Do the Math: Downtime Costs Your Business Money

Mar 21, 2018 | IT News

There’s no way around it — downtime is expensive. But just how expensive it can be for your business may surprise you.

According to Dunn & Bradstreet, 59 percent of Fortune 500 companies deal with at least 1.6 hours of downtime every week.

Let’s unpack that number. Start by figuring an average Fortune 500 Company has 10,000 employees who are paid an average of $56 per hour — that’s $40 an hour for salary and $16 an hour for benefits. That means the cost for just 1.6 hours of downtime would total $896,000 every week, which translates into more than $46 million per year.

And remember, that’s only for labor, just one of the many costs associated with downtime.

Every minute the system is down costs you money — literally. According to its research, Gartner estimates the cost of downtime at $5,600 per minute, which translates to well over $300,000 an hour.

Downtime Expense on the Rise

Do the Math: Downtime Costs Your Business MoneyAccording to another analysis by the Ponemon Institute, the average cost of a data center outage has steadily increased from $505,502 in 2010 to $740,357 in 2016 — an increase of 38 percent.

The chart found within the report by the institute further illustrates the cost of downtime. It shows the minimum, median, mean and maximum cost per minute of unplanned outages. It shows that the most expensive cost of an unplanned outage is more than $17,000 per minute, while the average cost is nearly $9,000 per incident.

Downtime Ramifications

Every IT outage is different, but each one results in a procession of costs and consequences, both direct and indirect. There are many factors involved in determining the cost, and it varies depending on the size and type of business involved.

These costs factor into the business in both short-term and long-term ways, including:

  • Business disruption
  • Lost revenue
  • Lost productivity
  • Lost data
  • Recovery expense
  • Damaged reputation

Stack the Deck with Solid IT Support

With so many potential ramifications for your business — not the least of which are unplanned costs — it’s imperative to foster a strong relationship with your IT service provider. Proactive maintenance, knowledgeable support and a fast response when something goes wrong are essential elements to running your business systems. Rely on V2 Systems for expert IT support.

Since 1995, Manassas Park, VA-based V2 Systems has employed local systems administrators, network engineers, security consultants, help desk technicians and partnering companies to meet a wide range of clients’ IT needs, from research, to implementation, to maintenance. Concentrate on your VISION…We’ll handle the TECHNOLOGY!

More From V2 Systems

The Audit Readiness Problem Government Contractors Can’t Afford to Ignore

Many government contractors are not failing audits because they lack tools. They are failing because documentation is incomplete, evidence is disorganized, and readiness starts too late. This blog explains the most common gaps and how to fix them before an audit begins.

You Can’t Secure What You Can’t See: Why Asset Visibility Is a Cybersecurity Requirement

Asset visibility is one of the most overlooked parts of cybersecurity. In this blog, we explain why businesses need clear visibility into hardware, software, users, and cloud assets to reduce risk, strengthen operations, and support compliance.

When One Suspicious Alert Prevented a Much Bigger Disaster

A former client narrowly avoided a much larger cybersecurity incident after suspicious Microsoft 365 activity revealed an unauthorized intrusion. In this blog, we break down what happened, how phishing may have played a role, why MFA still matters, and what businesses should do next to reduce risk and respond quickly.

CMMC in Practice: How Day-to-Day IT Operations Affect Compliance

CMMC is not just policy. It depends on day-to-day IT execution like patching, access control, monitoring, and documentation. This blog explains what contractors should focus on now, plus why the assessment process can be more expensive than expected.

What Happens After the Breach: How Incident Response Really Works for SMBs

Incident response is what determines whether a cyber incident becomes a short disruption or a major business crisis. This blog explains the real steps SMBs should take after a breach and how MSP support speeds recovery.

Free
Small Business Cybersecurity Checklist

cybersecurity checklist graphic