{"id":1856,"date":"2006-03-21T00:00:00","date_gmt":"2006-03-21T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/03\/21\/many-data-centers-still-have-no-risk-management-plan\/"},"modified":"2021-12-30T11:40:09","modified_gmt":"2021-12-30T11:40:09","slug":"many-data-centers-still-have-no-risk-management-plan","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/03\/21\/many-data-centers-still-have-no-risk-management-plan\/","title":{"rendered":"Many Data Centers Still Have No Risk Management Plan"},"content":{"rendered":"<p>More than 75% of all companies have experienced a business disruption in the past five years, including 20% who say the disruption had a serious impact on the business, according to a recent survey of data center managers.  Despite the critical nature of data center operations to business, nearly 17% reported they have no risk management plan, and less than 5% have plans that address viruses and security breaches.  The predictions: Within the next five years, one out of every four data centers will experience a serious disruption; by 2015, the talent pool of qualified senior-level technical and management data center professionals will shrink by 45%; by 2010, nearly 70% of all data centers will use some form of grid computing or virtual processing; by 2010, more than half of all data centers will have to relocate to new facilities or outsource some applications; and over the next five years, power failures and limits on power availability will halt data center operations at more than 90% of companies.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;The question becomes whether companies are focusing their dollars on potential disruptions that have the highest probability of affecting the organization,&#8221; Caprio said.<\/p>\n<p>The survey found that more than 60% of respondents say 10% or less of their data center budgets are allocated to risk management, while only 18% dedicate 25% or more of the budget in that area.  While 42% don&#8217;t foresee implementing some form of grid computing or virtual processing in their data center, 37% say they will within two years, 17% within five years, and 4% within 10 years.  Nearly a third expect to have to relocate their data centers, while 45% believe they will need to make major improvements to existing data centers.<\/p>\n<p>In the past five years, 34% of respondents have had to upgrade or add feeders to their data centers to accommodate higher loads, 14% had to build new centers with additional capacity to meet IT requirements, and 8% had to ask landlords for more electrical capacity.<\/p>\n<p>http:\/\/www.securitypipeline.com\/news\/183701727<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1856","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1856","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1856"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1856\/revisions"}],"predecessor-version":[{"id":4343,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1856\/revisions\/4343"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1856"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1856"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}