Cybersecurity: 24/7/365

Picture this: You walk into your office Monday morning and your server is dead. Patient records, billing data, appointment schedules — gone. Maybe it's a hardware failure. Maybe ransomware. Maybe a burst pipe flooded your server closet over the weekend.
What happens next depends entirely on what you did before this moment. A practice with a tested disaster recovery plan is back online in hours. A practice without one cancels patients for weeks, scrambles for data, and faces HIPAA penalties on top of everything else.
This guide covers how to build backup and disaster recovery systems that actually work when you need them.
People use these terms interchangeably. They shouldn't. Backup means copies of your data stored somewhere safe. Disaster recovery (DR) is a complete plan to restore your entire operation — systems, applications, data, and workflows — after something goes catastrophically wrong.
Backup is having a spare tire. Disaster recovery is knowing how to change it, having the jack and wrench in your trunk, and getting back on the road in under an hour. You need both. A practice with perfect backups but no recovery plan has data sitting in storage and no way to access it when the clock is ticking.
Your DR plan needs to address multiple failure modes — not just the one you think is most likely. Each scenario has different recovery requirements:
Ransomware attack: The most common disaster scenario for healthcare practices. Attackers encrypt your files and demand payment. Modern ransomware also targets backup files specifically — if your backups are connected to the network, they get encrypted too. Recovery requires clean, isolated backups plus forensic verification that the attacker is fully removed before restoring. Average recovery time without preparation: 19 days. With tested DR plan and air-gapped backups: 4-24 hours.
Hardware failure: Servers, drives, and RAID arrays fail without warning. A single drive failure in a properly configured RAID array is recoverable. A controller failure or multiple simultaneous drive failures can be catastrophic. Recovery depends on backup freshness and whether you have standby hardware or cloud failover ready.
Natural disaster or facility damage: Fire, flood, earthquake, power surge, or burst pipes can destroy your physical infrastructure. Everything in that server closet — servers, switches, backup drives sitting on the shelf — is gone. Recovery requires offsite backups and a plan for operating from an alternate location or cloud environment.
Vendor outage: If your cloud EHR vendor goes down, your practice can't access patient records even though your local network is fine. You need a plan for operating during vendor downtime — last-known-good patient data exports, paper workflows for critical functions, and staff who know the fallback procedures.
This rule has survived decades because it works. Keep 3 copies of your data. Store them on 2 different media types (local server and cloud storage, or local server and offsite physical media). Keep 1 copy offsite — physically and logically separate from your practice network.
Why three copies? Because hardware fails. Because ransomware encrypts everything it can reach on the network. Because the one time you need your backup is the one time a single copy won't be enough.
For healthcare practices facing ransomware threats, the rule should be upgraded to 3-2-1-1: three copies, two media types, one offsite, and one immutable. An immutable backup cannot be modified or deleted — even by an attacker with admin credentials on your network. Immutable cloud storage and air-gapped offline backups both satisfy this requirement.
Most practices back up their EHR data and stop there. That's not enough. A full restore requires everything your practice needs to operate:
The test is simple: if losing it would slow your practice's recovery, back it up.
RPO (Recovery Point Objective) answers: how much data can you afford to lose? If your RPO is 24 hours, your backups run nightly. If something crashes at 4 PM, you lose everything since last night's backup — a full day of charting, billing, and scheduling. For most medical practices, an RPO of 1-4 hours is appropriate. High-volume practices or those with imaging data may need continuous replication with an RPO of minutes.
RTO (Recovery Time Objective) answers: how long can your practice be down? If your RTO is 4 hours, your disaster recovery plan must restore operations within that window. Every hour beyond your RTO costs you $7,900 in the healthcare average — canceled patients, delayed billing, idle staff, and overtime to catch up.
These numbers aren't abstract. They drive every decision about your backup technology, your recovery infrastructure, and your budget. A 1-hour RTO requires very different infrastructure than a 24-hour RTO.
Know your numbers. Write them down. Build your plan around them.
"We thought we had backups" is one of the most common phrases heard during healthcare disaster recovery. Backups fail silently. Files corrupt. Storage fills up. Credentials expire. Agents stop running. Nobody notices until the worst possible moment.
Test your backups at least quarterly — monthly is better. Run a full restore to a test environment. Verify that applications launch, data is intact and current, and user access works. Time the entire process and compare against your RTO.
Document each test with:
This documentation satisfies HIPAA's contingency plan testing requirement and proves to auditors that your plan actually works — not just that it exists on paper.
HIPAA's Security Rule (§164.308(a)(7)) requires covered entities to maintain a contingency plan with five specific components:
This isn't optional. OCR auditors ask for contingency plan documentation in every investigation. Not having one is a violation regardless of whether you've ever experienced a disaster. A practice that suffers a ransomware attack and can't produce a contingency plan faces compounded penalties — the breach itself plus the compliance failure.
OCR also expects your plan to be current. A contingency plan from 2021 that references a server you replaced two years ago doesn't demonstrate compliance. Review and update your plan at least annually and after every major infrastructure change.
Cloud DR has changed what's possible for small practices. Instead of maintaining a second physical location with standby servers, your systems replicate to secure cloud infrastructure continuously. If your office is destroyed, you spin up your entire environment in the cloud and keep working from laptops at an alternate location.
Cloud DR advantages for medical practices:
Cloud DR doesn't eliminate the need for planning. You still need to define your RPO and RTO, test your recovery procedures, and train staff on failover operations. But it removes the hardware cost and maintenance burden that made DR impractical for small practices.
Ransomware is the #1 reason healthcare practices need DR plans, and it requires specific backup considerations that general DR planning doesn't cover:
Air-gapped or immutable backups are mandatory. Standard network-attached backups get encrypted along with everything else during a ransomware attack. Your backup system must include at least one copy that ransomware physically cannot reach — either disconnected from the network or stored in immutable cloud storage.
Retain multiple recovery points. Attackers sometimes lurk in your network for weeks before triggering encryption. If your only backup is from last night, it may contain the attacker's backdoor. Maintain 30-90 days of recovery points so you can restore to a point before the initial compromise — not just before the encryption.
Verify backup integrity before restoring. Never restore onto a still-compromised network. Your IT team must confirm the ransomware is fully contained and all backdoors are removed before beginning restoration. Restoring onto a compromised network means re-infection within hours.
Separate backup credentials. Your backup system should use credentials that are completely separate from your domain admin accounts. If attackers compromise your Active Directory, they shouldn't automatically gain access to your backup management console.
A DR plan doesn't need to be a 100-page document. It needs to be clear, specific, and usable under stress. Here's what to include:
1. Asset inventory and criticality ranking. List every system your practice depends on and rank them by recovery priority. Your EHR comes first. Your email server comes second. Your digital signage comes last. This ranking tells your recovery team what to restore in which order.
2. Contact list. Names, phone numbers, and roles for everyone involved in recovery: IT provider, practice owner, office manager, insurance carrier, EHR vendor support, internet provider, legal counsel, and HHS reporting contact. Printed copies — digital contact lists don't help when your systems are down.
3. Recovery procedures by scenario. Step-by-step instructions for each disaster type: ransomware, hardware failure, facility damage, and vendor outage. Each scenario has different first steps and different recovery sequences.
4. Communication plan. Who notifies staff? Who contacts patients with scheduled appointments? Who handles media inquiries if the breach is reportable? Who posts updates to your website and phone system? An AI receptionist can handle patient calls during a disaster — rescheduling appointments, providing status updates, and routing urgent clinical matters — while your staff focuses on recovery.
5. Emergency operations procedures. How your practice continues seeing patients during recovery. Paper charting templates. Printed medication lists for active patients. Manual appointment schedules. Prescription call-in procedures. Staff need to practice these fallback workflows before they need them.
6. Vendor contact and SLA information. Response time commitments from your IT provider, EHR vendor, and internet provider. Escalation procedures for each. Contract numbers and account information.
7. Annual review and testing schedule. When you'll test the plan (at least annually), who participates, and how you'll document results. Include a tabletop exercise where your team walks through a scenario verbally — it costs nothing and reveals gaps every time.
Most small practices can't build and maintain a DR program in-house. Backup monitoring, testing, documentation, and recovery execution all require expertise and consistent attention that clinical staff can't provide.
A managed IT provider handles the daily work that makes DR reliable:
The critical difference: a managed provider discovers your backup failed at 2 AM and fixes it before your staff arrives. Without monitoring, you discover the failure six weeks later when you actually need the backup — and it's too late.
Disasters don't send calendar invites. A hardware failure, a ransomware attack, or a burst pipe doesn't wait for you to finish building your DR plan. The time to prepare is right now — before you need it.
A solid backup and disaster recovery program costs a fraction of what a single data loss event would cost in money, downtime, and patient trust. Check our pricing page for managed backup and DR services, or book a consultation and we'll assess your current backup setup. We'll tell you honestly whether your backups would survive a real disaster — and what to fix if they wouldn't.
Questions? Reach out to our team. We'll give you straight answers about where your practice stands.