MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon...

42
MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin
  • date post

    21-Dec-2015
  • Category

    Documents

  • view

    214
  • download

    0

Transcript of MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon...

Page 1: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

MANAGING TECHNOLOGY IN BUSINESS

ByElizabeth AntonoffNatasha Carline

Nancy El-HajChanel Brandon

Silvia Kleinman-Rabin

Page 2: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

PREFACEPREFACEThis presentation was designed as a training

tool that could be used in almost any organization that uses computer systems.

The intention was to educate businesses on how simple preventative measures could reduce the costs associated with downtime and lost data.

This topic was selected because each of the group members has experienced frustrations with system failures and lost data/files.

All research was conducted using the internet.

Page 3: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

INTRODUCTIONINTRODUCTION

Managing technology takes more than just storing files and updating systems. It is the art of guiding organizational change and creating organizational interdependence. External as well as internal factors such as computer systems can hinder these changes. In organizations, the IT Department is the maintenance crew of computer systems, making sure that computer systems, programs and websites run at their maximum performance.

Page 4: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

INTRODUCTION cont...INTRODUCTION cont...

However, if something goes wrong, the IT Department is the first one called and the first one blamed. Yet, it is not the sole responsibility of the IT Department to manage technology. It is everyone's responsibility to be better aware of computer operations and systems to help minimize computer downtime.

In the end, computer downtime not only frustrates employees, it also slows down work progress and drastically cuts into company profits.

Page 5: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

INTRODUCTION cont...INTRODUCTION cont...

In this presentation we will discuss:A. TRUE DOWNTIME COSTS (TDC)B. COST OF LOST DATAC. HIDDEN COST OF COMPANY

DOWNTIMED. WAYS TO CUT DOWNTIME BY

COMPANY TRAININGE. COMPUTER MAINTENANCE

Page 6: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

TRUE DOWNTIME COSTS (TDC)

TRUE DOWNTIME COSTS (TDC)

The key to managing technology is to fully understand the “true” cost of downtime. TDC is simply the ability to analyze all cost factors associated with downtime, and using this information to better train employees and run the organization.

www.downtimecentral.com/Whats_True_Downtime_Cost.htm

Page 7: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

COST OF LOST DATACOST OF LOST DATAAvailable evidence

suggests that 6% of all PCs will suffer an episode of data loss in any given year.

This translates to approximately 4.6 million data loss episodes.

There are two main quantifiable costs associated with each incident of data loss:

PCs Experiencing Data Loss

Average Cost of Each Data Loss Incident

Page 8: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

COST OF LOST DATA cont…

COST OF LOST DATA cont…

PCs Experiencing Data LossHardware Failure 1,921,300 Human Error 1,397,300 Software Corruption 611,300

Computer Viruses 305,700 Theft 234,400

Hardware Destruction 131,000 Total 4,601,000

Page 9: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

COST OF LOST DATA cont…

COST OF LOST DATA cont…

Average Cost of Each Data Loss Incident Technical Services 380

Lost Productivity 177 Value of the lost data 2,000 Total $ 2,557    

In 1998, the total US Data Loss cost $11.8 billion

www.lht.com/Products/TapeBackup/Software/LostDataCosts/CostOfLostData

Page 10: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

COST OF LOST DATA cont…

COST OF LOST DATA cont…

Available evidence suggests, the cost of technical support in the recovery effort, lost productivity due to user downtime, and the possible cost associated with data that is permanently lost is significant.

The average cost of each data loss incident, is approximately $2,557.

That figure multiplied by the total number of PC data loss incidents in the US suggests that data losses cost US businesses $11.8 billion in 1998.

http://www.lht.com/Products/TapeBackup/Software/LostDataCosts/CostOfLostData.html

Page 11: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

HIDDEN COST OF COMPANY DOWNTIME

HIDDEN COST OF COMPANY DOWNTIME

Businesses rely on computer systems which are vital in day-to-day business operations.

Without computer systems, in today’s technology driven society, businesses would quickly fail.

Page 12: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

DOWNTIME YEARLY LOSSES - BY INDUSTRY

DOWNTIME YEARLY LOSSES - BY INDUSTRY

Energy $2.8 million Telecommunications $2.0

million Manufacturing $1.6 million Financial Institutions $1.4

million Information Technology $1.3

millionInsurance $1.2 million Retail $1.1 million Pharmaceuticals $1.0 million Banking $996,000

Page 13: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

WAYS TO CUT DOWNTIME - COMPANY

TRAINING

WAYS TO CUT DOWNTIME - COMPANY

TRAININGSo how can your organization minimize

computer downtime?By planning and utilizing preventative

maintenance. Planning includes making sure your company has invested in high quality, reliable equipment and software including operating systems

Being sure that your critical data is backed up routinely

Educating employees on preventative computer maintenance to mitigate risk exposure

Page 14: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

COMPUTER MAINTENANCE INTRODUCTION

COMPUTER MAINTENANCE INTRODUCTION

Routine maintenance on your computer can prevent data loss and systems failures, similar to how an oil change every 3,000 miles keeps your car in good working order. Following these simple steps each month will keep your computer running more smoothly:

Update you virus protectionAccording to Symantec virus experts, between 10 to 15 new viruses appear each day.

Page 15: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

THE HOW TO ON COMPUTER

MAINTENANCE

THE HOW TO ON COMPUTER

MAINTENANCERun a Scandisk (in Windows Operating Systems)To run Scandisk go to: Start> Programs > Accessories > System Tools > Scandisk. Choose the disk drive you want to scan. If your hard drive is C, choose that. Do not scan your files on the Network. This is typically done for you.

Defragment (in Windows Operating Systems)As you add and delete files from your computer, you fill up and leave spaces on your machine file system. “Defragging” your computer removes unnecessary spaces and helps your machine to use space more efficiently.

To do this go to: Start> Programs > Accessories > System Tools > Disk Defragmenter. This can take some time and it’s ok to get it started and go to lunch.

Page 16: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

THE HOW TO ON COMPUTER

MAINTENANCE

THE HOW TO ON COMPUTER

MAINTENANCEBack up your data

Save copies of your files somewhere other than on your hard drive. If you are on your network, save your documents there. Use floppy disks, zip disks or save to a writable CD ROM disc. To find out more information about backing up your data try visiting the PC Magazine’s web site article at http://www.pcworld.com/hereshow/article.asp?aid=1804

Cleanliness is next to…Keep your machine clean. Get a can of compressed air and blow the crumbs out of your keyboard. Check the back of your machine and make sure dust bunnies are not blocking the fan. Use rubbing alcohol and a Q-tip to clean the keys. Remove the mouse ball cover and clean the rollers inside with the alcohol and a Q-tip.

Page 17: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

DELETING COOKIESDELETING COOKIES

What are Cookies?Cookies are text files.  They record information that you have submitted to Web sites such as your username.  They do not search your hard drive or do they ruin any of your files.  When I visit Amazon.com, I am shown items I might like to buy, because I have a Amazon.com cookie on my hard drive.  The cookie acknowledges who I am.  This allows you to buy stuff online too.  If you have your cookies turned off while buying from an e-commerce store, you may not be able to access the shopping cart. 

Page 18: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

DELETING COOKIES cont…

DELETING COOKIES cont…

You must first close your browsers.

Note: Netscape Users:1.  Your cookie files that

Netscape has downloaded will be located in cookies.txt. 

2. Select the cookies file.

3. Press the Delete key to delete the cookies you do not want to save.

Page 19: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

DELETING COOKIES cont...

DELETING COOKIES cont...

Internet Explorer:1.  Search your hard

drive for a folder named Cookies.

2.  Once the Cookie folder is found, open it.

3.  The list of text files with names of the form user@sitename, .  These are the cookie files.

4.  Select the cookies you want to delete.  Be sure not to delete the cookies from sites you visit frequently.

5.  Delete the unwanted cookies.

Tip:To delete more than one item at once, press Ctrl while highlighting the file names. 

Page 20: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

UPDATING VIRUS PROTECTION

UPDATING VIRUS PROTECTION

As new viruses seem to pop up every month, it is important to keep your anti-virus software up-to-date.

When to update: Once a month should suffice, or when you hear about a new virus. ITS usually has the updates available within hours of a fresh outbreak.

Page 21: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

UPDATING VIRUS PROTECTION

UPDATING VIRUS PROTECTION

How to configure: Double-click on the yellow "C" in your system tray (lower right of the screen, near the clock).

At the main screen, pull down the "Preferences" menu and choose "Advanced".

Page 22: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

UPDATING VIRUS PROTECTION cont...

UPDATING VIRUS PROTECTION cont...

On the "Advanced" screen, click on "Update Deffiles Now".

Finally, click on the "Add" button. The new "Site Path" is: http://owl.plymouth.edu Type it in and leave the "User Name" and the "Password" blank. It should look like this:

Page 23: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

UPDATING VIRUS PROTECTION

UPDATING VIRUS PROTECTION

Click on "Okay" and "Okay" to get back to the main Command Anti-Virus screen.

How to update: On the main Command Anti-Virus screen, there is a button labeled "Update Deffiles". Click it to have your virus definition files updated.

Once the update is complete, you will be asked if you wish to view the log file – don’t bother, it is dull reading.

http://www.plymouth.edu/psc/infotech/Virus/update/update.html

Page 24: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

RUN SCANDISKRUN SCANDISK

Windows NT/2000 or XP:

Step one: Double click on the My Computer icon. Right mouse click on the [C:] drive. Select properties from the drop down box.

Page 25: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

RUN SCANDISK cont…RUN SCANDISK cont…

Step two:  An active window "[C:]

properties" will appear Verify that the free space is at least 100MB, if not remove any unneeded documents or applications and empty the Recycle Bin.

Page 26: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

RUN SCANDISK cont…RUN SCANDISK cont…To empty recycle bin,

right mouse click on the desktop icon and follow select appropriately.  If your Drive does not have enough room to operate swapping files,  it will crash eventually)

Select the tools tab on the upper left corner

Step three: Select the check now button from the "error-checking status" section.

Page 27: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

RUN SCANDISK cont…RUN SCANDISK cont…

Step four: Select automatically fix file system errors and scan for and attempt recovery of bad sectors.

Click on Start.

Page 28: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

RUN SCANDISK cont…RUN SCANDISK cont…

Step five: A dialog box labeled Checking Disk C:\ will appear. Select Yes. This will enable your computer to run Scandisk once it is restarted.

Page 29: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

RUN SCANDISK cont…RUN SCANDISK cont…

Step six: Restart your computer. A message will appear that Scandisk will start in 15 seconds. Do not press any keys.

Note: You may wish to restart you computer at a convenient time as scandisk can take up to 45 minutes or more to complete depending on the size of your hard drive.

Page 30: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

DIFFERENT TYPES OF COMPUTER VIRUSESDIFFERENT TYPES OF COMPUTER VIRUSES

As the personal computer gained prominence in the early 1980's, so did the computer virus. Several theories exist as to the exact date and origin of the first virus to exist in the wild.1 By the latter part of the decade, several had gained a foothold in virus history, most notably the Brain virus (1987) and Michelangelo (1988). Today, 50,000+ computer viruses are in existence.

With such a proliferation, lines have begun to blur as to what constitutes a computer virus. To explain this distinction, a brief description of the types of threats follows:

Page 31: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

DIFFERENT TYPES OF COMPUTER VIRUSESDIFFERENT TYPES OF COMPUTER VIRUSES

Virus - A computer virus is a self-replicating sequence of code, contained in a legitimate program, which purposely copies itself and infects other programs. To qualify as a virus, it must self-replicate, i.e. create copies of itself to continue the infection. The program in which the virus is hidden is referred to as the host. In addition to replication, some viruses carry a "payload" or portion of the program that is designed to corrupt data or cause some other malicious occurrence.

Page 32: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

DIFFERENT TYPES OF COMPUTER VIRUSESDIFFERENT TYPES OF COMPUTER VIRUSES

Trojan - A Trojan Horse is a program that does something other than what it is advertised or believed to do. It is widely accepted that the distinction between a virus and a Trojan lies within its ability to self-replicate

Worm - Unlike a virus, a worm is a self-contained program that copies itself to other computers, usually via network connections. In other words, the worm is not "hidden" inside a legitimate program - the program is the worm. However, the worm may be disguised for distribution as a legitimate program. A worm is generally designed to repeatedly copy itself in memory or on a disk drive until there is no more space left for the computer to work.

Page 33: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

DIFFERENT TYPES OF COMPUTER VIRUSESDIFFERENT TYPES OF COMPUTER VIRUSES

As is the case of medical viruses, there is no "cure" for computer viruses and the key lies in prevention. Because the nature of viruses, their transmission, and frequency are constantly changing, the preventative methods must be equally dynamic. For example, it was once adequate protection to simply search for a specific sequence of code, called a signature, to detect a virus. Anti-virus firms routinely updated signature files and users updated their systems to include the newest definitions.

However, the virus engineers began creating viruses that mutated when replicating. Some of the mutations were encrypted. This created a need to include decryption algorithms with the signature files. While the anti-virus vendors busied themselves researching and combating encrypted viruses, the virus engineers were equally busy creating a new breed of Polymorphic viruses which randomised the encryption routines.

Page 34: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

DIFFERENT TYPES OF COMPUTER VIRUSESDIFFERENT TYPES OF COMPUTER VIRUSES

Obviously, with today's sophisticated virus threat, anti-virus detection must encompass the dynamic ability to detect based on even unknown behaviour. This parallel has not been achieved in the medical community, where only viruses with known patterns of infection can be prevented. Indeed, even in the computer arena, few companies are able to successfully achieve a high standard of detection against mutating viruses, much less defend against newly created viruses.

Page 35: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

DIFFERENT TYPES OF COMPUTER VIRUSESDIFFERENT TYPES OF COMPUTER VIRUSES

Prevention is the Key

This reality demonstrates the futility of defending against tomorrow's threat with yesterday's technology.

Page 36: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

DIFFERENT TYPES OF COMPUTER VIRUSESDIFFERENT TYPES OF COMPUTER VIRUSES

Simply a Matter of Trust Some of the best efforts to eradicate the virus threat have in fact provided yet another avenue for its growth. Recently, Microsoft introduced new security tools in Office 2000 that promised to lessen the likelihood of a macro virus infection. Instead, the tools allow a virus to take advantage of a trust relationship with another user thereby infiltrating undetected into the new system. http://www.nlcv.bas.bg/pub/av-soft/csav/Whitepaper_virusestoday.rtf

Page 37: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

CONCLUSIONCONCLUSION

In the end managing technology is a key factor in cutting downtime, keeping the flow of work moving, and helping businesses to thrive and live up to its full potential. If we all do not take responsibility to manage technology then who else will?

Page 38: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

Literature ReviewLiterature ReviewThere is a large amount of information on the

subject of downtime and the loss of data, however are quite a few gaps:

Most of the research seems to be conducted by companies that sell various products to help with computer maintenance. More research is needed from less bias sources.

There is a consensus on the loss of productivity and loss of money due to technology failure, however there is little consensus on the amount.

Regarding the process of preventative maintenance, there was not as much information readily available. In fact, all websites and information gathered for this section of the presentation was from educational institutions and software providers.

Page 39: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

Literature Review cont…

Literature Review cont…

Current status on this research is stagnantThere seems to be little indication of future research on this area

This is unfortunate because the dependence on technology is on the rise, resulting in a larger risk for data loss, system failure, and downtime. This threat will only hurt businesses and threaten their profits.

Page 40: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

REFERENCESREFERENCES Aladdin Systems. (2003). Protect Your Internet Privacy.

http://www.aladdinsys.com/internetcleanup/moreinfo.html APC. (n.d.). The Problem with Power. http://

www.apcc.com/power/problems.cfm ARCO Data Protection Systems. (2003). http://

www.arcoide.com/products/pdf/datarecovery.pdf Bob Johnson’s Computer Stuff. (2002). Deleting Cookies. http://

www.bobjohnson.com/deletingcookies.htm Creative Data Concepts Limited Inc. (2003). The Hidden Cost of

Computer Downtime. http://www.creativedata.net/index.cfm?webid=207

Episcopal. (n.d.). How to run a virus scan on a floppy disk. http://www.ehsbr.org/support/helpdesk/guides/utilities/virus_scan_floppy.pdf

Page 41: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

REFERENCESREFERENCES Fitchett, D. (2002). Business Industrial Network. What is the

True Downtime Cost (TDC)? http://www.downtimecentral.com/Whats_True_Downtime_Cost.htm

How to get rid of internet pop-up windows http://www.math.utah.edu/~newren/noPopUps.html

Landesman, M. and Millward D. (2000). National Laboratory of Computer Virology. Computer Viruses – Today and Tomorrow. http://www.nlcv.bas.bg/pub/av-soft/csav/Whitepaper_virusestoday.rtf

Lincoln Intermediate Unit No. 2. (n.d.). Maintaining your machine. http://www.iu12.org/liu/divisions/tech/computer_maintenance.html

Page 42: MANAGING TECHNOLOGY IN BUSINESS By Elizabeth Antonoff Natasha Carline Nancy El-Haj Chanel Brandon Silvia Kleinman-Rabin.

REFERENCESREFERENCES Manasses. (n.d.). How to Run a Scan Disk and Disk Defragmenter.

http://manassas.k12.va.us/tech/tsip/How%20to%20Run%20ScanDisk%20and%20Disk%20Defragmentor.pdf

Microsoft. (2002). Planning Tip: Considering Disaster Recovery in Your Deployment Plan for Exchange.(2000). http://www.microsoft.com/exchange/techinfo/tips/PlanTip01.asp

Middleton, J. (2001). VNUNET.com. Virus costs could hit record high. http://www.vnunet.com/News/1125100

NetworkNews. (2002).The hidden costs of systems downtime http://www.networknews.co.uk/Features/1131589

Nutwood UK LTD. (2001). Banana Skins XV. http://www.compliance-club.com/archive1/000811.html

Smith D. M. (1999). Lighthouse Technology. The Cost of Lost Data. http://www.lht.com/Products/TapeBackup/Software/LostDataCosts/CostOfLostData.html