Security Newswire

Disaster Recovery Plans Shift Away from IT and Data Security

The emergence of the H1N1 virus and several severe weather-related events have shifted disaster recovery planning emphasis away from IT and data security threats toward pandemic planning and disaster recovery efforts, according to an annual study conducted by Varolii Corporation.
This change comes despite evidence that most companies believe they do not have adequate plans in place to deal with cyber attacks, data breaches or data center failures. For the fifth year, corporate executives and business continuity professionals nationwide participated in the 2009-2010 Preparedness, Security and Crisis Communications.
 
The survey was co-sponsored by Honeywell.
 
Respondents ranked pandemic as the top threat to organizations in 2009, with 55 percent saying it's either a serious or extreme threat. Threats focused on data security and telecom failure/power outage (the top threats in 2008) still ranked high in 2009 (35 and 45 percent, respectively), but not as high as a natural disaster threat, which jumped from 39 percent in 2008 to 52 percent in 2009.
 
For the first time since the survey was held, IT and data threats were not highest ranked. While the majority of companies now have plans in place to deal with pandemics and natural disasters (73 and 82 percent, respectively), the number of companies prepared to combat cyber attacks, data breaches and data center disruptions is notably lower. Only 60 percent of companies have a plan to deal with data center disruptions, and only 53 percent say they are prepared for data breaches. Less than half (46 percent) say they are prepared for cyber attacks.
 
Other key findings from the study include:
  • Emergency communication across multiple channels-including text messaging-is becoming more pervasive. Signaling that emergency notification systems are becoming more sophisticated, the vast majority of respondents (ranging between 80 and 90 percent) say their critical communications systems can contact recipients via landline, mobile phone, or email in a crisis.
  • Fifty-three percent reported using text messaging to communicate during emergencies.More companies are targeting all employees for crisis communications, rather than just first responders or company executives.
  • Eighty-one percent of companies now have communication plans to reach all employees, a dramatic increase from the 2008-2009 survey, when 57 percent reported having such a plan. This increase may reflect further evolution and maturity of crisis communication planning, as well as increased sensitivity and attention paid to emergencies that impact large groups of employees, such as pandemics and natural disasters.
  • Despite the economic crisis, disaster recovery and emergency preparedness are an emerging priority for corporate executives. The percentage of companies in which executives are highly involved and responsible for overall preparedness planning and execution climbed significantly from 35 percent in 2007 to 47 percent in 2009.
  • And for the first time, executive management was the most prevalent group on emergency preparedness planning teams, rising to 65 percent, while the percentage of IT representatives decreased from 70 percent in 2008 to 55 percent in 2009.

Did you enjoy this article? Click here to subscribe to Security Magazine. 

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security May 2015 Issue cover

2015 May

In the May 2015 issue of Security, learn how to be the bridge between busieness and security with "customer facing," how to effectively work with your CFO, and covert security.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive

THE SECURITY STORE

Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.