle of least privilege for backup agent accounts
Layer 4: Isolated backup network
Where possible, place backup infrastructure on a VLAN that is not accessible from the main corporate network. Backup agents communicate to the backup server via a dedicated backup VLAN; workstations and servers cannot reach the backup storage directly.
RTO/RPO Under Ransomware: Different Calculations
When planning recovery from ransomware, RTO and RPO have different characteristics than hardware failure recovery:
Recovery time: Ransomware recovery often takes longer than hardware failure recovery because:
- You must verify the integrity of the backup (is it pre-infection?)
- You must clean and rebuild systems before restoring (restoring to a compromised system defeats the purpose)
- If Active Directory is compromised, you must rebuild AD before restoring other systems
Realistic RTOs for major ransomware events: 24–72 hours for critical systems, 1–2 weeks for full recovery. Your DR plan should acknowledge this reality.
Recovery point: Determining the safe recovery point is critical and complex. If ransomware was resident in the environment for 2 weeks before execution (common with sophisticated threat actors), the last clean backup may be 2 weeks old. You may lose significant data even with a functioning backup — but losing 2 weeks of data is far better than paying a ransom.
Plan for this: identify your last known clean backup date, understand what data was created or modified in the gap, and work with the client to recover or recreate data from other sources (email history, printed documents, client-supplied data).
BCDR for Cloud-Native Environments
As more clients move to cloud-native architectures, BCDR requirements evolve. Cloud providers offer high availability, but availability and backup are not the same thing.
The Shared Responsibility Model
Cloud providers (AWS, Azure, GCP) are responsible for the availability and durability of their infrastructure. You are responsible for:
- Data backup and recovery
- Configuration backup (IaC, not just data)
- Application-level resilience
- User error and accidental deletion recovery
"My data is in Azure, so it is backed up" is a dangerous and common misconception. Azure provides infrastructure redundancy — your data is on resilient storage that survives hardware failures. But accidental deletion, ransomware, and misconfiguration are your responsibility.
Cloud Backup Strategies
Data backup:
- Azure: Azure Backup service (supports VMs, SQL databases, file storage), plus cross-region replication for critical data
- AWS: AWS Backup (unified policy-based backup for EC2, RDS, S3, EFS), with cross-region backup copies
- Multi-cloud: Third-party tools (Veeam Backup for Azure, Acronis, Commvault) that provide vendor-neutral backup management
Configuration backup: Cloud infrastructure defined as code (Terraform, Bicep, CloudFormation) is itself version-controlled — this is your configuration backup. Ensure IaC repositories are backed up (GitHub/GitLab backup, or export to offline storage).
Microsoft 365 backup: As mentioned in the FAQ section: Microsoft's native retention is not a replacement for backup. Third-party M365 backup (Veeam Backup for Microsoft 365, Acronis, AvePoint) provides point-in-time recovery for Exchange, SharePoint, Teams, and OneDrive.
BCDR as a Revenue Stream: Packaging and Pricing
BCDR is one of the highest-value managed services MSPs can offer, and one of the easiest to justify with clients who have experienced — or fear — a major incident.
BCDR Service Tiers
Essential BCDR ($3–$8/device/month):
- Daily backup of all managed servers and workstations
- Cloud backup copy (3-2-1 rule compliance)
- Monthly backup restore verification test
- Annual DR tabletop exercise
- Backup failure monitoring and notification
Professional BCDR ($8–$15/device/month, includes business continuity):
- All Essential features
- Image-based backup with bare-metal restore capability
- Immutable cloud backup storage
- Quarterly backup restore test with documented results
- Semi-annual DR test (simulated failover for critical systems)
- Business continuity planning: documented BCP aligned to key recovery objectives
- Backup for Microsoft 365 / Google Workspace
Enterprise BCDR ($15–$30/device/month, includes DRaaS):
- All Professional features
- DR-as-a-Service (DRaaS): cloud failover for critical servers in < 4 hours
- RTO guaranteed by contract (with financial remedy for breach)
- Quarterly DR test (actual failover to cloud environment with application validation)
- Business impact analysis and annual BCP review
- Priority recovery services in the event of a declared disaster
Pricing Conversation Anchor
When clients balk at BCDR pricing, use this anchor:
"Your RTO target is 4 hours for your ERP system. Every hour of ERP downtime costs your business approximately $[X] in lost productivity and orders. Our DRaaS tier guarantees 4-hour recovery for $[Y]/month. At your downtime cost, one prevented incident of 8+ hours justifies [Z months] of this service. And ransomware events that destroy environments without immutable backup can take 2–4 weeks to recover — would you like to calculate what that costs?"
This is not fear-mongering — it is quantified risk analysis. Clients who understand their own risk calculus are motivated buyers of genuine BCDR services.
Incident Postmortem: Learning from Disasters
Every significant incident — whether a minor backup failure or a major ransomware recovery — is a learning opportunity. A structured postmortem process ensures your BCDR program continuously improves.
The Blameless Postmortem
Borrowed from DevOps and SRE culture, the blameless postmortem focuses on systemic causes rather than individual fault. The goal is to answer:
- What happened?
- Why did it happen?
- What did we learn?
- What changes will prevent recurrence?
Postmortem structure (complete within 48 hours of incident resolution):
Timeline: Reconstruct the sequence of events with timestamps. When was the issue first detectable? When was it detected? When was incident declared? When were key recovery decisions made?
Root cause analysis: Use the "5 Whys" technique to drill to systemic causes:
- Why did the server fail? (Drive failure)
- Why did drive failure cause extended downtime? (Spare drive not on hand)
- Why was no spare drive on hand? (No hardware refresh protocol for servers approaching end-of-warranty)
- Why was there no hardware refresh protocol? (No asset lifecycle process)
- Root cause: No asset lifecycle management → Action: implement ITAM program
What went well: Even in bad incidents, some things work — acknowledge them.
Action items: Specific, assigned, time-bound changes with owners and due dates. Not vague intentions — concrete changes to processes, tools, or training.
Share with the client: The completed postmortem (suitably summarized) should be shared with the client. Transparency about what happened and what you are doing to prevent recurrence builds trust. Silence erodes it.
Cyber Insurance and BCDR: The Coverage Connection
Cyber insurance underwriters now perform meaningful technical underwriting before issuing policies. The questions they ask directly correspond to BCDR maturity:
- Do you maintain immutable backups not connected to the production network?
- When was your last full DR test with documented results?
- Do you have a documented incident response plan?
- Do you have multi-factor authentication on email and remote access?
- What is your RTO and RPO for critical systems?
MSPs who help clients achieve cyber insurance underwriting standards are providing direct financial value — the difference between qualifying for coverage at standard rates vs. paying a 2–3× premium or being denied coverage entirely.
For MSPs who want to develop cyber insurance advisory capabilities, CyberXper(opens in new tab) offers specialized cybersecurity expertise including insurance underwriting support. CyberMammoth(opens in new tab) provides security assessments aligned to insurance questionnaire requirements.
Build BCDR maturity and you build clients who qualify for cyber insurance, who survive incidents, and who stay with you for the long term.
Frequently Asked Questions (Extended)
What is the difference between a BCDR plan and a DR plan?
A Disaster Recovery (DR) plan focuses specifically on IT system recovery: how to restore technology and data after a failure. A Business Continuity Plan (BCP) is broader: how does the entire business continue operations during a disruption, including non-IT functions (staff working from alternate locations, manual processes for critical functions when systems are unavailable). BCDR combines both: the BC plan covers operational continuity, the DR plan covers IT recovery.
How long should backup data be retained?
Retention requirements depend on compliance obligations and business needs. Typical minimums:
- Daily backups: 30 days
- Weekly backups: 12 weeks
- Monthly backups: 12 months
- Annual backups: 7 years (for environments with financial recordkeeping requirements)
Healthcare (HIPAA): minimum 6 years for medical records. Financial services: consult your specific regulatory requirements (FINRA: 6 years for some record types; SEC: varies). General business: 7 years is a defensible standard aligned with typical audit and litigation windows.
My client says they cannot afford BCDR services. What should I do?
Document the conversation. Present the cost of downtime vs. the cost of BCDR (the calculation above). If they still decline, document their decision in writing ("Client has declined BCDR services after reviewing risks dated [date]") and have them sign it. This is your protection when the inevitable incident occurs. For true budget constraints, offer a tiered approach: start with server-only backup and expand to full BCDR as budget allows. Partial BCDR is far better than none.
Can I use Windows Server Backup as the primary backup solution?
Windows Server Backup (WSB) can provide a baseline backup capability, particularly for smaller environments. However, it has significant limitations: no centralized management across multiple servers, limited scheduling flexibility, no built-in cloud integration, and limited granular restore capability. For MSPs managing client environments, a purpose-built backup solution (Veeam, Acronis, Datto) with centralized management, cloud integration, and immutable backup capabilities provides substantially better protection and operational efficiency.
Appendix: BCDR Technology Reference
Backup Technology Glossary
Incremental backup: Only backs up data that has changed since the last backup (of any type). Fast and storage-efficient. Requires the last full backup plus all incrementals to restore.
Differential backup: Backs up data changed since the last full backup. Larger than incremental but faster to restore (only need last full + last differential).
Image-based backup: Captures a complete snapshot of the entire disk/system, including OS, applications, and data. Enables bare-metal restore to dissimilar hardware.
Continuous Data Protection (CDP): Near-real-time replication of every write operation. RPO of minutes or seconds. Highest cost and storage requirements.
Deduplication: Eliminates redundant data across backups. A file that appears in 50 users' backups is stored once, dramatically reducing storage requirements. Most enterprise backup platforms include deduplication.
Compression: Reduces backup file size through standard compression algorithms. Combined with deduplication, modern backup platforms achieve 10–30:1 storage reduction ratios for typical business data.
Replication: Continuous or scheduled copying of backup data to a secondary location. Distinct from backup: replication synchronizes data but does not maintain historical versions (if you replicate a ransomware infection, the replica is also infected).
DR Terminology Glossary
RTO (Recovery Time Objective): Maximum acceptable time to restore service after a declared disaster. A 4-hour RTO means the business has determined it can tolerate up to 4 hours of service unavailability.
RPO (Recovery Point Objective): Maximum acceptable data loss measured in time. A 1-hour RPO means the business can lose up to 1 hour of data and still operate. Drives backup frequency: if RPO is 1 hour, backups must run at least hourly.
MTPD (Maximum Tolerable Period of Disruption): The longest period the business can survive disruption before the disruption causes irreversible harm (bankruptcy, permanent customer loss, regulatory action). MTPD is the business context that sets RTO.
RTO vs. MTPD: RTO must always be < MTPD. If the business can tolerate 24 hours of disruption before irreversible harm, your RTO target should be significantly under 24 hours (4–8 hours) to provide margin.
Failback: After failing over to a DR site during a disaster, failback is the process of returning production operations to the original site once it is restored. Often more complex than failover and sometimes neglected in DR planning.
DRaaS (Disaster Recovery as a Service): Cloud-based DR where a service provider maintains hot or warm standby capacity for your workloads. On disaster declaration, your workloads are activated in the provider's cloud with a guaranteed RTO.
Cybersecurity & Compliance Strategist
Sarah is a cybersecurity practitioner with 11 years of experience helping MSPs and mid-market companies navigate compliance frameworks including SOC 2, HIPAA, GDPR, and CMMC. She previously led the security practice at a 200-person managed security services provider and regularly speaks at Channel Partners conferences. CISSP and CISM certified.
Ready to put this into practice?
NinjaIT's all-in-one platform handles everything covered in this guide — monitoring, automation, and management at scale.