SMB Disaster Preparedness: A Recipe for Disaster - Slide 2

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14
Next SMB Disaster Preparedness: A Recipe for Disaster-2 Next

Despite warnings, most SMBs are still not prepared for disaster.

Symantec Corp. (Nasdaq: SYMC) recently announced the findings of its 2011 SMB Disaster Preparedness Survey, which measured the attitudes and practices of small- and mid-sized businesses (SMBs) and their customers toward disaster preparedness. The survey findings show that though SMBs are at risk, they are still not making disaster preparedness a priority until they experience a disaster or data loss. The data also reveals that the cost of not being prepared is high, putting an SMB at risk of going out of business. According to the survey, downtime not only costs SMBs several thousands of dollars, it also causes their customers to leave.

“According to the research findings, SMBs still haven’t recognized the tremendous impact a disaster can have on their businesses. Despite warnings, it seems like many still think it can’t happen to them,” said Bernard Laroche, senior director, SMB product marketing, Symantec. “Disasters happen and SMBs cannot afford to risk losing their information or – more importantly – their customers’ critical information. Simple planning can enable SMBs to protect their information in the event of a disaster, which in turn will help them build trust with their customers.”

More Slideshows:

2010 Security Threats in Review 2010 was a year full of security-related events of all shapes and sizes.

Why IT Projects Fail Recognize the early warning signs of imminent project failure.

15 Hot Business Apps for Your Mac Check out these hot business apps from the Mac App Store.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.