IT Disaster Recovery Plan Template for Small Business

Published March 22, 2026 - 15 min read

On a Friday evening, a ransomware attack encrypts every file on a 60-person manufacturing company's network. The file server, the ERP system, email, the CRM, and 14 years of engineering drawings are all locked behind a ransom demand of 15 Bitcoin. The owner calls the IT manager, who has been there for three years but has never written down what to do in a situation like this. The backup system exists, but nobody has tested a restore in over a year. The IT manager discovers that the backup drive was connected to the network and was encrypted along with everything else. Monday morning, 60 employees have nothing to work with. The company pays the ransom. The decryptor works on some files but corrupts others. Full recovery takes 23 days. The total cost - including ransom, lost revenue, overtime labor, emergency consulting, and customer penalties for late deliveries - reaches $1.4 million.

A disaster recovery plan would not have prevented the attack. But it would have reduced recovery time from 23 days to 48 hours, eliminated the ransom payment, and cut the total cost by over 90%. The plan does not need to be complex. It needs to exist, it needs to be documented, and it needs to be tested.

This article provides a complete disaster recovery plan framework that any small business IT team can adapt. It covers every section your plan needs, explains why each section matters, and gives you a practical template to fill in with your own systems and procedures.

Section 1: Business Impact Analysis

Before you can plan recovery, you need to understand what you are recovering and how urgently each system needs to be restored. A Business Impact Analysis (BIA) answers two critical questions for every system in your organization.

Recovery Time Objective (RTO)

RTO defines the maximum amount of time a system can be down before the impact becomes unacceptable. For each system, ask: "If this system goes offline right now, how long before the business suffers serious harm?" The answer varies dramatically by system.

Recovery Point Objective (RPO)

RPO defines the maximum amount of data loss that is acceptable, measured in time. If your RPO for the accounting system is 4 hours, that means you can afford to lose up to 4 hours of accounting data. Everything entered in the last 4 hours before the disaster would need to be re-entered manually. RPO directly determines your backup frequency.

Map every system in your organization to an RTO and RPO tier. This exercise takes 2-3 hours and is the single most valuable step in disaster recovery planning. Without it, you will either over-invest in backup infrastructure for non-critical systems or under-invest for critical ones. The BIA is also required by SOC 2, HIPAA, and most cyber insurance policies.

Section 2: Backup Strategy - The 3-2-1-1 Rule

The traditional 3-2-1 backup rule says: maintain 3 copies of your data, on 2 different types of media, with 1 copy offsite. In 2026, with ransomware specifically targeting backup systems, the rule has evolved to 3-2-1-1: add 1 immutable copy that cannot be modified or deleted, even by an administrator.

Implementing 3-2-1-1 for SMBs

  1. Copy 1: Production data. This is your live data in your applications, databases, and file systems. It is not a backup - it is what you are protecting.
  2. Copy 2: Local backup. A backup stored on local infrastructure (NAS, dedicated backup server, or local disk array) that enables fast restoration. Local backups should be on a separate network segment from production systems with dedicated credentials that are not shared with any production accounts. Ransomware that compromises an admin account should not be able to reach the backup system.
  3. Copy 3: Offsite backup. A backup stored in a geographically separate location. Cloud storage (AWS S3, Azure Blob, Google Cloud Storage, or Backblaze B2) is the most practical option for SMBs. For organizations in a single region, the offsite backup should be in a different geographic region to protect against natural disasters.
  4. Copy 4: Immutable backup. A backup that cannot be modified or deleted for a defined retention period, even by someone with administrative credentials. AWS S3 Object Lock, Azure Immutable Blob Storage, and Backblaze B2 all support immutability. Set a retention period that matches your longest recovery scenario (typically 30-90 days). This is your last line of defense against ransomware that specifically targets and deletes backups.

What to Back Up

Not everything needs the same backup treatment. Align your backup strategy with your BIA tiers.

Section 3: Communication Plan

During a disaster, communication failures cause as much damage as the technical failure itself. Employees do not know what is happening. Customers cannot reach anyone. Vendors are sending invoices to a dead email system. A communication plan ensures that the right people know what is happening, what to do, and when to expect resolution.

Internal Communication

External Communication

Section 4: Ransomware-Specific Response

Ransomware is now the most likely disaster scenario for small businesses. Your DR plan needs a specific section addressing ransomware response because the correct actions differ significantly from other disaster types.

  1. Do not pay the ransom as a first response. Contact your cyber insurance carrier and legal counsel before making any payment decision. Many insurers have negotiators who can reduce ransom demands by 40-60%. In some jurisdictions, paying ransoms to sanctioned entities is illegal. Insurance may cover the ransom payment if recovery from backups is not feasible, but only if you follow their incident response process.
  2. Isolate before investigating. Disconnect all network connections immediately - internet, internal network, VPN. Ransomware often has a propagation component that continues encrypting reachable systems while you are investigating. Minutes matter.
  3. Identify the ransomware strain. Upload a ransom note or encrypted file sample to ID Ransomware (a legitimate identification service). Some ransomware strains have known decryptors available for free. Check the No More Ransom project before considering payment.
  4. Assess backup integrity before restoration. Verify that your backups are clean and not encrypted or corrupted. Ransomware sometimes lies dormant for weeks before activating, meaning recent backups may contain the ransomware payload. Test restoration in an isolated environment before connecting restored systems to the production network.
  5. Rebuild, do not decrypt. Even if you obtain a decryptor (through payment or a free tool), rebuilding systems from known-good backups is faster and more reliable. Decryptors do not always work perfectly, and the attacker may have installed additional backdoors that a decryptor will not remove. Use the disaster as an opportunity to rebuild with improved security configurations.
The single most important ransomware defense is an immutable, air-gapped backup that the attacker cannot reach. If your backups are on a network-connected device using credentials that any admin account can access, assume they will be encrypted along with everything else. Immutable cloud storage with object lock is the most practical implementation for SMBs - it costs roughly $0.005 per GB per month and can save your entire business.

Section 5: Recovery Procedures

Document step-by-step recovery procedures for each Tier 1 and Tier 2 system. These procedures should be detailed enough that someone other than the primary IT person can execute them. The primary IT person might be on vacation, might be the person who caused the disaster, or might be unavailable for any number of reasons.

What Each Procedure Should Include

Recovery Order Template

Systems should be restored in dependency order, not importance order. A Tier 1 application that depends on a Tier 2 database must wait until the database is restored. Here is a typical recovery sequence.

  1. Network infrastructure. DNS, DHCP, firewall, VPN. Without network connectivity, nothing else can be restored.
  2. Identity and authentication. Active Directory, identity provider, MFA. Without authentication, nobody can log in to restored systems.
  3. Databases. Restore database servers and verify data integrity before bringing application servers online.
  4. Core business applications. ERP, CRM, email, file services - restore in BIA tier order.
  5. Communication systems. Phone, internal messaging, video conferencing.
  6. Secondary systems. Reporting, analytics, internal tools, development environments.

Section 6: Testing Your Plan

An untested disaster recovery plan is a hypothesis, not a plan. Testing reveals gaps that documentation cannot: corrupted backups, missing credentials, procedures that assume dependencies that no longer exist, and recovery times that exceed your RTO by hours.

Testing Levels

Section 7: Plan Maintenance

A disaster recovery plan that was written 18 months ago and never updated is almost as dangerous as no plan at all. Systems change, people leave, vendors are replaced, and the plan becomes fiction.

Disaster recovery planning is not exciting work. It does not generate revenue, it does not ship features, and it sits unused until the worst day of your business. But when that day comes - and statistics say it will - the difference between a company that recovers in 48 hours and one that spends three weeks in chaos is a plan that was written, tested, and maintained. Start with your BIA. Get your backups right. Test quarterly. The rest will follow.

Get IT Support Insights Delivered Weekly

Practical tips for IT teams - troubleshooting guides, cost-saving strategies, and tool reviews. No spam, unsubscribe anytime.

Ready to automate your IT support?

HelpBot resolves 60-70% of Tier 1 tickets automatically. 14-day free trial - no credit card required.

Start Free Trial

Track DR Tasks and Incidents in One System

HelpBot manages disaster recovery testing tasks, backup verification schedules, and incident response tickets in a single platform with automated SLA tracking and escalation. Never miss a DR test deadline again. Start your free trial.

Start Your Free Trial

Back to Home

Still managing IT tickets manually?

See how HelpBot can cut your ticket resolution time by 70%. Free ROI calculator included.

Calculate Your ROIStart Free Trial