When the System Goes Down, the Costs Add Up

Mar 8, 2018 | IT News

It’s that dreaded message from the IT department that no one wants to see flash across the screen: server is down. Cue the agitation, exasperation and frustration.

For a business, there’s nothing worse than having network systems go down during key production periods. Whether that outage lasts for five minutes or five hours, any work lost to downtime translates into unplanned expenses.

Consider what happened to British Airways when “a major IT system failure” caused severe disruption to flight operations worldwide in May 2017. Thousands of passengers were stranded, and hundreds of flights were cancelled.

During the massive system shutdown, the company’s CEO Alex Cruz offered assurance that “our IT teams are working tirelessly to fix the problems.”

Once the crisis ended and the planes took off again, the hit to the company’s bottom line became clear. The cost of compensating passengers, refunds, additional staffing and lost revenue could top $100 million.

The Time Clock Keeps Ticking

That may be an extreme example, but when the network system goes down, there’s always a price tag attached. The costs come in the form of:

  • Lost revenue. It goes without saying that if your computer systems are down, then work isn’t getting done.
  • Lost productivity. Your employees are still on the clock, but they can’t do their jobs.
  • Recovery. There may be additional expenses involved with getting things back up and running.
  • Intangibles. Depending on your business, the hidden costs of system downtime may be customer dissatisfaction or damage to your brand.

It’s Going to Happen, So Be Prepared

When the System Goes Down, the Costs Add UpThe nature of modern business, with its dependency on computer technology, cloud services and internet technology means a crucial cost of doing business is planning for when — not if — unexpected downtime occurs.

A system outage can happen whether your computer services are onsite or on the cloud.

According to Dunn & Bradstreet, 59 percent of Fortune 500 companies experience a minimum of 1.6 hours of downtime per week, which translates into $46 million a year. And that’s just the labor cost.

Those kinds of potential unplanned costs underscore why it’s important to know your IT service provider. Proactive maintenance, knowledgeable support and a fast response when something goes wrong are essential elements to running your business systems.

Because of our extensive experience with cloud computing and our working relationships with business clients, V2 Systems can address these concerns and deliver successful results with cloud computing solutions tailored to your business.

Since 1995, Manassas Park, VA-based V2 Systems has employed local systems administrators, network engineers, security consultants, help desk technicians and partnering companies to meet a wide range of clients’ IT needs, from research, to implementation, to maintenance. Concentrate on your VISION…We’ll handle the TECHNOLOGY!

More From V2 Systems

The Audit Readiness Problem Government Contractors Can’t Afford to Ignore

Many government contractors are not failing audits because they lack tools. They are failing because documentation is incomplete, evidence is disorganized, and readiness starts too late. This blog explains the most common gaps and how to fix them before an audit begins.

You Can’t Secure What You Can’t See: Why Asset Visibility Is a Cybersecurity Requirement

Asset visibility is one of the most overlooked parts of cybersecurity. In this blog, we explain why businesses need clear visibility into hardware, software, users, and cloud assets to reduce risk, strengthen operations, and support compliance.

When One Suspicious Alert Prevented a Much Bigger Disaster

A former client narrowly avoided a much larger cybersecurity incident after suspicious Microsoft 365 activity revealed an unauthorized intrusion. In this blog, we break down what happened, how phishing may have played a role, why MFA still matters, and what businesses should do next to reduce risk and respond quickly.

CMMC in Practice: How Day-to-Day IT Operations Affect Compliance

CMMC is not just policy. It depends on day-to-day IT execution like patching, access control, monitoring, and documentation. This blog explains what contractors should focus on now, plus why the assessment process can be more expensive than expected.

What Happens After the Breach: How Incident Response Really Works for SMBs

Incident response is what determines whether a cyber incident becomes a short disruption or a major business crisis. This blog explains the real steps SMBs should take after a breach and how MSP support speeds recovery.

Free
Small Business Cybersecurity Checklist

cybersecurity checklist graphic