It’s that time again, Fort Worth! As a managed service provider, we’re always talking to clients about preparing for disaster, whether it’s a tornado or cyber security attack. Here are some tips to protect your business.
In case you didn’t realize it, we are in the midst of the most likely tornado season. Historically speaking, Texas averages 132 tornadoes a year. They pop up usually between 4 and 6 p.m. and are most frequent NOW (between April and June). Make sure you are prepared with a disaster recovery plan for your business.
Your Tornado Disaster Recovery Plan
No area in Texas is safe from tornadoes. They arrive without much warning, often with devastating results to life and property. Since you live and work in Texas, you already know what to do to protect life and personal property. If not, here’s a refresher.
But what about your business? Your computers and infrastructure? Would they survive a tornado? Or prolonged outages that might follow (remember the Texas freeze)?
Granted, if you get a direct hit and your building is literally swept up and away, that building is gone for good. But that does not mean all your hard work has to be. Here’s how you can protect a large part of it:
- Create a tornado recovery plan starting with an analysis of your needs in the event of a hit, direct or indirect.
- Once the plan is done, test it. Make sure your business can continue once the tornado has passed. Check that everything works as expected.
- Redundancy sites are your business’s lifeline. When we say redundancy, we mean duplicate and even triplicate sources for data storage: clouds and off-site (even out-of-state) locations for servers to host your infrastructure. You don’t want to lose everything in one fell swoop, whether from a tornado, other natural disaster or a cyber threat like ransomware.
- Alert your staff, those in-house as well as remote, on what they need to do to protect the company’s data as well as themselves and their families.
- Test your uninterrupted power supply (UPS) batteries regularly and replace them when needed.
- Monitor servers for predictive failures.
- Update all appropriate software, firmware and drivers so they can be counted on to work when you need them the most.
Here at Aeko, we know how to help in the event of any disaster. So why not contact us or book a meeting for a quick consultation? We work and live in Texas and can help you create and implement the right disaster recovery plan for your business.
Are you aware of the most common cyberattack methods?
Did you know there are over 3.4 billion phishing emails sent every day? Phishing and other cybercriminal behavior are a lot more common than you’d think.
Our free “Phishing, Smishing, Vishing, Pharming? A Cyberattacks Guide” will inform you about cyberattack methods and give you the latest in data security tips.