Security Newswire

Disaster Recovery Plans Shift Away from IT and Data Security

March 16, 2010
/ Print / Reprints /
ShareMore
/ Text Size+

The emergence of the H1N1 virus and several severe weather-related events have shifted disaster recovery planning emphasis away from IT and data security threats toward pandemic planning and disaster recovery efforts, according to an annual study conducted by Varolii Corporation.
This change comes despite evidence that most companies believe they do not have adequate plans in place to deal with cyber attacks, data breaches or data center failures. For the fifth year, corporate executives and business continuity professionals nationwide participated in the 2009-2010 Preparedness, Security and Crisis Communications.
 
The survey was co-sponsored by Honeywell.
 
Respondents ranked pandemic as the top threat to organizations in 2009, with 55 percent saying it's either a serious or extreme threat. Threats focused on data security and telecom failure/power outage (the top threats in 2008) still ranked high in 2009 (35 and 45 percent, respectively), but not as high as a natural disaster threat, which jumped from 39 percent in 2008 to 52 percent in 2009.
 
For the first time since the survey was held, IT and data threats were not highest ranked. While the majority of companies now have plans in place to deal with pandemics and natural disasters (73 and 82 percent, respectively), the number of companies prepared to combat cyber attacks, data breaches and data center disruptions is notably lower. Only 60 percent of companies have a plan to deal with data center disruptions, and only 53 percent say they are prepared for data breaches. Less than half (46 percent) say they are prepared for cyber attacks.
 
Other key findings from the study include:
  • Emergency communication across multiple channels-including text messaging-is becoming more pervasive. Signaling that emergency notification systems are becoming more sophisticated, the vast majority of respondents (ranging between 80 and 90 percent) say their critical communications systems can contact recipients via landline, mobile phone, or email in a crisis.
  • Fifty-three percent reported using text messaging to communicate during emergencies.More companies are targeting all employees for crisis communications, rather than just first responders or company executives.
  • Eighty-one percent of companies now have communication plans to reach all employees, a dramatic increase from the 2008-2009 survey, when 57 percent reported having such a plan. This increase may reflect further evolution and maturity of crisis communication planning, as well as increased sensitivity and attention paid to emergencies that impact large groups of employees, such as pandemics and natural disasters.
  • Despite the economic crisis, disaster recovery and emergency preparedness are an emerging priority for corporate executives. The percentage of companies in which executives are highly involved and responsible for overall preparedness planning and execution climbed significantly from 35 percent in 2007 to 47 percent in 2009.
  • And for the first time, executive management was the most prevalent group on emergency preparedness planning teams, rising to 65 percent, while the percentage of IT representatives decreased from 70 percent in 2008 to 55 percent in 2009.

Did you enjoy this article? Click here to subscribe to Security Magazine. 

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

September 2014

2014 September

In the September issue of Security Magazine, find out who this year's most influential people are in the security industry are. Also, take a peek at the technology products that ASIS 2014 will be showcasing at the upcoming event. Read about the lessons learned from security at the World Cup, find out why tactical medical training is a must for your enterprise and how Atlanta increased security by sharing surveillance.
Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+