reprinted with permission from HP
Most companies spend time anticipating and planning for disasters. But in a global economy, where opportunity and risk go hand-in-hand, other events can be as devastating to the unprepared as any hurricane.
The corporate landscape is dotted with potential landmines that can take a toll on businesses:
Many executives believe their chance of suffering a disaster is slim and operate their businesses accordingly. In enterprises with multiple locations, however, natural disasters and human-generated events are very likely, says Rob Enderle, principal analyst with technology analyst firm the Enderle Group. “While the incidence of disaster is slight locally, when the entire world is factored in, a major problem is not only certain, it is a recurring event.”
Disaster preparedness plans help minimize downtime, keep employees focused on their core responsibilities, and safeguard against the loss of revenue, customers and reputation. “You must have plans for each type of threat ready to execute at a moment’s notice,” Enderle says.
A computer infrastructure is the central nervous system of a business, and companies can’t afford for it to cease functioning. Downtime affects employee productivity, alienates customers and negatively impacts company reputation.
To ensure continuity and availability, conduct a business impact analysis to determine which services are the most crucial to protect and which have the highest priority to restore. The analysis also should assess the likelihood of types of risks to the business, and prioritize goals: generating revenue, supporting customers or providing services to employees? Create a plan and test it regularly.
Rising costs and environmental mandates have companies examining ways to cut energy consumption. In many cases, computers can help. Reduced energy consumption can be achieved through alternative forms of cooling, virtualization, and replacing energy-hogging servers with newer models engineered to use less energy. The IT staff can learn how to leverage technology assets to cut energy consumption.
In some sectors, companies face periodic audits to ensure they’re complying with regulations such as the U.S.’s Sarbanes-Oxley Act and the European Union’s Data Privacy Directive. Audits can be targeted at financial record-keeping, data privacy, security or legal compliance. Any type of audit can disrupt a business if IT isn’t prepared. Companies must learn what steps they can take to prepare for these events.
The process of legal discovery, which uncovers relevant information before going to court, now relies heavily on electronically stored data. Both the content and mismanagement of e-mail, instant messaging and other electronic records have led to fines, judgments and convictions.
As a result, companies that do business in the U.S. (or that have U.S. partners or subsidiaries) are now subject to stricter standards for preserving and producing electronic business records. Using software tools and a records-management process can help manage and automate the process of electronic discovery, or e-discovery, in case of lawsuit.
Even if a company doesn’t do business in the U.S., however, the level of organization required for e-discovery preparedness can help it prove it is following privacy laws or other electronic information regulations now common across the globe.
Companies invest heavily in IT leaders, yet they seldom have a plan for a handling the transition caused by the unexpected departure, resignation or death of an IT executive. Succession planning helps minimize the impact of an abrupt departure in leadership by grooming future IT leaders, preserving institutional knowledge and smoothing transitions.
Every organization that handles confidential information of any sort is well aware of cases where a single laptop theft or the improper disposal of hard drive has lead to embarrassing and harmful data breaches. That’s why removable media are increasingly encrypted, or locked, using digital keys. Unfortunately, as digital keys proliferate, the chance of losing, misplacing or accidentally destroying them is growing, too. A global key management system can help keep digital keys safe, organized, replicated and audited.
To learn more, contact us today.
Cyber threats never take a day off, never clock out and go home at the…
Building, deploying, and managing applications via Microsoft's global network of data centers is easier with…
Microsoft Copilot is a tool, powered by AI, that aims to boost your productivity within…
Making things happen is the art and science of project management. The process involves managing…
In today's fast digital life, website performance is important, as it holds visitors and ensures…
The FBI reported that cyber attacks against government facilities saw an increase of almost 36…