Our Blog: Stuff we think you should know

Hurricane Season is Half Over - Be Prepared for Next Year’s

Hurricane Season is Half Over - Be Prepared for Next Year’s

We have almost made it through this year’s hurricane season, but unfortunately, this doesn’t mean that businesses will suddenly be safe again. Many businesses that are impacted by these kinds of disasters are unprepared, and so when push comes to shove, some ultimately close their doors after trying (and failing) to bounce back. We’re going to tell you how to help avoid this outcome for your business the next time there’s a disaster.

Don’t Go in Blind
First, as is the case with any kind of disaster, you need to have a business continuity plan prepared that addresses what you need to do in response. While weather is an important part of that, many businesses that don’t have to deal with things like hurricanes forget that there are many other factors that can come into play. A full 30 percent of all downtime is caused by any of numerous environmental factors - including flooding, yes, but also extreme temperature, humidity, and others.

You need to be sure that you know what your risk factors are, and that you have the systems in place to see them coming. While you may not want to make the investment into a monitoring system, its cost is miniscule compared to what an unforeseen disaster can incur. Downtime costs alone have jumped up by 38 percent in the last eight years, making any investment to avoid the ill effects of a disaster well worth it. Hurricanes have become larger and, in some areas, even the run-of-the-mill rainstorm can drop over 70 percent more water than they have in the past. As a result, you need to know what makes your business vulnerable.

Plan for The Worst…
Once you know the risks, you need to identify what would constitute your business’ worst-case scenario and prepare yourself to deal with that. Naturally, an off-site data backup is going to be a key part of this. Make sure that your business’ data is backed up in multiple locations, away from your actual workspace. This keeps your data that much safer, as it reduces the likelihood of a single disaster wiping out both your business’ stored data and the backup you’ve kept.

You will also need to ensure that your business has a communications plan to ensure that you can confirm the safety of your employees throughout the hurricane, as well as to keep your clients informed of your status. You may also want to consider, depending on your risk factor, keeping a supply of provisions in the office in case you and your team find yourselves stuck there by conditions outside.

It isn’t uncommon that a disaster should make the complete shutdown of a business the best available option. Make sure your plan addresses both how to initiate such a shutdown, and how to start your business back up once the threat has passed.

...And Negate It
Once your plan is prepared, you should do all that you can to make it so that a disaster will only have limited influence on your business operations. For instance, enabling your employees to work remotely will allow them to resume productivity once they and their families have reached a safe place. You should also make sure your location has the necessary equipment to help mitigate the damage that a hurricane, tropical storm, or whatever disaster pertains to your location, can cause. An example would be maintaining water pumps to help minimize flooding.

Finally, you need to make sure that you and your staff not only know your plan but are prepared to enact it. Just like schools run fire drills, you should have your staff practice what they need to do in the midst of a hurricane or some other disaster.

Haber Group can help. Our experience with backup and disaster recovery solutions allows us to handle that aspect of your business continuity planning, leaving you free to focus on the rest. Call us at 866.625.3560 to find out more.

How to Form Better Business Relationships
Are You Utilizing IT Services to Your Full Advanta...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, February 21 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Hackers Privacy Business Malware User Tips Computer Business Computing Internet Network Security Tech Term Microsoft Software Productivity Google Hosted Solutions Mobile Devices Efficiency IT Services Small Business Communication Windows 10 Hardware Ransomware Backup Android Smartphone Data Workplace Tips Productivity IT Support Saving Money Data Management Managed IT Services Microsoft Office Browser Cloud Computing Internet of Things Gmail Data Recovery Windows Facebook Server Managed IT Services Upgrade Business Continuity Word Disaster Recovery Data Backup Passwords App Innovation Phishing Office 365 Mobile Device Windows 10 Business Management Smartphones Employer-Employee Relationship Managed Service Provider VoIP Cybersecurity Artificial Intelligence Encryption Remote Monitoring Users Outsourced IT communications Social Media Miscellaneous Government Information Applications Tip of the week Vulnerability Analytics BYOD IT Support Office Tips Money Network Infrastructure Chrome Spam Content Filtering Website Big Data Access Control Maintenance Save Money Router Apple Risk Management Tablet Wireless Data storage Firewall Antivirus Display WiFi Avoiding Downtime Customer Service The Internet of Things Robot Virtual Reality Printing Hacker Settings Automation Paperless Office Two-factor Authentication Bandwidth IT Management Employee-Employer Relationship Managed Service YouTube HIPAA Unified Threat Management Holiday Search Education LiFi Quick Tips Apps IBM Scam Computers Storage Hacking Development Administration Mobile Device Management Retail Customer Relationship Management Networking Mobile Security Wi-Fi Document Management VPN Outlook Laptop Presentation Augmented Reality Data Security Monitors Data loss Business Technology Office Virtual Private Network Gadgets Safety Wireless Technology Operating System Recovery Business Intelligence Virtualization End of Support Server Management Downtime SaaS Hosted Solution Touchscreen Computing Google Drive Company Culture Password Mouse Vendor Management Telephone Systems Update Knowledge Address Best Practice telephony MSP FCC Smart Tech Sports Information Technology Uninterrupted Power Supply Patch Management Google Docs Managing Stress Managed Services Distributed Denial of Service Mobile Office User Error Writing PowerPoint Alerts Service Level Agreement Digital Payment User eWaste Device Comparison Windows 8 Refrigeration Fraud Internet Exlporer Bluetooth SharePoint Corporate Profile Chromebook Experience Unified Communications Business Growth Title II Connectivity Politics Google Wallet Public Speaking LED Solid State Drive Collaboration Cables Laptops Managed IT Service Modem VoIP Running Cable Current Events Competition Onboarding Licensing Virtual Desktop Legal Continuity Mobility Specifications Compliance How To Slack Value Co-Managed IT Downloads IT Technicians WannaCry Alt Codes Dark Data Charging Online IoT IT service Heating/Cooling Tech Support Buisness Drones Smart Office Cooperation Hard Disk Drive File Sharing IT solutions Wires Software as a Service Break Fix Cookies Lithium-ion battery Time Management Computer Care Going Green Social Engineering Digital Signage Cabling Solar Print Toner Black Friday Regulations Firefox Samsung Social Undo Monitoring Hotspot Professional Services Work Content Multi-Factor Security Mirgation Typing Marketing Microsoft Excel Star Wars BDR 5G Servers Websites Identity Theft Staff Cortana Deep Learning Humor Application Voice over Internet Protocol Dark Web Nanotechnology Network Management Halloween Training Desktop Fun Managed IT Automobile Shortcuts Cyber Monday Social Networking Techology G Suite Hacks Spying Language USB Optimization Streaming Google Calendar Chatbots Digital Lenovo Cryptocurrency Analysis Blockchain Cost Management Google Maps Budget Printer Wearable Technology Mail Merge Bring Your Own Device sip FinTech Net Neutrality Screen Reader Scary Stories How To Troubleshooting Disaster Shortcut Security Cameras Smart Technology Motherboard IP Address Cybercrime Unified Threat Management Computing Infrastructure Dongle Recycling Human Error Legislation Identity Spyware Remote Computing Superfish Bitcoin Network Congestion Hard Drives Permissions Assessment Statistics GPS Domains Printers Computer Repair IT Consultant Mobile Computing Physical Security CrashOverride Processors Cameras Relocation Meetings Tracking Upgrades Health Cleaning Private Cloud Alert CCTV Emoji Emergency Webcam 3D Printing Electronic Medical Records Work/Life Balance Error Black Market Point of Sale Regulation Unsupported Software Travel Entertainment Law Enforcement Notifications Mobile Data Twitter Botnet Supercomputer Motion Sickness Gadget Staffing Personal Information Administrator Crowdsourcing Taxes Web Server Machine Learning IT Budget