{"id":1832,"date":"2005-09-13T00:00:00","date_gmt":"2005-09-13T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/09\/13\/businesses-unprepared-for-disasters-att-survey\/"},"modified":"2021-12-30T11:40:04","modified_gmt":"2021-12-30T11:40:04","slug":"businesses-unprepared-for-disasters-att-survey","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/09\/13\/businesses-unprepared-for-disasters-att-survey\/","title":{"rendered":"Businesses Unprepared For Disasters: AT&#038;T Survey"},"content":{"rendered":"<p>Despite high-profile disasters like Katrina, a third of all businesses lack continuity plans.  Is your network prepared for a disaster like hurricane Katrina?  A new report done by AT&#038;T and the International Association of Emergency Managers (IAEM) suggests that many enterprise networks are not, and that a surprisingly large proportion of companies have made continuity planning a low priority.  The study, &#8220;Disaster Planning in the Private Sector: A Look at the State of Business Continuity in the U.S.,&#8221; found that almost one third of U.S. businesses do not have continuity plans, and that nearly 40% of the 1200 companies surveyed reported that continuity planning was not a priority.  More than 40% of the companies surveyed do not have off-site back-up or redundant servers and almost a third have failed to implement basic network security measures.  Indeed, two thirds of companies that had suffered some kind of disaster lost business.  Some 16% of these companies lost between $100,000 and $500,000 per day, and another 26% said that they were unable to estimate their losses due to disaster outages.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Considering the costs involved, AT&#038;T chief marketing officer Kathleen Flaherty commented that this kind of attitude was shortsighted.  &#8220;With today&#8217;s heavy reliance on constant access to information, even a few hours of downtime can have catastrophic consequences, including huge financial losses, a tarnished reputation and lost customer goodwill,&#8221; she said in a statement.<\/p>\n<p>While it might be expected that, once bitten, a company would be motivated to take corrective action, this does not seen to be the case.  The study found that almost a quarter of the companies that had endured some kind of disaster remain unprepared, and less than half have updated their continuity plans for the last six months.<\/p>\n<p>&#8220;The results of this survey show that companies are taking an unnecessary gamble with their futures,&#8221; IAEM executive director Elizabeth B. Armstrong said in a statement.  &#8220;The cost of developing a business continuity plan and implementing a technology infrastructure to support the plan is minimal when compared to the daily financial impact once disaster strikes.&#8221;<\/p>\n<p>http:\/\/www.informationweek.com\/story\/showArticle.jhtml;jsessionid=2ZL3WBYEHST0SQSNDBCSKHSCJUMEKJVN?articleID=170702762<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1832","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1832"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1832\/revisions"}],"predecessor-version":[{"id":4319,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1832\/revisions\/4319"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}