Count the cost of a lost day

July 2010 Information Security

One thing you can be sure of with computers is that, eventually, they will break down. When you are busy running an organisation, checking your backup and recovery strategy can be the last thing on your mind. However, according to a recent study conducted by Acronis and research house Vanson Bourne, 63% of SMBs would take a day or more to recover from system failure. Just imagine how your business would cope without its systems and data for a day.

Despite living in a world where businesses operate around the clock, the majority of small to mid-sized companies are still putting their systems, and therefore their productivity and profitability at risk by failing to protect them adequately. It really does not matter what causes your systems to fail, be it a virus attack, software bug or a hardware breakdown, the results are pretty much the same: hours or even days of downtime and the potential loss of untold amounts of work. If you have got a recent backup, however, and a well conceived recovery plan, the financial and productivity impact on your business can be minimised.

Dual protection

Feedback from our customers shows that organisations are protecting their servers, often backing them up automatically, meaning regular backups are in place. Servers are the lifeline of any IT infrastructure so it is critical that they are safeguarded and backed up regularly.

However, despite backing up their servers, our research found a shocking 25% of organisations still back up their PCs and laptops manually, while 19% do not carry out backups at all. While employees are sometimes encouraged to back up to a network, unfortunately this does not always work in practice. Many employees save folders loosely on their desktop or make updates to documents when they are out of the office.

In fact, according to analyst estimates, 60% of an organisation’s data is held on workstations, not servers. This means that the majority of your data could be at risk. In addition, consider the cost of sending out an IT administrator to fix or reinstall a remote office worker’s laptop. Not only does the employee have limited access to data, they are also without a PC and their applications are unable to work. In short, you need to make sure both your workstations and servers are safeguarded, backed-up automatically and preferably centrally managed.

Backup does not equal recovery

A survey of storage managers by IDC showed that 87% are confident or highly confident that their disaster recovery (DR) processes would allow them to restore the data for their business critical applications. However, only half of those 87% test their DR strategies more than once a year. Even if you are confident that your backups are running frequently, you should ensure that they are regularly tested otherwise you could be left out on a limb. Make a point to run tests on your backups every quarter.

Examine how comprehensive your strategy is

Many SMBs rely on an end-of-day backup strategy. Our research unveiled that 72% of businesses only run their backups at the end of the day. However, this can cause problems. If a disaster strikes five minutes before the next backup is due to be made, all the data created that day will be lost. How much would a day’s productivity cost your organisation?

In addition to this, some backup systems can only recover file level data, and cannot restore applications or systems settings. Redeployment is therefore labour-intensive and time-consuming, requiring you to find the original software disks and reset preferences manually. Imagine if all the PCs in your organisation were hit by a virus attack. How long would it take you to reinstall each machine from scratch?

Put DR at the top of your list

The financial and productivity implications that the loss of data has, coupled with the disruption and downtime caused by failure, is enough to make anyone shiver. Of primary concern to business leaders is business continuity, providing employees with their IT systems to work on and customers with the ability to communicate and transact with the organisation. However, the reality is that backup and recovery does not need to be difficult to achieve, so make sure you put it at the top of your priority list.

For more information contact Biodata IT South Africa, +27 (0)11 234 3650, www.biodata.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...
Credential theft surges in South Africa
NEC XON Information Security
NEC XON issues a critical cybersecurity warning about the dual threat of massive credential theft and AI-powered cyberattacks sweeping across the region, with an increasing number of incidents and evolving threat tactics.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.