Blog

Author Archive

Password Manager LastPass Hacked, Exposing Encrypted Master Passwords

LastPassLogoShadow

Password manager LastPass said Monday that email addresses and encrypted master passwords were compromised in a breach. LastPass CEO Joe Siegrist wrote in a blog post that the company does not believe user accounts were accessed in the attack, but the company recommended that users change the master password they use to access their account.

Password managers can be a smart way to increase your online security–until they get hacked.

LastPass, and other password managers like Dashlane and Roboform, were created to address the issue that passwords are a notoriously poor form of security. People tend to use weak, easy-to-remember passwords, re-use passwords across a multitude of accounts, and forget to change their passwords often enough (if at all). LastPass’ solution allows its 76 million users to only have to remember one strong master password, which is used to access all individual account logins and passwords stored by LastPass in encrypted user vaults.

LastPass says it discovered and blocked “suspicious activity” on its network on Friday. Further investigation revealed that email addresses, password reminders, server per user salts (data added to passwords to make them harder to crack), and authentication hashes were all compromised. The good news is that no accounts were compromised, and attackers didn’t gain access to encrypted user vault data (which would include all users’ individual account logins and passwords stored by LastPass).

Because of its strong encryption methods, LastPass says that the compromised encrypted master passwords will be very difficult to crack, as long as users created strong master passwords. “We are confident that our encryption measures are sufficient to protect the vast majority of users,” Siegrist said in his blog post.

LastPass employs per user salts, which means an attacker would have to attempt to crack each encrypted master password individually. ”Further, because a user’s password is hashed thousands of times before being sent to LastPass, and is again hashed 100,000 times before being stored, guesses can’t be done at significant speed,” LastPass press contact Erin Style explained via email.
Even so, LastPass is recommending that all users change their master passwords and set up two-factor authentication. Those with weak master passwords or those who re-used the master password on other sites should change their passwords immediately. LastPass says it’s not necessary to change the individual passwords of accounts stored in LastPass as this encrypted data was not accessed. As a safety measure, LastPass will require that anyone who logs in to their LastPass account from a new device or IP authenticate via email, unless the user already has two-factor authentication.

LastPass refused to comment on the timing of when the breach first occurred or what kind of attack method was used, as LastPass’ investigation is still ongoing with the help of federal authorities and third-party experts.

http://www.forbes.com/sites/katevinton/2015/06/15/password-manager-lastpass-hacked-exposing-encrypted-master-passwords/

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

Millennials in the Workplace – a Digital Generation

 

Millennials collaboratingLike it or not, the world is changing far faster than we can imagine.  If you’re like me and you’re a business owner over 30 (or over 40, to be honest), you’ll be surprised to learn that the employees you hire are approaching work in a fundamentally different way than you think of it.

As an owner of a mid-sized company, I initially fought this,  I thought I was right.  I thought “there is something wrong with these kids entering the workforce”.  Then I watched my staff, looked at the new hires, and it dawned on me.  Helicopter parents creating a sense of entitlement, growing up with essentially no significant unfulfilled needs due to a long-running economic expansion, and an unprecedented access to immediate information at their fingertips via multiple avenues (Newspapers and TV giving way to computers and laptops, smartphones morphing into tablets, and now the latest iteration which is the union of the two, a “Phablet”).  On it’s way are smart watches that integrate your phone into a far more convenient onramp to the resources available on the Internet.   And then it started to finally sink in; all these things have created a fundamental change in the way employees think, both on the job as well as how they interact in their personal lives.  If I didn’t adept both my hiring, onboarding, and management of employees I was going to lose a competitive edge.

Think about it.  How do you want to grow over the next 5 years, and what kind of employees will help you take it there?  For myself, information about how to run a better company requires a new approach.  Think about it – Millennials in the Workplace – a Digital Generation… are you ready?

Take a look at these statistics, they may surprise you.

 

 

 

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

5 Signs You Need New Tech (and How to Pick the Right Tools)

5 Signs You Need New Tech

5 Signs You Need New Tech (and How to Pick the Right Tools)

Does your business need to update its technological tools? You may be hesitant to make a switch, especially if you’ve become accustomed to your current system, but if you don’t have up-to-date solutions that can make your operations more efficient, you may be wasting your already limited time and resources.  Here are 5 Signs You Need New Tech (and How to Pick the Right Tools).

“Using the latest technology to better run your company is what gives many business owners a competitive edge while giving them more time back with their families,” said Jamie Sutherland, U.S. president of online accounting software provider Xero. “As we head into 2015, it’s a perfect time to reassess how you can switch to the latest business apps and online tools to work smarter so you can spend more time doing what you love.”

To help business owners decide whether they should invest in new tech solutions, Xero created a list of five scenarios that could indicate the need for an upgrade. If any of the following apply to you, it’s a sign that your business could use a tech overhaul. [How to Choose the Right Technology for Your Small Business]

There’s no separation between your work and personal life. Small business owners are often expected to work around the clock to keep their businesses moving, but that doesn’t mean there’s no place for work-life balance. There are numerous apps, Internet phone systems and email organization programs available to reroute incoming work communications when you need time for yourself.

Your accounting system is a spreadsheet — or worse, a shoebox of receipts. Local spreadsheets with numerous tabs and file versions may not be the most effective way to keep track of your business finances, especially if you’re always on the go. Cloud-based financial tools give you less of a headache when tax season rolls around and make it easy to manage your data from wherever you are.

You don’t have time to successfully run all the different aspects of your business yourself. Business owners often serve as the entire C-suite for their company. If you find yourself spread too thin and spending too much time on marketing, accounting or HR tasks, consider automated solutions to help streamline these processes and make your role more effective.

You can’t keep up with social media. Most small businesses know how important social media is to building their brand, but many can’t seem to find the time to give it the attention it needs. Social media monitoring tools can help you track brand mentions, respond to customers and get a streamlined view of social conversations around your business.

Your business is growing rapidly. If your business has experienced significant growth recently, there’s a good chance that the tech solutions you started out with no longer serve your needs as effectively as they did when you were a two- or three-person company. Whether you’ve had employee growth, expanded your business services or introduced new apps that need to be synced, re-evaluate your existing software and make sure its capabilities align with your company’s trajectory.

Though you may recognize the need for a technology update, selecting the right tech solutions for your business isn’t always an easy task. Keith Tanaka, vice president of small business tech support provider Digity, said small business owners have two major factors working against them in this process: They have too many other responsibilities and tasks to effectively focus on choosing a technology, and perhaps more importantly, they aren’t necessarily technology experts.

“Since small business owners wear so many hats, they may not have the time to learn and think strategically about technology,” Tanaka told Business News Daily. “Sometimes they know how they want the technology to work for their business but don’t understand how to make that actually happen. They may be great at accounting, cooking, insurance, real estate, dentistry, etc., but technology is its own function completely.”

Tanaka noted that business owners tend to make the mistake of choosing the first and/or least expensive solution they find, just to get the purchase out of the way. He said that the problem with these approaches is that you may not have done enough research to fully understand whether the solution is right for your business needs, or whether it can be easily implemented. If it isn’t, you’ll end up wasting more time and money in the long run.

“Business owners should always think carefully and critically about the problem they are trying to solve,” Tanaka said. “In some cases, they try to either build the solution themselves or take some existing tool and spend hundreds of hours customizing it. With so many tools built to help small businesses, chances are that the solution they’re dreaming of already exists somewhere.”

In addition to conducting thorough research on potential technology solutions, make sure you read customer reviews and ask for direct feedback from other business owners and tech experts before making a final purchase decision.

“There’s no shame in asking for help,” Tanaka said. “Business owners should seek advice from their peers and from industry experts. A good technology adviser can do a lot to help a business streamline its operations.”

Originally published on Business News Daily.

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

Is the iPad Useful as a Mobile Computing Device for Businesses?

Some businesses have jumped on the iPad wagon and are finding creative ways to use the iPad as a mobile computing device. For example, the Global Mundo Tapas restaurant in Sydney, Australia uses the iPad as an interactive menu. There’s a budget airline, Jetstar Airways, using the iPad for in-flight entertainment, rented for $10 a flight. A luxury sedan by Hyundai comes with an iPad instead of a user manual. Other than these extreme cases, how can an iPad be used to increase productivity or convenience by the average business owner?

Conventions and Workshops

Do you travel to conventions and workshops for your business? Many people bring their laptop to these events. While laptops are of course very convenient compared to a desktop pc for traveling, the iPad weighs less and could be even more convenient if you’re traveling from room to room at a convention or workshop. These events are also often designed for networking – so you’re not just sitting at the table all day, glued to your laptop. The smaller, 2 pound iPad could be slipped into your purse or a small bag while you walk around the room, or even carried in your hand for easy access as needed, but without being cumbersome.

Flights and Traveling

It’s true a laptop can go on a flight with you, but even the smaller netbooks and laptops add to the weight of your carry on bags and can be frustrating when in the small seats of the plane. If you’re sitting in coach, you know every time the person next to you has to get up to use the bathroom you’re trying to balance the laptop and whatever else you happened to have out in your hands with turbulence knocking you around the aisle. The iPad could be slid into the pocket of the seat in front of you if you have to get out of the way for the passenger next to you – it’s about the size of a magazine.

The same holds true on trains, in taxi cabs, or as a passenger in someone else’s car. Just don’t try to use your iPad while driving, yourself.

Presentations & Sales

Do you travel to client offices to give presentations? How sleek would it be to whip out your iPad and give a sales presentation or demonstration? Apple reports that iPads can connect to the majority of projectors, so you could even broadcast that presentation over a large screen for a larger audience if necessary.

Replace Your Briefcase

Sure, the iPad has a word processor and spreadsheet. Those are always useful for business people. It would be much more convenient to read and edit documents on an iPad over your iPhone while on the road.

But what about the stack of magazines and newspapers you lug around with you in your briefcase? You could have all of your reading materials ready for you on the iPad and skip the briefcase. Use it as an ebook reader, newspaper subscription, and file storage and you’ve literally got everything at your fingertips. With the use of third party Apps, there’s little you can’t do with the iPad for as a mobile computing device for your business.

Click here to learn how Central Florida Technology can help you get the most out of your iPads, Smartphones and other mobile devices with our Mobile Computing Services for your business in Orlando, FL and surrounding cities.

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

Password Strength is Key in Business and Personal Information Security

In today’s technologically driven business marketplace one of most often overlooked points of vulnerability to your business and personal information security is the strength or weakness of the passwords that you define for usage when logging into: your computer network, email provider, online banking, accounting or payroll applications. To underestimate the importance of strong passwords is to leave the door wide open to identity theft and corporate piracy. Your passwords must be a robust combination of all the characters that are available, must be unique for different applications and must not be a word commonly found in any dictionaries, in any language.

How do you maximize your business and personal information security?

We have been conditioned to use weak passwords. For many people the first password we ever needed was for our ATM cards. If this is the case we were limited to the numerals on the keypad 0-9. That simply will not cut it anymore. Malicious computer deciphering programs can run through all of the possible combinations in a matter of seconds. The same types of programs can run through all of the words in the dictionary, plus most common names, in multiple languages even spelled backwards, in a matter of minutes. You cannot have the same password for all of your password needs; if that one password was to get compromised then all of your sensitive private data would be at risk.

How do you come up with strong passwords that you can actually remember, without writing them down where they could be easliy found and used to cause you or your business harm?

A good method is to come up with a phrase that is meaningfully unique to you, and therefore it will be something you will be likely to remember. For example: “I love muscle cars and custom motorcycles” or “Ping golf clubs are my favorites”

Use the first or last letter of each word to create a string or characters, from the example above: “I love muscle cars and custom motorcycles” I could come up with: “Ilmcacm” or “Iemsdms”

Replace one or more of the characters with its numeric position in the alphabet or a special character as in: Ilm3a3m or Ilmc@cm

Add a suffix or prefix to make it unique to each application that you will use it for.

  • For my Yahoo email I could use: YeIlm3a3m
  • For my Chase bank account I could use: CbIl3ma3m

Make sure that your each unique string of characters is at least eight characters long.

Now that you have a strong passwords, that last thing you need to worry about is using them wisely.

Do not write them down on a sticky note and put them under your keyboard or behind your monitor. Do not store them in the file system of your computer.

Do not use your passwords on computers that have open access to the general public, such as those found in Internet cafes, airports or mall kiosks.

Do not enter personal information such as your user names and passwords on unsecured websites.

Do make sure that the computer terminals that you use your passwords on have up to date anti-spyware and anti-virus applications.

Click here to learn how Central Florida Technology can help you strengthen your business and personal information security with our Network Security Services for your business in Orlando, FL and surrounding cities.

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

6 Password Tips to Protect Against Business and Identity Theft

Ah, those pesky passwords. If you work in the corporate world or in an office, you have one for your PC/Network and, unless there is a password synchronization application that combines them, you probably have more than one for other applications. Add those to the ones that you have for your home Internet, your banking and other websites that require passwords, and before you know it you have a nightmare on your hands in trying to manage them. How easy a target are you for business and identity theft?

Part of the frustration has to do with the different requirements for password formatting. Some systems only require four characters, some require eight. Some need a combination of alpha and numeric characters and others do the same with the addition of a few capital letters thrown in for extra security. It can be positively maddening.

The worst thing you can do with your passwords is to place them in a text document which can be accessed on the hard drive of your computer. Your files are vulnerable to business and identity theft- even if you think they are not. If someone is intent on finding them, they can. Even if you place them into a password protected document, those can be cracked, too.

Writing them down has its own vulnerabilities, too, and there are varying opinions on this practice. If you do write them down on a piece of paper, put the document in a locked location whether it is in your home or at work.

Here are 6 tips on how to handle your passwords to protect against business and identity theft:

1. Make them complex. People who use easy to remember or short passwords are inviting disaster. Use a little imagination and pick a password that is very difficult to attach to your life. Stay away from birth dates, phone numbers, house numbers, or any other number that is associated with your life.

2. Keep passwords unique. When you change your passwords, make them unique from each other. Do not use the same password on all of your sites. If you do, then you are open to having every site that you have a password to being vulnerable to hackers to log on and steal your identity, money or destroy your reputation.

3. Be obscure. Use a combination of letters, numbers, capital letters and special characters if possible. The more you do this, the more secure your passwords will become. Create an alphanumeric version of a term you can remember. Using this technique the word “Spaceship” becomes “Sp@ce5h!p”.

4. Change regularly. This is the singular tip that can save you if you do not heed any of the other tips. How often should you change your password? How secure do you want to be? The frequency with which you change your password will determine how secure you are from becoming a victim. The more often you change it, the better you are. The longer you leave it the same, the more vulnerable you become. Three months is a good cycle for a password, but certainly if you fear for the security of your identity, then a monthly change is not out of the question.

5. Password-protect your PC. Be sure to give your PC a password on power-up. This will help protect your files unrestricted access to your PC.

6. Password-protect your wireless home network. If you have a wireless home network, be sure to password protect it as well. Use the same principles above in order to secure your wireless network. This will prevent others from accessing your connection and using it maliciously to hack the personal or business PCs and laptops you and your family use at home.

Finally, there are password programs that can help with this important task, but the best advice is to start with the tips above right away. Password software can be useful as an organizational tool, but it is no match for using sound methods to manage and make your passwords difficult to crack.

Click here to learn how Central Florida Technology can help protect you against business and identity theft with our Network Security Services for your business in Orlando, FL and surrounding cities.

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

Remaining Innovative Is a Key to Business Growth

Whether you are launching a start-up, or several years into operating your business, you need to continue to maintain an innovative mindset that will allow you to creatively fuel business growth. This means exercising your creative thinking skills in order to develop and explore new ideas, opening the doors to new and better opportunities. In order to foster a creative mindset, here are some tips to help you stay on the cutting edge of thought innovation:

Ask Yourself More Questions

When you first started your business, you were likely inclined to thoroughly consider your short and long-term goals, as well as create lists of what steps were needed to accomplish those business growth goals. These steps were an important part of your business plan, and they were important for a reason. Asking yourself tough questions that you were forced to answer honestly help you make the critical business decisions during your business’ start-up. As time goes on, it is just as important that you continue to ask yourself relevant questions about your goals and brainstorm new ideas daily about how to accomplish those goals.

Brainstorming ideas is not just limited to marketing or sales tactics. Consider how to handle physical growth as well as innovative ways to handle current issues that have arisen since the business opened, such as customer service and personnel issues.

Get Reviews

The one clear way to understand how your customers feel about you is to ask them. Getting customer feedback from the people who actually do business with you is invaluable in finding out what is working for them and what is not. For the most objective feedback, develop the ability to conduct regular customer surveys anonymously. Be innovative and use your creative mindset to identify what kind of questions to ask your clientele and customers to get the information you need to improve. And don’t use the same old survey time and again. Update your questions and craft them so that your customers perceive their feedback is important to your business. Not only are your customers’ responses important to your business growth and improvement; you should also continually research what your competition’s customers are saying online about their services and your industry as a whole. This kind of information can be found on blogs and online forums.

Compile and Add to your Network List

Sure, you may have a few business cards you’ve collected that can be helpful to promote your services through other complimentary businesses, but if you are only sticking with those few resources, you are certainly limiting your potential. You should always be networking and adding to your promotional resources to fuel business growth. Do not limit yourself to in-person events, either. Social networking sites are among the fastest growing ways to network these days, and other online resources such as blogs can be effective places to find out what people are looking for and what you might be lacking to provide in your business.

Be consistent in your promotions – don’t sign up for social networking sites and then fail to use them. Plan your messaging ahead of time and implement those services into your daily marketing routine. Creativity comes into play when you develop your keywords, write eye-catching posts that include interesting tidbits to help create a solid social network. Staying on the cutting edge of what’s new and leveraging these opportunities creatively can seriously change the direction of your business. This is also true about simply listening to your customers and taking proactive action based on the information you learn. Educating yourself about what can make your business better is only half the battle. You have to brainstorm ways to be innovative in the ways you make this information work for you to achieve your business growth goals.

Click here to learn how Central Florida Technology can help you achieve your business growth goals through technology with our Technology Consulting Services for your business in Orlando, FL and surrounding cities.

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

The High Cost of Recovery from a Security Breach

Small to medium size businesses are what keep this country moving. Unfortunately, for many of these business owners, budgetary needs force them to make cuts that the mammoth corporations do not have to consider. These budget cuts can often result in reduced security and sub par IT services that in the long run can end up costing the company even more money. Reacting to; and the recovery from, a security breach or attack always costs more after it has happened than what it would have cost to prevent it.

This fact has been supported by recent surveys, and may come as a surprise to many small and mid-size companies who are under the false impression that hackers and other security threats target larger corporations. It has been discovered that companies that have less than 500 employees are actually more likely to be at risk of an attack or security breach than a larger corporation. Of course, this becomes a problem when the larger corporation has the resources to maintain higher levels of security at a time when smaller companies are dealing with restricted or; in some cases, frozen IT budgets.

The benefits of hiring a Managed IT Services Provider in preventing attacks and security breaches

With a security breach a real concern for small business owners, many are making the decision to bring on outside providers to address their IT needs. Managed services providers can offer an affordable solution to small business owners who are struggling to manage an internal IT staff. In some cases there isn’t even an IT person on staff, which can be just as costly for the small business when they have to bring in a professional on an as needed basis. Considering the money and time spend recovering from a security attack or breech, more business owners are realizing the cost of not having this level of protection is too high to pay. Here we look at how managed services providers can help business owners level the playing field against those who would infiltrate their security systems.

  • Increased knowledge- Managed services providers are in the business of technology. They have trained staff who are able to prevent security breeches and spot any activity that could be perceived as a threat. Moreover, they have the expertise to stop threats and prevent the loss of sensitive and private information that can lead to costly recovery measures.
  • Less expensive than in-house IT- Other IT professionals can provide the same security but it will cost much more to the business owner. What many owners are realizing is paying a flat monthly fee for security and other services provided by msp’s is actually much more cost effective than paying an internal IT staff or outsourcing based on incident.
  • Proactive is better than reactive- The biggest benefit of having a quality managed services provider in your corner is the fact that you are acting in a proactive manner to ensure all of your systems are managed properly. This is less expensive and less time consuming than waiting for something bad to happen and then reacting.

Any small business can benefit from the security provided by a Managed IT Services provider. They can do so at a fraction of the cost, therefore eliminating the fear and unnecessary cost of trying to recover from a breech in security or attack.

Click here to learn how Central Florida Technology can help you prevent attacks and security breaches with our Network Security Services for your business in Orlando, FL and surrounding cities.

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

Computer Backup Solutions – All Systems Go?

The subject of computer backup solutions has always been a topic of importance when it comes to preserving the data on your computer. These days there are more options available to you in this arena, which can be both a help and a hindrance. On one hand, having more options is helpful because better solutions have been brought to the marketplace from which you can now choose to fit your needs. A hindrance exists in that the multitude of choices might scare off users and cause them to avoid the issue altogether, which can have a disastrous ending.

It does not have to be complicated nor time consuming, so there is no good reason not to tackle backing up your computer.

The Philosophy

We all know that backing up can preserve the information that is stored on your computer, but how far do you take your backup philosophy? It depends on what you can ‘afford’ to lose.

To one computer user, just backing up periodically will suffice. The thought here is that if you lose your data, you can restore it apart from your operating system, and the time that this takes is not a critical consideration. Many home users fall into this category. It makes sense as long as you are not dependent upon your computer for time-sensitive applications and tasks and/or for accessing and retrieving data relative to finances, etc.

To another user this philosophy is not enough. Those who depend on their data and computer for more than just casual personal computing understand that if a hard drive fails, their business is down until they can get it back up and running again. Home users who store irreplaceable photographs and home video on their computers will also fall into this category. A more comprehensive backup plan is recommended to help recover from disasters in a timely fashion.

Computer Backup Solutions Options

There are several ways to tackle backups of your important data:

Built-in operating system options. Microsoft Windows operating systems provide built-in back up capabilities that allows you to back up your documents or files onto external media. Beginning with Windows XP and its Automated System Recovery feature, each successive Microsoft desktop operating system includes the capability to help recover your entire hard drive if necessary. These backup solutions are reliable and provide a built-in way for you to back up your data without having to buy an additional program to do so.

Manual copying onto external devices. You can always resort to the old stand-by method of backing up by manually copying your data onto an external hard drive, USB memory stick or other external device such as a recordable CD, DVD or even a floppy drive if you have one. This is cumbersome, but if you do not have a lot of files, it may be an acceptable solution for you. The pitfalls with this method are that if you have multiple files, you have to make sure you get all of them, and you may need numerous target media to save all of your files to.

Online options for backing up over the Internet. The newest option in computer data backup solutions is provided by online companies that enable backup and restoration of your documents and files over an encrypted high-speed Internet connection to any PC. A small background application backs up and transfers your files to a hosted storage area in a remote datacenter when your computer is idle; however, this is not a comprehensive disaster recovery solution for your entire hard drive. This solution works best when targeted at protecting individual files and documents on a PC or a Mac, and is generally a subscription-based service for which you pay a monthly fee for use.

Making an image of your hard drive. This is a more comprehensive backup and disaster recovery solution generally performed by technically savvy computer users. This option includes using 3rd-party programs to make an image of your entire hard drive, which can then be “re-imaged” in case of catastrophic failure to a new hard drive, providing a hard drive disaster recovery plan. Using this solution, within a short period of time, you can be back up and running with ALL of your documents, settings, programs and EVERYTHING intact, as if the disaster never occurred.

The way to determine the best solution to fit your needs is to ask yourself how soon you need to be back up and running after encountering a disaster, and how much you are willing to pay. If you can wait several days, then a computer back up program might be right for you. If you need your data files immediately, and you have a second computer that you can copy them to, then an online solution might be the best way to go. Or finally, if your business depends upon your computer and its applications and data, then you must have a more comprehensive solution.

Click here to learn how Central Florida Technology can help you protect your critical business data with our Remote Data Backup and Storage Solutions for your business in Orlando, FL and surrounding cities.

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

Creating a Business Continuity Plan For Your Small Business

Is your business prepared for any type of disaster? Even though small businesses may not have as many employees or as much equipment, they are still as vulnerable to disaster as a large corporation. If your business office were to be destroyed by a tornado, you could lose valuable business if you don’t plan ahead. Many businesses don’t want to take the time and the expense to prepare a business continuity plan, but can you really afford not to make one?

Make a List of All Possible Disasters

The best place to start is to list different types of disasters and try to determine what could be lost in each case, and what you can do to prevent that loss. A flood will require different strategies from a power outage or a fire. Next, try to estimate how long it would take, and how much it would cost, for you to get your business up and running again.

Communication

The middle of a crisis is not the time to frantically search for phone numbers. Even small businesses need emergency contact numbers. Have all emergency contact numbers posted or programmed into every phone. Do you have an alternate mode of communication should your main phone lines shut down? Could your clients seamlessly contact you without ever knowing that your office was in the middle of disaster recovery? The same principal applies to email and fax. Making arrangements regarding communication are critical to keeping your business running smoothly. Communicating with staff and clients can mean the difference between complete shutdown, or minimal a business interruption.

Preserving Your Data

In the event of a disaster, it is important to know that everything you need to function as a business is available. Identify all vital systems, documents, and data. While it is important for every business to backup their data on a regular basis, what if a fire destroyed your office? For this reason, offsite storage is critical to preserving your business’ valuable information. Offsite data storage allows to access to all of your stored data from any computer and from anywhere in the world.

A Temporary Worksite

It is also important to plan for a temporary worksite. Depending on the goods or services your business offers, can you continue smooth operation if your office is shut down? Storing products in a second location can allow you to maintain your regular business schedule.

Test Your Plan

One of the keys to successful disaster recovery is testing your business continuity plan on a regular basis. It is important that you and your staff know exactly what to do, where to go, and how to access the necessary items you need to keep your business running smoothly to the outside world, even if you are standing in the middle of a disaster. Schedule regular plan tests to ensure that everyone in your office is on the same page and ready should disaster strike. Hopefully, you will never have to use your business continuity plan, but it is smart business to be prepared for any emergency should one arise.

Click here to learn how Central Florida Technology can help keep your business running in the event of disruption or disaster with our Disaster Recovery and Business Continuity Planning Services for your business in Orlando, FL and surrounding cities.

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →
Page 1 of 2 12