Determine what customers can and can't live without. "Some applications and infrastructure are must-haves, some are unimportant and some are might-have-to-haves," says Edward Minyard, a Certified Continuity Manager with consulting firm Accenture.
Developing an effective strategy to address myriad security threats takes time, personnel and a significant monetary investment. But compared to the potential loss of customers, reputation and revenue, these expenditures are paltry. Here are seven steps Accenture says you can take to help you and your customers develop a holistic strategy.
Sharon Linsenbach is a staff writer for eWEEK and eWEEK Channel Insider. Prior to joining Ziff Davis, Sharon was Assistant Managing Editor for CRN, a weekly magazine for PC and technology resellers. Before joining CRN, Sharon was an Acquisitions Editor for The Coriolis Group and later, Editorial Director with Paraglyph Press, both in Scottsdale, AZ. She holds a BA in English from Drew University and lives in the Philadelphia suburbs with her significant other and two neurotic cats. When she's not reading or writing about technology, Sharon enjoys yoga, knitting, traveling and live music. Sharon can be reached at Sharon.Linsenbach@ziffdavisenterprise.com.
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.