< Back

Security : Data Breach : Payment Card Industry Data Security Standard : Continuity Plan

Business Continuity – You Need More Than Just a Plan

By Ray Bryant
Ray Bryant

Stop for a moment and take a look around you – IT isn’t just the computer on your desk, the lap top in your bag or the mobile in your pocket. The truth is it’s controlling who is and isn’t entering your building- virtually and physically, how and where your customers are being dealt with, it’s driving your production line and it even has a part to play in how your coffee is produced. IT is no longer confined to a small back office, possibly in the basement, staffed with geeks all speaking their own language. IT keeps you open for business, but if you’re not careful it can close you down for good.

For every company there is a requirement to exercise due diligence and care of the company’s assets and the future ability to produce returns for investors, from revenues.  This is increasingly embedded in legislation, regulation, standards and best practice guidelines. I’m not going to provide a definitive list - it is neither necessary for this article, nor realistically possible due to the frequency it changes or is amended, further complicated by differences in terminology between sectors and countries. Suffice to say that, in order to exercise due diligence and care, you need to plan for the day you can’t – in other words, a business continuity plan.

I challenge you - get a copy of your plan (if you have one), dust it off and actually read it. In the majority of cases it will cover eventualities such as damage caused by fire, theft or even flooding. If you’re based in one of the cities it may even include a section on external threats i.e. terrorist attacks and other disaster eventualities. You’ve probably got a plan for overcoming a power failure, where to resource external staff if yours are ill and, if you’re in production, crisis management if your product fails.

What does it say about suffering a cyber attack? Chances are it doesn’t.

In this day and age most companies, irrespective of whether a single office or a large international conglomerate, are reliant on computer systems to function. If you were attacked tomorrow, the reality is it will shut you down. How long it takes to get back up and running, if at all, is down to you. Sit up, take note and plan for the inevitable.

You’re Under Attack
An attacker isn’t just interested in stealing your information or funds. Organisations are experiencing attacks, whether denial of service or injected with malware, that is designed to wreak havoc and ideally shut the business down. Recent high profile victims include Wikileaks, Facebook and Twitter. However, it’s often not just the victim that suffers as PayPal, VISA and Mastercard can attest having fallen victim by association. Any company can be a target as it’s not just anonymous cyber terrorists waiting to pounce, a disgruntled employee could wreak just as much havoc on your system if the notion takes them. What about if your IT system just fails, even the BBC has to hold its hand up to that one!

The effect of being closed for business, however temporarily, will cost the organisation money. For an online retailer it’s a little more obvious as, if customers aren’t able to make purchases, there’s the immediate loss of revenue. However, for a large manufacturing company, if its IT infrastructure fails and production has to shut down for 24 hours the costs will soon mount potentially into the millions. The expense isn’t limited to the immediate problem of restoring services or production - there’s the lost time, ruined stock, ongoing costs of rebuilding confidence in the customer base and potentially amongst shareholders, plus the knock on effects such as an increase in insurance premiums. The costs quickly mount.

The AT&T Business Continuity Study 2010, reported that[1]:

  • Three-quarters (77%) of organisations indicate that employee use of mobile devices plays a major/minor role in the business continuity plan
  • Half (50%) have virtualized their computing infrastructure, with less than four out of ten (38%) having implemented a business continuity plan for the virtualized infrastructure
  • 84% of all companies surveyed have e-mail or text messaging capabilities to reach employees outside of work, and three-fourths (73%) have systems in place that enable most employees to work from home or remote locations

While, on the surface, all of these resources offer a lifeline to an organisation in the event of a general infrastructure failing, and you’ve probably rubber stamped the budget on some of these initiatives yourself. However, on a day to day basis they also ‘throw open the doors’ to the outside world risking extreme disruption through attack.

First Line of Defence
An organisation’s IT team has many responsibilities with one main, overriding objective - to deliver the best service possible. However, this does not always promote the best security possible. Why? Well, budgets are usually the biggest issue. CEO’s MUST understand the need for enhanced security and ensure their IT team deliver it.

When the corporation has spent millions on network defences it is then close to incompetence to not make sure those investments are working to the optimum effectiveness. Regular audit and validation leads to enhanced security, that costs very little and is a must have process. With constant vulnerability testing and security enhancement through configuration, better rules can be defined and implemented. This activity can even avoid additional capital expenditure in unnecessary security devices, saving budgets.

Making sure your defences are working to the optimum is not just the responsibility of your CIO, CSO or whatever you call your IT management head. It goes all the way to the top. The function of the CEO and board of directors, as part of their legal responsibility and charge by shareholders, is to exercise good corporate governance.

You wouldn’t build your office on the sand, so why allow your IT infrastructure to have insecure foundations. Ignoring your network defences is tantamount to corporate suicide.


[1] For a full summary of the AT&T Business Continuity Study can be found at

Ray Bryant

Ray Bryant started working life in a firm of London Chartered accountants, qualified as Chartered Company Secretary in 1979. His career in I.T. started in the very early days at Control Data Corporation, in finance, production and logistics, Ray was 15 years with Ciba Geigy, Switzerland, on Finance and ERP software implementations in UK, USA, Saudi Arabia, Greece, Turkey and the Philippines.

A period at SSA Global technologies as a financial systems consultant culminated with the creation of an independent compliance company, SLA Management Services (Barham Group) which Ray headed as chairman and managing director. The Barham Group grew in 6 years to service many I.T. companies including one of the largest IBM mid range (and UNIX), ERP and CRM software providers in the world.

Ray took the company from start up to successful sale in 2008. Since then Ray has been strengthening the security offerings of Idappcom which resulted in the acquisition of the Traffic IQ product range in 2009.

Idappcom Ltd. are a private UK registered company and were founded in 2004. Our Objectives are to provide excellence in the field of IT security and application security and management. Our main product, Traffic IQ, is a vulnerability assessment tool and has wide acceptance with security professionals throughout the world. Clients include major security appliance vendors, independent appliance testers, Military establishments, Telecomms companies and various others across a broad range of industries.

About Us Editorial

© 2019 Simplex Knowledge Company. All Rights Reserved.   |   TERMS OF USE  |   PRIVACY POLICY