{"id":736,"date":"2010-04-07T09:58:18","date_gmt":"2010-04-07T14:58:18","guid":{"rendered":"http:\/\/eljeffto.com\/?p=736"},"modified":"2014-07-08T18:19:30","modified_gmt":"2014-07-08T23:19:30","slug":"consejo-5-los-planes-de-contingencia-no-son-opcionales","status":"publish","type":"post","link":"https:\/\/eljeffto.com\/?p=736","title":{"rendered":"Consejo 5: Los planes de contingencia no son opcionales"},"content":{"rendered":"<p style=\"text-align: justify;\">Solemos identificar nuestros puntos d\u00e9biles a nivel de arquitecturas, infraestructuras, energ\u00eda, software, hardware, tecnolog\u00eda en general, cuando ocurren incidentes que afectan la continuidad del servicio. Es muy com\u00fan que notamos que los respaldos de energ\u00eda no entran en funcionamiento cuando se requiere, que los sistemas de respaldo toman demasiado tiempo en entrar en producci\u00f3n en caso de fallo de los principales y muchas casos y cosas m\u00e1s. Es por ello que es de vital importancia el desarrollo de planes de contingencia para todos los aspectos posibles a nivel de tecnolog\u00eda: Hardware, Software, Energ\u00eda, Comunicaciones, Fen\u00f3menos naturales, seguros. Para que no nos demos cuenta que cuando aparentemente la contingencia serv\u00eda, no es as\u00ed. Lectura recomendada:<a title=\"BCP\" href=\"http:\/\/en.wikipedia.org\/wiki\/Business_continuity_planning\" target=\"_blank\"> http:\/\/en.wikipedia.org\/wiki\/Business_continuity_planning<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Solemos identificar nuestros puntos d\u00e9biles a nivel de arquitecturas, infraestructuras, energ\u00eda, software, hardware, tecnolog\u00eda en general, cuando ocurren incidentes que afectan la continuidad del servicio. Es muy com\u00fan que notamos que los respaldos de energ\u00eda no entran en funcionamiento cuando se requiere, que los sistemas de respaldo toman demasiado tiempo en entrar en producci\u00f3n en &#8230; <span class=\"more\"><a class=\"more-link\" href=\"https:\/\/eljeffto.com\/?p=736\">[Read more&#8230;]<\/a><\/span><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[362,192,28],"tags":[385,386,585],"class_list":{"0":"entry","1":"post","2":"publish","3":"author-jeffto","4":"post-736","6":"format-standard","7":"category-seguridad-de-la-informacion","8":"category-sysadmin","9":"category-tecnologia","10":"post_tag-bcp","11":"post_tag-contingencia","12":"post_tag-sysadmin"},"_links":{"self":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts\/736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=736"}],"version-history":[{"count":5,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts\/736\/revisions"}],"predecessor-version":[{"id":1552,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts\/736\/revisions\/1552"}],"wp:attachment":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}