Information is the lifeblood of a business. Without it, everything else you need to make a business tick - like sales, customers or profit – stalls permanently. So making that information easily accessible is vital.
As it’s so important, you’d expect the information to be easily available to the people who need it, and protected from those who don’t. However, the reality is different: at last year’s IP Expo, 60% of people surveyed by my company City Lifeline said they had lost access to their company’s IT system following an unexpected incident. Oops.
In 40% of these cases systems were down for six hours or more, bringing the business to a halt for an entire working day. Just think of all the things your business uses IT for in just one day. Imagine not being able to access your email, check customer documents or view essential data.
Losing access to your data hurts your pocket too. Symantec’s 2011 SMB Disaster Preparedness Survey found that losing access to data and electronic communication systems costs small companies an average of £7,500 a day in lost business and productivity.
Unplanned downtime can stem from something as innocent as a workman cutting through a power cable or as sinister as a malicious cyber attack. Whatever the cause, they all have one thing in common: the element of surprise.
The best business owners not only prepare for the things that are going to happen, but also for things that could happen. “I didn’t know it was going to happen,” is not much of an excuse when faced with an angry customer or an office full of staff who can’t get their work done.
If your business’s information is adequately backed-up, the chances are good that your IT systems will be working by the end of the day. But if not, the consequences can be disastrous. In a worst case scenario the lost data can never be recovered, and neither can the business.
Some research suggests up to 70% of small businesses that lose data in a major incident are forced to shut within a year. Yet the Symantec report mentioned above also shows that less than half of smaller businesses bother to back up data every week. A mere 23% take daily backups.
Taking the odd risk is part and parcel of being in business, but risking the safety of your information is equivalent to cutting off your oxygen supply. Huge corporations often have the money, expertise and resources to escape from a tricky IT gaffe. Quite often, smaller businesses do not.
This vulnerability makes investing in off-site data backup vital. It only takes a one-off incident to disable access to your IT systems. And it only takes one major incident to cripple your business forever.
If you lack the time and resources to create a backup strategy from scratch, it may be worth working with an IT supplier which can store your data securely in a different location. Some suppliers operate or have space in colocation data centres, highly secure buildings specifically designed to keep your information safe. (The company I work for, City Lifeline, offers colocation services.)
Do your business justice by investing in your information in the same way you would invest in a new computer or member of staff. Your information is key to your company’s viability, so return the favour and look after it just as well.
Roger Keenan is MD of City Lifeline.
Justice in the clouds? (Image: Ariaski on Flickr.)
When businesses use cloud computing, it often means they don't need to buy or install software, or run their own servers. The benefits can be compelling, but cloud computing also presents some interesting legal issues.
Because cloud computing services involve storing data outside your business, usually on servers operated by another company, there are some contractual, data protection and copyright issues to be aware of:
A software licence is the set of terms and conditions you agree to before you start using a piece of software or a cloud computing service. Software licensing can be confusing at the best of times, and there are some specific things to remember when you're choosing and using cloud computing services:
It can be hard to tell where cloud computing services actually operate from. Even those that price their services in pounds may be based outside the UK. And if you are dealing with a UK company, they may still store your data on servers in other countries.
In most cases this isn't a problem, but it's wise to aware of the issues that can arise:
This article is for general purposes and guidance only and does not constitute legal or professional advice.
Are you taking care of data properly? (Image: Flickr user dawnzy58 under Creative Commons.)
If the first months of 2011 are anything to go by, this could be the year of the data breach. It almost seems like companies are falling over each other to give away information about their customers.
Here are three high-profile data breaches that have hit the headlines in the last month alone.
While you read about them, think about how many smaller incidents may go unreported or even undetected. Then stop to consider if your business does enough to safeguard its customer data.
Epsilon runs huge email marketing operations for clients like Citibank and Marks & Spencer, yet still managed to have millions of customer email addresses stolen when someone got into the company's systems without authorisation.
What we can learn: the information stolen during this breach belonged to Epsilon's clients, many of whom have since warned customers that they may receive more spam as a result.
So, if your business shares data for marketing purposes or joint ventures, make sure you only work with partners you trust, and ask searching questions to find out how they protect the data. Get a strong contract in place that - if possible - places financial liability for data breaches on their shoulders.
Hugely-successful Jersey-based online retailer Play.com suffered embarrassment last month when users reported receiving junk email to addresses they'd only ever used on the site. It soon emerged that a company responsible for some of Play.com's marketing communications had suffered a breach.
What we can learn: spotted the pattern yet? Just as with the Epsilon breach, although Play.com customers were affected, the leak actually occurred at another company.
However, Play.com's subsequent customer communications are an exercise in good damage limitation. They apologised quickly, explained what went wrong and described the possible consequences for customers.
York City Council adequately demonstrated that you can lose data without turning to high-tech hackers. All you have to do is print it out and then send it to the wrong place. The council was criticised this week for accidentally posting personal information to a third-party.
What we can learn: hard copies can cause problems too, especially when left lying around. If you have to print out sensitive information, grab it from the printer quickly, then keep it somewhere it can't get mixed up with other paperwork. Once you're done with it, shred it.
The rise of the internet has created a repository of knowledge and services that are accessible from nearly anywhere in the world.
Of course, none of this comes free. So, almost any service you use online will require you to surrender some personal information. The companies who use this data have to protect it at every stage.
If your business stores and processes sensitive data (and let's face it: whether it's your accounts or customer database, most do), are you sure you know all the places it ends up?
Did you know that printers and scanners store information sent to them?
They do this for performance reasons; to minimise the amount of data being transferred or to reduce the time it takes to get ready to print.
For instance, imagine you send a print request for ten copies of a document. Your printer will save the document once, then print the additional copies from this memory. This means it doesn't have to receive and process ten individual files.
The same happens when you scan, fax, or utilise pretty much any feature on offer from your reliable office all-in-one device. When you tally the amount of print requests you send, the information at risk can soon mount up.
Take a quick guesstimate: how many customer-related documents are sent through your printer each day?
If you’re thinking of a number higher than zero, this issue should be of concern to you whenever you are looking to replace your office hardware.
Disposing of equipment responsibly, paying particular attention to any memory built into it, will protect you from future problems. At Stinkyink.com we crush the memory chips of any printer we discard.
It’s the only way we can guarantee that the 100,000 people on our customer database are fully protected, to the same level we ourselves wish to be.
Did you know your printer memory could hold hidden secrets? Do you know of anyone who has struggled with security issues like this? Are you concerned about misuse of your own information?
John Sollars is MD of Stinkyink.com
(Image of a printer graveyard from Flickr user wonderferret under a Creative Commons Attribution licence.)