Downtime

Customers Will Recover From Downtime. But Will Your Business?

Downtime Recovery

Today’s society relies heavily on being connected to service providers. The ability of a business to transact or provide services online is now just as important as the products they offer, or the price they advertise. Retail shopping, media and entertainment, healthcare and fitness, and finance, are all good examples of the connected business ecosystem that we rely on to make our lives easier.

But what happens when our connection is lost? What happens when our data can’t be retrieved, or our online experience is disrupted? What happens when the businesses we rely on goes offline?

Fortunately for customers, in most cases the data loss or downtime impact is limited to frustration. We simply reconnect later. But while the impact to the customer is often temporary, the impact to the business experiencing data loss or downtime can be long lasting.

Today, the ease of switching carriers, or any business delivering online services means customers can quickly replace these providers and move on, in some cases, with little to no effort. So, every aspect of a service can now be scrutinized by the public: product, price, and now, downtime. Has the provider experienced data loss? Has downtime been above average? Is the business prepared for a disaster? These are the questions customers now ask when selecting new providers for the long term.

Data Loss

The reality is, most businesses are not protecting themselves from data loss or extended downtime. By one measure, 40% of businesses (especially small to medium businesses) will not reopen following a disaster. Another measure says the number is closer to 75%. These companies risk losing their customers forever at the first instance of extended downtime or data loss. Some of these companies have spent years building a practice and customer experience that is unique to them and that will serve customers well over the long term. Why not protect it?

It’s for this reason that iland has built a business of protecting other businesses from data loss and downtime. iland has been focused on cloud-based data protection for over a decade. Iland’s Secure Cloud portfolio for data protection includes Disaster Recovery as a Service (DRaaS), Backup as a Service (BaaS), and Object Storage for long term retention of data. To make the onboarding easy, has developed a complete onboarding and support portfolio that gives customers the assistance they need to move to the cloud with confidence. Along the way, iland has picked up a few awards – including Veeam and Zerto Partner of the Year, CRN Magazine 5-Star Rating, and in 2019, their fourth time (in a row) as “Leader” in Gartner’s Magic Quadrant for DRaaS.

It’s likely that, at some point, all businesses will experience downtime or data loss. Natural disasters happen, cyberthreats are very real, humans make mistakes, and technology fails. It’s what the business does before and after the event that matters to the customer. Were they prepared? Were they able to limit the downtime? The impact to the customer will likely be short-lived. But for some businesses, one data loss or downtime event will be one too many.

By Steve Prentice

Senior CloudTweaks Writer
Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.
follow me
Michela Menting

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been ...
Ankur Laroia

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated solution, poses a challenge to ...
Chris Gervais

Why Containers Can’t Solve All Your Problems In The Cloud

Containers and the cloud Docker and other container services are appealing for a good reason - they are lightweight and flexible. For many organizations, they ...
The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments ...
Mark Casey Apcela

Industrial IoT will reshape network requirements

Industrial IoT The hype around IoT may have been surpassed this year by breathless coverage of topics such as artificial intelligence and cryptocurrencies, but there ...
BBC Tech

Slow websites to be labelled by Chrome browser

Websites that load slowly because they are poorly coded could soon be flagged by Google's Chrome browser. Google said it was working on several "speed badging" systems that let visitors know ...
MIT tech review

Facebook says it’s getting better at weeding out child sex abuse images

Facebook has revealed a huge jump in child sex abuse images uploaded to the website: 11.6 million pieces of content from July to September this year, versus 6.9 million from ...
BBC Tech

Play store apps to be scanned for malware

Google is beefing up the way it checks if any of the apps uploaded to its Play store are malicious. All new apps will be scanned by malware-spotting tools from three ...