{"id":2034,"date":"2004-01-12T00:00:00","date_gmt":"2004-01-12T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/01\/12\/business-continuity-planning-will-it-save-you\/"},"modified":"2021-12-30T11:40:31","modified_gmt":"2021-12-30T11:40:31","slug":"business-continuity-planning-will-it-save-you","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/01\/12\/business-continuity-planning-will-it-save-you\/","title":{"rendered":"Business continuity planning: will it save you?"},"content":{"rendered":"<p>Every year, security firm Pinkerton publishes a survey of the top threats that businesses believe that they have faced over that particular year writes Fran Howarth of Bloor Research.<\/p>\n<p>In six out of the past seven years, workplace violence has topped the list of concerns.<\/p>\n<p>However, business continuity interruption or continuity planning has been placed as the second greatest threat perceived by businesses for four out of the past five years.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While the survey by Compass shows that 98% of an undisclosed number of FTSE 100 firms had a business continuity plan in place, only just over one-third of those companies that had suffered an IT disaster over the last five years (58% of all firms surveyed) had used the measures that they had put in place in the business continuity plan to solve the problem.<\/p>\n<p>Bloor&#8217;s own visionary, Robin Bloor, has pointed out recently that the level of security breaches has reached crisis level, with 90% of companies experiencing security breaches of some sort in 2003 &#8211; and this is growing at a rate of 50% or more every year.<\/p>\n<p>In addition, a whole host of legislation is either being passed or ratified at the moment &#8211; such as the Data Protection Act of the EU, which requires companies to apply a much higher level of protection to the data that the collect, hold in storage or even dispose of.<\/p>\n<p>More info: [url=http:\/\/www.theregister.co.uk\/content\/55\/34811.html]http:\/\/www.theregister.co.uk\/content\/55\/34811.html[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2034","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2034","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2034"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2034\/revisions"}],"predecessor-version":[{"id":4521,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2034\/revisions\/4521"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2034"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2034"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2034"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}