Technology supports and enhances almost every move we make as humans. From intricate banking procedures to shopping for groceries - every activity that we have embarked upon has been greatly influenced by technology. As the world becomes more interconnected, we also become more susceptible to risks. Just last week, one of the largest cyber attacks was announced, exposing the personal data of over 44% of the American population.
According to the 2017 Internet Security Threat Report, more than 7.1 Billion identities have been exposed in data breaches in the last 8 years. The average number of web attacks blocked per day is 229 thousand.
The potential magnitude of consequences from a technology hack are tremendous - organizations face legal liabilities, penalties, and damages to their public facing reputation.The monetary consequences are equally as detrimental. Investors typically sell shares on the heels of cyber attacks, which results in a more than a 5% dip in the stock prices of the companies affected.
As technologies are involved in the operation of many companies, organizations must put a sharp focus on managing technology risk.
On average, organizations use 928 cloud apps to support their business endeavors. Many businesses do not have a firm view of their application landscape, which can lead to high risks. Running unsupported versions of applications, the intricate and costly infrastructure supporting defunct legacy applications, and overpaying in license costs are major warnings that your organization does not have the full picture of your IT landscape.
Tip: Use an EAM dashboard to gather the full picture of your IT Landscape.
Successful technology risk management is data driven. Quantitative information displayed on the above enterprise architecture management platform will help you manage the risk of technology obsolescence.
Figure 2 - LeanIX Application FactSheet - assessment of technical fit
The severity of the risk can be assessed by many different parameters: How many users are affected by a potential outage? What revenue impact does an application outage have? What are regulatory or compliance impacts? Does the technology risk result in an inability to meet needs for further business growth?
Figure 3 - LeanIX Visualizer showing a risk dependency map
Recent events have shown how the failures in technology can cause lasting damage to the reputation of organizations. Put these steps in place to effectively manage technology risk in the digital age.