Count the cost of a lost day

July 2010 Information Security

One thing you can be sure of with computers is that, eventually, they will break down. When you are busy running an organisation, checking your backup and recovery strategy can be the last thing on your mind. However, according to a recent study conducted by Acronis and research house Vanson Bourne, 63% of SMBs would take a day or more to recover from system failure. Just imagine how your business would cope without its systems and data for a day.

Despite living in a world where businesses operate around the clock, the majority of small to mid-sized companies are still putting their systems, and therefore their productivity and profitability at risk by failing to protect them adequately. It really does not matter what causes your systems to fail, be it a virus attack, software bug or a hardware breakdown, the results are pretty much the same: hours or even days of downtime and the potential loss of untold amounts of work. If you have got a recent backup, however, and a well conceived recovery plan, the financial and productivity impact on your business can be minimised.

Dual protection

Feedback from our customers shows that organisations are protecting their servers, often backing them up automatically, meaning regular backups are in place. Servers are the lifeline of any IT infrastructure so it is critical that they are safeguarded and backed up regularly.

However, despite backing up their servers, our research found a shocking 25% of organisations still back up their PCs and laptops manually, while 19% do not carry out backups at all. While employees are sometimes encouraged to back up to a network, unfortunately this does not always work in practice. Many employees save folders loosely on their desktop or make updates to documents when they are out of the office.

In fact, according to analyst estimates, 60% of an organisation’s data is held on workstations, not servers. This means that the majority of your data could be at risk. In addition, consider the cost of sending out an IT administrator to fix or reinstall a remote office worker’s laptop. Not only does the employee have limited access to data, they are also without a PC and their applications are unable to work. In short, you need to make sure both your workstations and servers are safeguarded, backed-up automatically and preferably centrally managed.

Backup does not equal recovery

A survey of storage managers by IDC showed that 87% are confident or highly confident that their disaster recovery (DR) processes would allow them to restore the data for their business critical applications. However, only half of those 87% test their DR strategies more than once a year. Even if you are confident that your backups are running frequently, you should ensure that they are regularly tested otherwise you could be left out on a limb. Make a point to run tests on your backups every quarter.

Examine how comprehensive your strategy is

Many SMBs rely on an end-of-day backup strategy. Our research unveiled that 72% of businesses only run their backups at the end of the day. However, this can cause problems. If a disaster strikes five minutes before the next backup is due to be made, all the data created that day will be lost. How much would a day’s productivity cost your organisation?

In addition to this, some backup systems can only recover file level data, and cannot restore applications or systems settings. Redeployment is therefore labour-intensive and time-consuming, requiring you to find the original software disks and reset preferences manually. Imagine if all the PCs in your organisation were hit by a virus attack. How long would it take you to reinstall each machine from scratch?

Put DR at the top of your list

The financial and productivity implications that the loss of data has, coupled with the disruption and downtime caused by failure, is enough to make anyone shiver. Of primary concern to business leaders is business continuity, providing employees with their IT systems to work on and customers with the ability to communicate and transact with the organisation. However, the reality is that backup and recovery does not need to be difficult to achieve, so make sure you put it at the top of your priority list.

For more information contact Biodata IT South Africa, +27 (0)11 234 3650, www.biodata.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Get proactive with cybersecurity
Information Security
The ability to respond effectively to a cybersecurity breach is critical, but the missing piece of the puzzle is a thorough, proactive evaluation to ascertain weaknesses and identify any hidden threats.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
How to securely manage your digital footprint
Information Security Training & Education
Managing your online presence is critical to safeguarding your privacy and security. It is imperative to take a proactive approach, including using robust cybersecurity best practices.

Read more...
The state of code security in 2024
Information Security
The 2024 State of Code Security survey reveals that organisations have continued to shore up application security defences over the last year, according to OpenText Premier Partner iOCO Application Management.

Read more...
What is the level of safety and integrity of the software supply chain?
Information Security IoT & Automation
Organisations are embracing AppSec practices and focusing on their software security posture. However, they highlight that insufficient funding and security resources, plus a disconnect between developers and security teams, remain major roadblocks.

Read more...
Cybercriminals target financial service providers to get at sensitive client data
Information Security
According to Ryan van de Coolwijk, Product Head for cyber at iTOO Special Risks, hackers target financial service providers because they hold sensitive client information that unauthorised individuals could use for fraudulent activities.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...