Symantec Corp. (Nasdaq: SYMC) recently announced the findings of its 2011 SMB Disaster Preparedness Survey, which measured the attitudes and practices of small- and mid-sized businesses (SMBs) and their customers toward disaster preparedness. The survey findings show that though SMBs are at risk, they are still not making disaster preparedness a priority until they experience a disaster or data loss. The data also reveals that the cost of not being prepared is high, putting an SMB at risk of going out of business. According to the survey, downtime not only costs SMBs several thousands of dollars, it also causes their customers to leave.
“According to the research findings, SMBs still haven’t recognized the tremendous impact a disaster can have on their businesses. Despite warnings, it seems like many still think it can’t happen to them,” said Bernard Laroche, senior director, SMB product marketing, Symantec. “Disasters happen and SMBs cannot afford to risk losing their information or – more importantly – their customers’ critical information. Simple planning can enable SMBs to protect their information in the event of a disaster, which in turn will help them build trust with their customers.”
2010 Security Threats in Review 2010 was a year full of security-related events of all shapes and sizes.
Why IT Projects Fail Recognize the early warning signs of imminent project failure.
15 Hot Business Apps for Your Mac Check out these hot business apps from the Mac App Store.
Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ... More >>
Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ... More >>
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ... More >>