{"id":3109,"date":"2022-07-18T14:28:15","date_gmt":"2022-07-18T14:28:15","guid":{"rendered":"https:\/\/www.data-talk.com\/?p=3109"},"modified":"2023-06-20T15:54:53","modified_gmt":"2023-06-20T15:54:53","slug":"are-you-prepared-business-continuity-and-disaster-recovery","status":"publish","type":"post","link":"https:\/\/www.data-talk.com\/are-you-prepared-business-continuity-and-disaster-recovery\/","title":{"rendered":"Are You Prepared? Business Continuity and Disaster Recovery"},"content":{"rendered":"\n<p>From ever-changing cybersecurity risks to the need to now plan for business resiliency in<br>the face of a global pandemic. Not having a plan is no longer an option. You have worked<br>hard to open your business and keep it running and losing it to a disaster would be financially<br>devastating for you \u2014 and your employees.<br>The following guide can help you to determine what you need to include in your plan to make sure<br>your business is sufficiently protected and can quickly recover from current and future threats.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Make a list of all your physical business assets that could be lost in a disaster. This list<br>should include:<br>\u2022 Building(s)<br>\u2022 Equipment<br>\u2022 Furniture<br>\u2022 Vehicle(s)<br>\u2022 Product inventory<br>\u2022 Cash<br>\u2022 Financial, customer and other operational data<br>\u2022 Physical documents<\/li><li>Identify Risks. Determine which types of threats can damage or destroy your assets or<br>significantly impact your business operations. Some of the following may not affect your<br>area, but any that could impact your business operations should be considered.<br>\u2022 Earthquake, tornado, tsunami, or hurricane<br>\u2022 Pandemics<br>\u2022 An electrical surge or outage<br>\u2022 Fire<br>\u2022 Hacking, viruses, and other cyber attacks<br>\u2022 Rain and flooding<br>\u2022 A spill of hazardous substances<br>\u2022 Terrorism<\/li><li>Determine the steps you will take to protect your assets from disasters. Take each<br>threat and each asset, then analyze how you can prevent or prepare for the various<br>disasters that might affect those assets.<\/li><\/ol>\n\n\n\n<p>Personnel<br>Employee safety should be the top priority of your disaster plan. Create a plan for<br>the protection\/evacuation of your employees during natural or man-made events<br>that could affect their safety.<br>\u2022 Assign and train employees, based on their skills, to be prepared to take specific<br>actions in the event of a physical threat.<br>\u2022 Bring in a professional to train a number of employees to perform CPR and other<br>first-aid measures.<br>\u2022 Determine escape routes and safe areas employees should use, depending on the<br>type of physical threat.<br>\u2022 Post a plan of these routes in a prominent place so employees are reminded of<br>them and can know them instinctively.<br>\u2022 Include instructions for turning off utilities such as gas, water, and HVAC systems.<br>\u2022 Assign individuals to help ensure that an escape or safety plan is implemented<br>properly.<br>\u2022 Practice this plan and make sure new employees are trained on it as part of their<br>orientation.<br>\u2022 Post emergency phone numbers for police, fire, poison control, etc.<br>\u2022 Add safety equipment \u2014 including first aid kits, Automatic External Defibrillators<br>(AEDs), fire extinguishers, smoke detectors, and shelter-in-place supplies \u2014 to your<br>facility.<br>\u2022 Maintain an emergency personnel file on each employee with important medical<br>data, and names of emergency contacts.<br>\u2022 Develop a plan on how to continue operations in the face of a widespread outbreak,<br>keeping in mind the potential need to shut down physical locations.<br>Physical Assets<br>Meet with your insurance provider to understand what is and is not covered in the<br>case of various types of disasters.<br>\u2022 Determine the cost involved in expanding coverage to make sure your assets are<br>insured in case of each type of loss.<br>\u2022 Make copies of important printed documents \u2014 such as deeds and other legal<br>documents \u2014 and put the originals in a safe deposit box at your bank.<\/p>\n\n\n\n<p>\u2022 Take photos of all physical assets, put them on a CD, DVD, or flash drive,<br>and store it in your safe deposit box. Businesses that have an inventory of their<br>belongings, with pictures, typically receive higher insurance payments from losses<br>and receive them faster.<br>\u2022 If your business is in an area threatened by severe natural storms, consider making<br>building enhancements so your building(s) can better withstand these threats.<\/p>\n\n\n\n<p><br>Data<br>The financial, customer, and operational information on your network is the heart of<br>your operation. Ensuring that it cannot be lost is the best action you can take to<br>quickly get your operation up and running again.<br>Moving your operations and data to a cloud service provider not only protects that<br>data in case of a disaster, but can also significantly enhance the productivity,<br>collaboration, and functionality of your business.<br>Cloud services, such as Intermedia, offer business services \u2014 including hosted<br>Exchange, Hosted PBX, Securisync\u00ae, and AnyMeetingTM \u2014 that let you<br>communicate, collaborate, manage content and run your business applications.<br>Today&#8217;s highly mobile environment, with employees accessing data from their PCs,<br>smartphones, and tablets, makes that access easy, yet keeps your data safe and<br>secure and away from your physical location so it&#8217;s not affected by any natural or<br>man-made disaster.<\/p>\n\n\n\n<p><br>Getting Help<br>There are several governmental and charitable agencies ready to help in times of a<br>disaster. The Small Business Administration is prepared to assist, with programs such<br>as their National Response Framework (NRF), National Disaster Recovery<br>Framework (NDRF), and Disaster Loan Making (DLM) process. Their Disaster<br>Oversight Council\/Executive Management Team oversees the direction and support of<br>the disaster loan process during disasters and coordinates DLM and continuity of<br>operations (COOP).<\/p>\n\n\n\n<p><br>By addressing all the above issues in your plan, your business can prevent damages from<br>some possible threats, be better prepared for other disasters, and be in a position to quickly<br>get your operations back up and running when issues do arise.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From ever-changing cybersecurity risks to the need to now plan for business resiliency inthe face of a global pandemic. Not having a plan is no longer an option. You have workedhard to open your business and keep it running and losing it to a disaster would be financiallydevastating for you \u2014 and your employees.The following [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4],"tags":[],"class_list":["post-3109","post","type-post","status-publish","format-standard","hentry","category-ideacom-insights-newsletters"],"_links":{"self":[{"href":"https:\/\/www.data-talk.com\/wp-json\/wp\/v2\/posts\/3109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.data-talk.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.data-talk.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.data-talk.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.data-talk.com\/wp-json\/wp\/v2\/comments?post=3109"}],"version-history":[{"count":1,"href":"https:\/\/www.data-talk.com\/wp-json\/wp\/v2\/posts\/3109\/revisions"}],"predecessor-version":[{"id":3110,"href":"https:\/\/www.data-talk.com\/wp-json\/wp\/v2\/posts\/3109\/revisions\/3110"}],"wp:attachment":[{"href":"https:\/\/www.data-talk.com\/wp-json\/wp\/v2\/media?parent=3109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.data-talk.com\/wp-json\/wp\/v2\/categories?post=3109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.data-talk.com\/wp-json\/wp\/v2\/tags?post=3109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}