How to Be Sure Your Business Continuity Plan is Complete

How to Be Sure Your Business Continuity Plan is Complete

While it may not be fun to consider the worst-case scenario, it is important that you have a plan to ensure that your business will be able to survive when the chips are down. This plan to ensure that your business will continue is called (appropriately enough) a business continuity plan, and needs to address a few things that we will go over here.

In order to really be effective, a business continuity plan needs to be comprehensive - otherwise, your operations will still be interrupted when you encounter a lack of some resource that you need access to. A complete plan will document the following considerations and the strategies for completing them:

  • Threat Matrix - The first thing your plan should address is the variety of threats it might face, from the mundane events that can be mitigated with relatively little effort to the catastrophic, do-or-die disasters that require in-depth planning and proactive activities to weather. This portion of your plan should acknowledge these threats and propose your company’s response to them.
  • Critical Processes - Every business has workflows, chains of command, and other processes that it requires to properly operate. Your business continuity plan needs to both identify and detail these processes so they are able to continue with minimal interruption.
  • Command Chain - Or in other words, who’s in charge. A hierarchy of authority is crucial to the continuation of the business as someone needs to be in command, and equally importantly, have it be common knowledge that they are in command to avoid grandstanding. Otherwise, nothing can or will be accomplished.
  • Employee Safety and Evacuation Plan - In order for business to continue, there has to be someone there to continue it. A business continuity plan needs to have a dedicated section that addresses how and when to evacuate employees to ensure their safety in a dangerous situation.
  • Communication Plan and Contact Information - Anyone associated with your company, from your employee to your clients to your business partners, needs to be kept in the loop throughout whatever scenario is in play. Your plan needs to address when, how, and why different contacts should be updated.
  • Backup Processes and Location - In order for your business continuity preparations to be complete, you should be maintaining a backup somewhere offsite - ideally in a cloud solution. Another piece of your plan should be dedicated to ensuring that this backup can be accessed. This also pertains to the possibility of identifying a backup location to turn to when your original offices are uninhabitable in order to resume at least some semblance of productivity.
  • Inventory and Infrastructure - There are a lot of pieces to the typical workplace infrastructure, including hardware and software. Therefore, you need to be sure that you can reliably identify the inventory and infrastructure you had for both insurance purposes and to acquire replacements.
  • End of Incident Criteria - Just like you need to know when something crosses the line over to “disaster,” you need to know when the disaster ends. Creating a list of conditions that must be met before reviewing the damage and beginning recovery will allow you to more efficiently begin the process, without jumping the gun and taking more damage.
  • Post-Incident Debriefing - Finally, when the dust has settled, you need to survey the damage and deliberate how things could have been handled better. Take the opportunity to review your business continuity strategy and make any changes and improvements. Your business continuity plan should also include a template to create a questionnaire to have your contacts fill out to give you the maximum amount of feedback and insight. This will allow you to make your plan better, in case of “next time.”

If you see to proactively considering, strategizing, and documenting these facets to your plan, you will have a much greater chance of a successful recovery. Haber Group can assist you with the technological aspects of it. Give us a call at 866.625.3560 for more information, or to get an evaluation of your current solutions.

Tip of the Week: Relocating a Lost Recycle Bin
Dispose of Your Old Tech Without Putting Yourself ...


Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Malware Hackers Business Internet Microsoft Business Computing Computer Software Hosted Solutions Google Backup Mobile Devices Ransomware Network Security Windows 10 IT Services User Tips Android Hardware Tech Term Smartphone Small Business Managed IT Services Data Management Facebook Browser Business Continuity Saving Money IT Support Efficiency Gmail Productivity Windows Data Cloud Computing Server Data Recovery Internet of Things App Data Backup Microsoft Office Office 365 Cybersecurity Upgrade Artificial Intelligence Phishing Smartphones Business Management Disaster Recovery Word Managed Service Provider Remote Monitoring Encryption Chrome Content Filtering Tip of the week Analytics IT Support Spam Big Data communications Social Media Government Money Workplace Tips Infrastructure Employer-Employee Relationship Managed IT Services Communication Outsourced IT Innovation Productivity Office Tips Network Windows 10 Settings Apple The Internet of Things Two-factor Authentication Data storage Vulnerability Bandwidth Antivirus YouTube Website Miscellaneous Robot Risk Management Wireless Applications VoIP Firewall Passwords IT Management Customer Service WiFi Avoiding Downtime Office Virtual Reality Hacker Storage Scam Wireless Technology Paperless Office Hosted Solution Tablet Recovery SaaS Information Outlook VPN Monitors Holiday Search Unified Threat Management Data Security HIPAA IBM Data loss Business Technology Printing Apps Virtual Private Network Automation Administration End of Support Hacking BYOD Customer Relationship Management Wi-Fi Computing Server Management Password Mobile Security Google Drive Augmented Reality Mouse Vendor Management Save Money Presentation Business Intelligence Telephone Systems Safety Maintenance Mobile Device LiFi FinTech Uninterrupted Power Supply Patch Management Windows 8 Computers Marketing Microsoft Excel Star Wars Training Fun Quick Tips User Error Multi-Factor Security Mirgation Business Growth Gadgets Application Dark Web Nanotechnology Downtime Employee-Employer Relationship Google Wallet Staff Automobile Company Culture Bluetooth Cyber Monday Social Networking Scary Stories Managed Service Corporate Profile Current Events Retail Virtualization Language USB Recycling IP Address Cybercrime MSP Solid State Drive Display Blockchain Cost Management VoIP Legal Google Calendar Chatbots Alt Codes Dark Data Users Net Neutrality Screen Reader PowerPoint How To Networking Drones Printer Wearable Technology Managing Stress Smart Technology Motherboard Remote Computing Sports WannaCry Going Green Social Engineering Computing Infrastructure Dongle Knowledge eWaste IT service Heating/Cooling Mobile Office Development Hard Disk Drive Social Hard Drives Permissions Assessment Education Time Management Legislation Identity Cabling Typing FCC Smart Tech Onboarding Firefox Access Control Cables Distributed Denial of Service Router Slack Alerts Service Level Agreement Digital Payment Experience Unified Communications Continuity BDR Servers Deep Learning Humor Mobile Device Management Running Cable Charging Hacks Refrigeration Fraud Internet Exlporer Politics Smart Office Network Management Operating System User Comparison Chromebook Wires Managed IT Cryptocurrency Title II Connectivity Virtual Desktop Techology Budget Public Speaking SharePoint Collaboration Managed IT Service Modem Buisness Monitoring Digital Lenovo How To Competition Licensing Solar Google Maps Bring Your Own Device sip Lithium-ion battery Laptop Mail Merge Value Tech Support Document Management IT solutions Work Touchscreen Specifications Compliance Voice over Internet Protocol Disaster Shortcut Bitcoin Network Congestion Online IoT Computer Care Unified Threat Management Downloads IT Technicians File Sharing telephony Break Fix Cookies Samsung 5G Spying Spyware Superfish Information Technology Cooperation Statistics Best Practice Regulations Halloween Analysis Address Writing Undo Hotspot Professional Services Websites Identity Theft Cortana Optimization Google Docs Black Friday Law Enforcement Physical Security Travel Notifications G Suite CrashOverride Upgrades Twitter Botnet Supercomputer Gadget Staffing Motion Sickness Crowdsourcing Taxes 3D Printing Personal Information Administrator Web Server Emergency Machine Learning IT Budget GPS Update IT Consultant Unsupported Software Domains Computer Repair Processors Cameras Relocation Meetings Tracking Cleaning Mobile Data Health Alert CCTV Private Cloud Emoji Webcam Regulation Work/Life Balance Electronic Medical Records Error Black Market Point of Sale Mobile Computing