IT under threat, says Veritas

It's 10pm, do you know where your DR plan is?

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Storage Expo IT managers are more aware than ever of threats to their operations, yet many still have no disaster recovery plans - and two thirds keep their DR plan in the data centre, where it will be destroyed by the same fire that knocks out the IT systems. Worse, they could be ignoring invisible risks such as software patches.

That's according to a survey of IT managers in large organisations, commissioned by Veritas. More than half of those questioned feel at threat from man-made disasters and internal risks such as employee misbehaviour, it says, while nearly three-quarters feel exposed to external threats such as viruses and hackers,

"This feeling of threat is something I haven't seen before," says Chris Boorman, EMEA marketing veep at Veritas. "This whole climate of threat is intriguing."

Boorman wants organisations to plan for disasters and test those plans regularly, but says few are doing so at present, although he notes that 10 percent say they have already had to execute their DR strategy in response to a natural disaster.

"There are 41,400 fires on UK commercial premises that require Fire Brigade assistance every year, according to statistics from the Office of the Deputy Prime Minister - that's 112 a day," he says.

"There has been a significant increase in the perception of threat, yet 44 per cent of companies have no idea how long it would take them to get running again, and only 20 per cent think they'd have even skeletal operations back within 12 hours. The average time to get mostly-running again is estimated as four days, and for normal operations it's six and a half days."

He warns though that even as companies plan to recover from fires and hack attacks, they are failing to check the effectiveness of software patches or review their DR plans to keep pace.

On the plus side, he says more companies - 31 per cent, up from 22 per cent last year - are involving the board in their DR plans, and fewer of them claim they are too small, or the risks too low, to need such a plan. ®

Reg coverage from Storage Expo '04

Europe's SAN avoidance strategy
Removable disks back from the dead
LTO bids to regain its pace
The risks of remote backup
Exabyte cuts its media costs

Remote control for virtualized desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Do you spend ages wasting time because of a bulging rack?
No more cloud-latency tea breaks for you, users! Get a load of THIS
prev story


Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.