Monday, December 19, 2005

Survivors Guide to 2006

As 2005 comes to a close, we should cast our thoughts to preparing for 2006. Network Computing has released a number of excellent "Survivors' Guides for 2006" and the two that are relevant for this weblogs' users are Survivors Guide to 2006 : Data Protection and Survivors' Guide to 2006 : Security.

These are good reads and a few excerpts follow:

DATA PROTECTION
Tsunamis. Hurricanes. Accounting fraud. Worms. Viruses. Stolen data. When we named our annual "Survivor's Guide" issue back in 2000, we didn't mean it quite so literally. But after a year fraught with natural and man-made disasters, many IT professionals say their top priority for 2006 is not deploying new technologies, but protecting their data--and their businesses. More than 56 percent of 1,700 Network Computing readers surveyed in 2005 ranked "data security/privacy" a prime target for IT spending in 2006, making it the most frequently cited spending priority.

Why is data security so high on IT's 2006 priority list? Because so many companies were burned--or flooded, or robbed--in 2005. About 16 percent of enterprises experienced some sort of business-interrupting disaster during the year, according to a study of more than 1,200 businesses conducted by AT&T and the International Association of Emergency Managers. Sixteen percent of those enterprises lost $100,000 to $500,000 per day, and 26 percent admit they still don't know how much the disasters cost their companies.

SECURITY
The writing is on the wall: Organizations and individuals will be held accountable for security breaches. The rash of exposures of personally identifiable information (PII) from the likes of ChoicePoint, Lexis-Nexis, Bank of America, CardSystems and a host of other for-profit and nonprofit organizations is just the beginning. Luckily for consumers, state and federal lawmakers are introducing regulations that require exposures to be reported. Someone's head is going to roll; don't let it be yours. The cause of data loss, however, varies by case. The common exposures are lost or stolen hardware and backup tapes, insider abuse and weak application development leading to exploited security holes and inadvertent exposures. And those are just the breaches that have made it into the press. The clean-up costs in rebuilding reputation, paying fines and legal fees, and re-architecting compromised systems can run into tens or hundreds of thousands of dollars

CATEGORIES : 1data protection, 1security, 1reports, 1trends, 1survey, 1stats,1advice
Rate this post: (Provided by NewsGator)

0 Comments:

Post a Comment

<< Home