“□ What apps used by your line function are mission-critical? Which way should the balance between security and user convenience tilt for each of them? □ What data is the most sensitive? What would be the consequence if it were (a) stolen or (b) destroyed? □ How long will your firm avoid permanent damage if your entire IT portfolio became unavailable? This justifies the ongoing costs of the type—cold, warm, or hot—of backup site.”
―
Amrit Tiwana,
IT Strategy for Non-IT Managers: Becoming an Engaged Contributor to Corporate IT Decisions