SlideShare a Scribd company logo
Symantec 2011 SMB Disaster Preparedness Survey Asia Pacific Results
Methodology Applied Research performed survey 1288 SMBs worldwide 552 customers of SMBs 5 to 499 employees Cross-industry 2
Key Findings Despite warnings, most SMBs still not prepared for disaster SMBs are at risk  SMBs don’t act until it’s too late Not being prepared can have a big negative financial impact 3
4 Despite warnings, most SMBs still not prepared for disaster
SMBs still not taking disaster preparedness seriously 52% don’t have a plan 12% have no plans to create a plan 40% intend to create a plan in the future 5
Why they don’t have a plan 44% don’t think computer systems are critical to business 38% say it never occurred to them 28% say DP not a priority 22% lack skills/qualified personnel 14% lack resources 6
7 SMBs are at risk
SMBs are at risk 65% live in regions susceptible to natural disasters The typical SMB surveyed experienced 5 outages last year Top reasons for downtime:  Cyberattacks Power outages Upgrades Employee error 8
SMB Information is not protected Backups are inconsistent Half (51%) only backup 60% of data Less than half (45%) back up data weekly or more frequently Only 21% back up daily Backups are incomplete—key data not always backed up 32% don’t back up email 19% don’t back up application data 15% don’t back up customer data Disaster would cause information loss 45% would lose at least 40% of their data 9
10 SMBs don’t act until it’s too late
SMBs don’t act until it’s too late Half of SMBs implemented a plan due to an outage and/or data loss 54% of SMBs with a plan only implemented it within the last six months  Only 28% have tested a recovery plan 11
12 Not being prepared can have a big negative financial impact
Not being prepared can have a negative impact Outages are expensive:  $14,500 per day It could put an SMB temporarily out of business—52% of SMB customers have had a mission-critical SMB vendor temporarily shut down due to a disaster Customers will suffer financially SMB outages cost SMB customers $45,000 per day 24% of SMB customers lost “some” or “a lot of” data as a result of disasters impacting their SMB vendors Customers will leave 59% of customers have switched SMB vendors due to unreliable computing systems 13
14 Symantec Recommendations
Recommendations  Don’t wait until it’s too late to create a plan  Protect your information completely Get employees involved Test frequently Review your plan 15
Symantec Internet Security Threat Report (ISTR), Volume 16 16 For more information, visit Symantec System Recovery ROI Tool Whitepaper: What Business Owners Need to Know to Ensure Business Continuity

More Related Content

What's hot

Slide share apj symantec 2011 small business virtualization poll
Slide share   apj symantec 2011 small business virtualization pollSlide share   apj symantec 2011 small business virtualization poll
Slide share apj symantec 2011 small business virtualization pollwuiwuiyu
 
Ecm
EcmEcm
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC Advisory Group
 
Pace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best PracticesPace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best Practices
Pace IT at Edmonds Community College
 
Emotional Intelligence Case for Business Impact
Emotional Intelligence Case for Business ImpactEmotional Intelligence Case for Business Impact
Emotional Intelligence Case for Business Impact
BenjaminMatthewBakai
 
SaltGrid
SaltGridSaltGrid
SaltGrid
Advisian
 
Forrester Infographic
Forrester Infographic Forrester Infographic
Forrester Infographic
Thang Cao (He/Him)
 
The CIO's guide to digital transformation
The CIO's guide to digital transformationThe CIO's guide to digital transformation
The CIO's guide to digital transformation
Shana Pearlman
 
V mware four compelling reasons to virtualize your it environment - infogra...
V mware   four compelling reasons to virtualize your it environment - infogra...V mware   four compelling reasons to virtualize your it environment - infogra...
V mware four compelling reasons to virtualize your it environment - infogra...
VMware_EMEA
 
State of the CSO 2015
State of the CSO 2015State of the CSO 2015
State of the CSO 2015
IDG
 
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
AGILLY
 
Direct to the future
Direct to the futureDirect to the future
Direct to the future
The Futurist Institute
 
ARS SlideShow
ARS SlideShowARS SlideShow
ARS SlideShow
jgallic
 

What's hot (13)

Slide share apj symantec 2011 small business virtualization poll
Slide share   apj symantec 2011 small business virtualization pollSlide share   apj symantec 2011 small business virtualization poll
Slide share apj symantec 2011 small business virtualization poll
 
Ecm
EcmEcm
Ecm
 
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
 
Pace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best PracticesPace IT - Maintenance Procedures Best Practices
Pace IT - Maintenance Procedures Best Practices
 
Emotional Intelligence Case for Business Impact
Emotional Intelligence Case for Business ImpactEmotional Intelligence Case for Business Impact
Emotional Intelligence Case for Business Impact
 
SaltGrid
SaltGridSaltGrid
SaltGrid
 
Forrester Infographic
Forrester Infographic Forrester Infographic
Forrester Infographic
 
The CIO's guide to digital transformation
The CIO's guide to digital transformationThe CIO's guide to digital transformation
The CIO's guide to digital transformation
 
V mware four compelling reasons to virtualize your it environment - infogra...
V mware   four compelling reasons to virtualize your it environment - infogra...V mware   four compelling reasons to virtualize your it environment - infogra...
V mware four compelling reasons to virtualize your it environment - infogra...
 
State of the CSO 2015
State of the CSO 2015State of the CSO 2015
State of the CSO 2015
 
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
Sécurité Mobile : Votre Entreprise est-elle préparée pour 2020?
 
Direct to the future
Direct to the futureDirect to the future
Direct to the future
 
ARS SlideShow
ARS SlideShowARS SlideShow
ARS SlideShow
 

Viewers also liked

Build Resilient Private Cloud
Build Resilient Private CloudBuild Resilient Private Cloud
Build Resilient Private CloudSymantec APJ
 
Well Managed Systems - Endpoint Management and Mobility
Well Managed Systems - Endpoint Management and MobilityWell Managed Systems - Endpoint Management and Mobility
Well Managed Systems - Endpoint Management and MobilitySymantec APJ
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Symantec APJ
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
TechWiseTV Workshop: Cisco ONE
TechWiseTV Workshop: Cisco ONETechWiseTV Workshop: Cisco ONE
TechWiseTV Workshop: Cisco ONE
Robb Boyd
 
Cisco one partner roadshow cisco one smart licensing v10
Cisco one partner roadshow   cisco one smart licensing v10Cisco one partner roadshow   cisco one smart licensing v10
Cisco one partner roadshow cisco one smart licensing v10
Trinny Chacko
 
Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy ciscoOpenSourceCamp
 

Viewers also liked (7)

Build Resilient Private Cloud
Build Resilient Private CloudBuild Resilient Private Cloud
Build Resilient Private Cloud
 
Well Managed Systems - Endpoint Management and Mobility
Well Managed Systems - Endpoint Management and MobilityWell Managed Systems - Endpoint Management and Mobility
Well Managed Systems - Endpoint Management and Mobility
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
TechWiseTV Workshop: Cisco ONE
TechWiseTV Workshop: Cisco ONETechWiseTV Workshop: Cisco ONE
TechWiseTV Workshop: Cisco ONE
 
Cisco one partner roadshow cisco one smart licensing v10
Cisco one partner roadshow   cisco one smart licensing v10Cisco one partner roadshow   cisco one smart licensing v10
Cisco one partner roadshow cisco one smart licensing v10
 
Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy cisco
 

Similar to 2011 SMB Disaster Preparedness Report

2011 SMB Disaster Preparedness Global Survey
2011 SMB Disaster Preparedness Global Survey2011 SMB Disaster Preparedness Global Survey
2011 SMB Disaster Preparedness Global Survey
Symantec
 
Disaster recovery-plan-diy-vs-outsource
Disaster recovery-plan-diy-vs-outsourceDisaster recovery-plan-diy-vs-outsource
Disaster recovery-plan-diy-vs-outsource
James Knotts
 
eBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBseBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBs
Carbonite
 
The Challenges of Big Data
The Challenges of Big DataThe Challenges of Big Data
The Challenges of Big Data
CMS IT SERVICES (Admin)
 
2014 State of Backup for SMBs
2014 State of Backup for SMBs2014 State of Backup for SMBs
2014 State of Backup for SMBs
Carbonite
 
Data security risks and the cost of business continuity (slideshare) tmcs q...
Data security risks and the cost of business continuity (slideshare)   tmcs q...Data security risks and the cost of business continuity (slideshare)   tmcs q...
Data security risks and the cost of business continuity (slideshare) tmcs q...
tmcscs
 
Risk Identification Process Powerpoint Presentation Slides
Risk Identification Process Powerpoint Presentation SlidesRisk Identification Process Powerpoint Presentation Slides
Risk Identification Process Powerpoint Presentation Slides
SlideTeam
 
Risk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesRisk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation Slides
SlideTeam
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data Backups
GFI Software
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
Silicon Valley Bank
 
Ready or not?
Ready or not?Ready or not?
Ready or not?
Joachim Mayer
 
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian Summary
CompTIA
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
SurfWatch Labs
 
Symantec Infographic
Symantec InfographicSymantec Infographic
Symantec Infographic
Sandra Augustin
 
International Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryInternational Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryCompTIA
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
Bluelock
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
Kayla Catron
 
5 common misconceptions about Disaster Recovery demystified | Sysfore
5 common misconceptions about Disaster Recovery demystified | Sysfore5 common misconceptions about Disaster Recovery demystified | Sysfore
5 common misconceptions about Disaster Recovery demystified | Sysfore
Sysfore Technologies
 
The pathway to technical debt recovery for mid size Australian business
The pathway to technical debt recovery for mid size Australian businessThe pathway to technical debt recovery for mid size Australian business
The pathway to technical debt recovery for mid size Australian business
Noel Lynam
 

Similar to 2011 SMB Disaster Preparedness Report (20)

2011 SMB Disaster Preparedness Global Survey
2011 SMB Disaster Preparedness Global Survey2011 SMB Disaster Preparedness Global Survey
2011 SMB Disaster Preparedness Global Survey
 
Dont Gamble With Your Data
Dont Gamble With Your DataDont Gamble With Your Data
Dont Gamble With Your Data
 
Disaster recovery-plan-diy-vs-outsource
Disaster recovery-plan-diy-vs-outsourceDisaster recovery-plan-diy-vs-outsource
Disaster recovery-plan-diy-vs-outsource
 
eBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBseBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBs
 
The Challenges of Big Data
The Challenges of Big DataThe Challenges of Big Data
The Challenges of Big Data
 
2014 State of Backup for SMBs
2014 State of Backup for SMBs2014 State of Backup for SMBs
2014 State of Backup for SMBs
 
Data security risks and the cost of business continuity (slideshare) tmcs q...
Data security risks and the cost of business continuity (slideshare)   tmcs q...Data security risks and the cost of business continuity (slideshare)   tmcs q...
Data security risks and the cost of business continuity (slideshare) tmcs q...
 
Risk Identification Process Powerpoint Presentation Slides
Risk Identification Process Powerpoint Presentation SlidesRisk Identification Process Powerpoint Presentation Slides
Risk Identification Process Powerpoint Presentation Slides
 
Risk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation SlidesRisk Identification Process PowerPoint Presentation Slides
Risk Identification Process PowerPoint Presentation Slides
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data Backups
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Ready or not?
Ready or not?Ready or not?
Ready or not?
 
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian Summary
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
Symantec Infographic
Symantec InfographicSymantec Infographic
Symantec Infographic
 
International Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East SummaryInternational Technology Adoption & Workforce Issues Study - Middle East Summary
International Technology Adoption & Workforce Issues Study - Middle East Summary
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
 
5 common misconceptions about Disaster Recovery demystified | Sysfore
5 common misconceptions about Disaster Recovery demystified | Sysfore5 common misconceptions about Disaster Recovery demystified | Sysfore
5 common misconceptions about Disaster Recovery demystified | Sysfore
 
The pathway to technical debt recovery for mid size Australian business
The pathway to technical debt recovery for mid size Australian businessThe pathway to technical debt recovery for mid size Australian business
The pathway to technical debt recovery for mid size Australian business
 

Recently uploaded

Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

2011 SMB Disaster Preparedness Report

  • 1. Symantec 2011 SMB Disaster Preparedness Survey Asia Pacific Results
  • 2. Methodology Applied Research performed survey 1288 SMBs worldwide 552 customers of SMBs 5 to 499 employees Cross-industry 2
  • 3. Key Findings Despite warnings, most SMBs still not prepared for disaster SMBs are at risk SMBs don’t act until it’s too late Not being prepared can have a big negative financial impact 3
  • 4. 4 Despite warnings, most SMBs still not prepared for disaster
  • 5. SMBs still not taking disaster preparedness seriously 52% don’t have a plan 12% have no plans to create a plan 40% intend to create a plan in the future 5
  • 6. Why they don’t have a plan 44% don’t think computer systems are critical to business 38% say it never occurred to them 28% say DP not a priority 22% lack skills/qualified personnel 14% lack resources 6
  • 7. 7 SMBs are at risk
  • 8. SMBs are at risk 65% live in regions susceptible to natural disasters The typical SMB surveyed experienced 5 outages last year Top reasons for downtime: Cyberattacks Power outages Upgrades Employee error 8
  • 9. SMB Information is not protected Backups are inconsistent Half (51%) only backup 60% of data Less than half (45%) back up data weekly or more frequently Only 21% back up daily Backups are incomplete—key data not always backed up 32% don’t back up email 19% don’t back up application data 15% don’t back up customer data Disaster would cause information loss 45% would lose at least 40% of their data 9
  • 10. 10 SMBs don’t act until it’s too late
  • 11. SMBs don’t act until it’s too late Half of SMBs implemented a plan due to an outage and/or data loss 54% of SMBs with a plan only implemented it within the last six months Only 28% have tested a recovery plan 11
  • 12. 12 Not being prepared can have a big negative financial impact
  • 13. Not being prepared can have a negative impact Outages are expensive: $14,500 per day It could put an SMB temporarily out of business—52% of SMB customers have had a mission-critical SMB vendor temporarily shut down due to a disaster Customers will suffer financially SMB outages cost SMB customers $45,000 per day 24% of SMB customers lost “some” or “a lot of” data as a result of disasters impacting their SMB vendors Customers will leave 59% of customers have switched SMB vendors due to unreliable computing systems 13
  • 15. Recommendations Don’t wait until it’s too late to create a plan Protect your information completely Get employees involved Test frequently Review your plan 15
  • 16. Symantec Internet Security Threat Report (ISTR), Volume 16 16 For more information, visit Symantec System Recovery ROI Tool Whitepaper: What Business Owners Need to Know to Ensure Business Continuity