IT leaders are under increased pressure to ensure systems can withstand natural disasters, attacks, data breaches, and increasing storage and data accessibility needs. Credit: K. Kendall As we swerve onto the runway in 2018, IT leaders are finding themselves under increased pressure to ensure security, high availability and disaster recovery for the applications and systems under their care. The results of several surveys underscore the concerns of nearly 6,000 IT professionals around the globe. These surveys, conducted in 2017 by Vision Solutions, now part of Syncsort, collected responses from 5,632 professionals to determine their key business continuity concerns and their strategies for addressing high-profile hacking attacks, data breaches, disruptive natural disasters, and escalating storage and data accessibility needs. The results highlight their areas of greatest concern and the key initiatives they are putting into place for moving forward. Keep IT going The top IT concern expressed was business continuity and high availability (47 percent) — the end goal of nearly every security effort. Initiatives to address this critical concern include virus and malware protection, patch management and intrusion detection/prevention. Other strategies include compliance auditing and both hardware and software replication. Key Concerns Business continuity including high availability (67 percent) Application performance (49 percent) Customer satisfaction (46 percent) Investments Virus and malware protection Patch management Intrusion detection and prevention Compliance auditing and reporting Hardware storage and replication Auditing Synsort’s press release revealed that security audits are being conducted by only two-thirds of the respondents and of these, only 30 percent perform their audits on an annual basis while another 10 percent conduct their audits every two years. Cloud security While companies are increasingly entrusting critical applications to the cloud, they are doing some with considerable trepidation. Forty-three percent of the survey respondents identified cloud security as their top security challenge for the year. Compare this with 37 percent citing the sophistication of attacks and 35 percent claiming ransomware as their #1 challenge. Disaster recovery While a critical component of any well-thought-out security plan, disaster recovery schemes have not held up to scrutiny. Nearly half of the businesses reported having to implement their disaster recovery plans and of these, 35 percent lost a few minutes to an hour of data, 28 percent lost a few hours, and 31 percent lost a day or more. Only half met their recovery time objectives. In the survey results, it became clear that 85 percent of the respondents had NO recovery plans or were not confident in the plans they had put together. Clearly, there is a significant need not just to pull disaster recovery plans together, but to rigorously test the plans and make sure that they work as expected. The pressure is on The survey results clearly indicate that the increased sophistication of attacks and expectations of rigorous security planning have put IT leaders and managers under the gun for meeting their security objectives. 2018 is not likely to be an easy year for any of them, but one in which improving their security posture will be key to their and their companies’ success. Survey details The survey involved 5,632 global IT professionals, including CIOs, CTOs, global directors of IT infrastructure, vice presidents of technical support, senior infrastructure architects, cloud engineers, database administrators, and managers of server operations. It was administered online between January 2017 and July 2017. Sysncort will conduct a webcast Jan. 18 to discuss the findings. Related content how-to Compressing files using the zip command on Linux The zip command lets you compress files to preserve them or back them up, and you can require a password to extract the contents of a zip file. By Sandra Henry-Stocker May 13, 2024 4 mins Linux opinion NSA, FBI warn of email spoofing threat Email spoofing is acknowledged by experts as a very credible threat. By Sandra Henry-Stocker May 13, 2024 3 mins Linux how-to The logic of && and || on Linux These AND and OR equivalents can be used in scripts to determine next actions. By Sandra Henry-Stocker May 02, 2024 4 mins Linux how-to Using the apropos command on Linux By Sandra Henry-Stocker Apr 24, 2024 3 mins Linux PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe