{"id":2014,"date":"2003-11-11T00:00:00","date_gmt":"2003-11-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/11\/risky-business-to-top-2004-it-spending\/"},"modified":"2021-12-30T11:40:29","modified_gmt":"2021-12-30T11:40:29","slug":"risky-business-to-top-2004-it-spending","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/11\/risky-business-to-top-2004-it-spending\/","title":{"rendered":"Risky business to top 2004 IT spending"},"content":{"rendered":"<p>Security and data disaster recovery rank among the top information technology priorities for 2004&#8211;a year in which overall technology spending is expected to remain cautious, according to a Forrester Research report released Monday.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>North American IT budgets are expected to increase to $729.2 billion next year, up 1.7 percent from the level anticipated for this year, according to a survey of more than Get Up to Speed on&#8230;<\/p>\n<p>Forrester itself says budgets could grow as much as 4 percent, as IT spending catches up with the economy.  &#8220;More firms are saying they expect their budgets to increase over last year.  <\/p>\n<p>More than half the companies surveyed listed risk management initiatives as their top priority for next year.<\/p>\n<p>Companies are also interested in upgrading their PCs next year, with 27 percent of those surveyed saying they expect to spend more&#8211;an improvement from 24 percent anticipated for this year.  <\/p>\n<p>And the percentage of IT buyers who expect to spend less in 2004 declined to 24 percent, compared with 27 percent for this year.<\/p>\n<p>Software licensing and development, meanwhile, will be a more challenging environment.  The percentage of those anticipating a 2004 spending increase in those areas fell to 30 percent, compared with 35 percent for this year.<\/p>\n<p>Although most companies are anticipating upgrades or a major applications deployment next year, any rollouts will likely span a long period of time, resulting in a decline in anticipated applications budgets next year, Pohlmann said.<\/p>\n<p>More info: [url=http:\/\/news.com.com\/2100-7355-5105143.html?tag=guts_lh_7355]http:\/\/news.com.com\/2100-7355-5105143.html?tag=guts_lh_7355[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2014","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2014","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2014"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2014\/revisions"}],"predecessor-version":[{"id":4501,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2014\/revisions\/4501"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2014"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2014"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2014"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}