More than half of CIOs lack a formal disaster recovery plan

December 2003 Security Services & Risk Management, Surveillance, Access Control & Identity Management

54% of companies across Europe do not have a formal disaster recovery (DR) plan to cover all their existing IT infrastructure, and 18% do not have a formal DR plan in place at all. These are two of the findings to emerge from an independent Pan-European survey commissioned by Unisys.

The research highlights the risks and costs facing CIOs when considering the impact technology investment has on their business. Three real challenges for the CIO were highlighted: finance (cost), security and governance. However, the research also revealed that CIOs are leaving their companies dangerously exposed by not taking sufficient action to address these challenges. The survey found:

* That 67% of CIOs find it difficult to calculate the cost of losing data.

* That 77% of CIOs said they cannot quantify the financial impact of taking servers out or adding servers into their existing IT infrastructure. This means, for example, that they would be unable to calculate the benefits of consolidation and thus miss out on an opportunity to reduce costs.

* In terms of testing DR plans, nearly 30% of CIOs admit they do not test their DR plan even for mission-critical technology or are unaware if this plan is being tested.

"This begs the question as to what is 'mission-critical'?" asks Bernard Donnelly, technology consultancy services manager, Unisys Africa. "With the increase in corporate governance, directors need to respond to regulations, or they will find themselves liable. "The research suggests that too many CIOs are not checking what is going on in their organisations, and they are not examining their IT infrastructure closely enough. Most companies do not really analyse the value of their IT systems; too many servers, for example, are operating at under 30% capacity and companies need to use technology to its full potential."

Tony Lock, chief analyst, Bloor Research, comments, "It is apparent that many organisations have not yet managed to comprehend the value that their IT infrastructures hold in business terms. Very many organisations are totally dependent on their IT systems to operate a number of critical business services. It is essential that these systems have business continuity plans appropriate to the needs of the business.

"Disaster recovery is all about people, process and technology working together to ensure that service levels are maintained at the levels needed for the business to continue to operate. It is vital that companies find the time to understand what they need to protect and how this can be achieved. Experience has shown that standardisation can play a pivotal role in keeping IT and business operational in times of stress." CIOs can collaborate more effectively with their CFOs by supporting change in their culture, systems and processes to achieve their business objectives. Such change could be based on a process and system strategy that provides the following:

* Enterprise-wide global information.

* Consistent definitions.

* Realtime access.

* Adaptability to business structure changes.

* Cost-competitive infrastructure.

The following checklist includes some of the questions CIOs could address in order to prepare themselves for any process of change:

* What sort of assessment do you undertake?

* Do you have a business continuity plan?

* Is there a disaster recovery capability for your mission-critical systems?

* Is this disaster recovery capability tested on a regular basis?

* Do you have an overall availability target for your operation?

* As you have established your disaster recovery capability, have you used consolidation as a means to create a more reliable environment?

* How many servers are there in your company?

* What level of utilisation do they run at? (if 10% is the average, why not 90-100%?)

* How do you propose to increase this utilisation?

* What is the current number of users and the expected number of future users (do they have a plan to match the company growth strategy?)

* What is the upgrade path for security patches and service pack plan for the operating systems?

* The Unisys survey methodology: 200 telephone interviews were conducted with CIOs or their reports and CFOs or their reports in UK, France, Germany, Italy, Spain, Portugal and Netherlands. All individuals interviewed were from organisations employing 500+ people.

Bernard Donnelly
Bernard Donnelly

For more information contact Bernard Donnelly, Unisys Africa, 011 233 4000, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Keeping safety central to enterprise risk management
Zulu Consulting Security Services & Risk Management
[Sponsored] As employee safety becomes an ever-more critical aspect of corporate risk management, Risk-IO assists risk managers in ensuring a safe working environment, whether in an industrial setting, an office, or anywhere.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
The need for integrated control room displays
Leaderware Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
The need for integrated control room displays
Editor's Choice Surveillance Training & Education
Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.

Read more...
New firearms training modules from ITA
News & Events Security Services & Risk Management
The International Firearm Training Academy has launched two new firearms training modules to support career development in the firearms industry: the Maintenance Fitter and the Firearms Custodian modules.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...