094 90 48200     Get SUPPORT

Aniar IT Services Blog

Business Continuity Includes Preparing for Death

Business Continuity Includes Preparing for Death

It’s never an easy thing to talk about, but it does need to be talked about. If one of your key employees were to pass away, how would it affect your business? How do you prepare for this type of inevitability?

We talk about Business Continuity a lot. Usually when we discuss it, we’re talking about backing up your data or having a plan in place to bounce back after a major disaster were to happen.

For example, if a fire were to take out your server room, what steps have you taken to prepare for it, and how quickly can you be back up and running?

The answer should be something like this:
We have our data backed up to an internal device in the server room. We can always rely on that, provided that the backup device remains operational. In the event that the backup device suffers from the disaster, we also back up our data in the cloud. The restore is a little more complicated, but we can manage for a few days from the cloud-based backup while new infrastructure is installed onsite.

That’s a really solid answer, and that is something that we specialize in helping County Mayo businesses achieve. However, that’s your backup strategy. That’s just a small part of your overall business continuity. That data backup is a real lifesaver when it comes to a physical disaster, but what happens when the disaster is a loss of life, or incapacitation, or even just a key individual suddenly walking out the door?

Let’s Look at a Scenario

Let’s say Bob is the business owner. He makes all of the decisions, he signs the contracts, he pays the bills. If Bob gets sick or suffers a stroke and becomes incapacitated, who takes over until he recovers? If Bob’s son works for the company, does the son have legal authority to take over?

We’re covering a lot of ground here, but technically, only the courts can intercede and make these types of decisions if it isn’t properly prepared for. You might run into a scenario where the court will choose someone to run the business temporarily while it is decided what to do next. This process can be slow, and the outcome might not be ideal.

If Bob establishes an Estate Plan, he can pick a successor to have legal authority to run the business. The Estate Plan should include a Revocable Living Trust and Powers of Attorney.

Let’s take a moment here to admit that we are not lawyers, and not offering professional legal advice, and that you should consult your lawyer before making any legal decisions. 

On top of all of this, you’ll want the family of the incapacitated business owner to maintain its lifestyle while keeping the business chugging along.

Business Continuity is About Smooth Recovery

Just like how we always recommend a backup device that can restore data quickly without a lot of overhead, the rest of your business continuity plan should cover a broad enough range of emergencies to enable the business to stay afloat during the toughest tides.

That plan should include taking a significant person or role out of the loop and continuing to operate normally. That may require thorough documentation and training for other capable employees before something bad happens.

Does your business continuity plan, or Emergency Action Plan (EAP) clearly cover this? If you would like to have a deeper conversation about business continuity, please reach out to us at Aniar IT Services to set up a call.

The Three Key Steps to Stop Malware
A Brief Look at Emerging Technologies


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, January 19 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Productivity User Tips Email Innovation Workplace Tips Hosted Solutions Microsoft Hackers Network Security Internet Google Data Tech Term Data Recovery Hardware Data Backup Software Efficiency Smartphones IT Support IT Services Windows 10 Managed IT Services Communications Communication Cloud Computing Business Cybersecurity Mobile Devices Malware Gadgets Android VoIP Computer Small Business Mobile Device Users Backup Collaboration Artificial Intelligence Smartphone Phishing Network Internet of Things Saving Money Business Management Outsourced IT Server Windows Browser Miscellaneous Upgrade Spam Business Continuity Facebook Information How To Router Office 365 Social Media BDR Managed Service Chrome Paperless Office Holiday Word Cybercrime Applications BYOD Windows 7 Passwords Computers Data Storage Save Money Microsoft Office Telephone System Ransomware Vulnerability Connectivity Operating System Money Display History Encryption Infrastructure Mobile Device Management Quick Tips Data Breach Two-factor Authentication Remote Monitoring Staff Blockchain Settings Data Security Apps Data Protection Patch Management Social Engineering Avoiding Downtime Identity Theft Servers Spam Blocking Comparison Big Data Vendor Website Bring Your Own Device Help Desk Google Docs Access Control IT Management Digital Signage Law Enforcement Sports Machine Learning Cryptocurrency Telephony CES App Scam Training Managed IT Fraud Meetings Software as a Service Google Drive Business Intelligence Processor Human Resources Update Content Management Keyboard Wi-Fi Botnet VPN Networking Password Private Cloud Bandwidth IT Plan Disaster Recovery Virtual Assistant Managed IT services OneNote Augmented Reality Government Redundancy Voice over Internet Protocol Automation Virtualization Unsupported Software Telephone Systems Education Hacker Health Start Menu GDPR HIPAA The Internet of Things USB Frequently Asked Questions Recovery Bitcoin Wireless Charging Inventory Password Management Social Sync Multi-Factor Security Cables Trend Micro Criminal Computer Fan Firewall Procurement Data loss Business Mangement Smart Tech Software Tips MSP Net Neutrality Millennials Digital Signature Bing WiFi OLED Using Data Employee Remote Computing Electronic Medical Records Wire Entertainment Warranty Excel Batteries Google Apps NIST Default App Shopping FENG Addiction Unified Threat Management Employee/Employer Relationship Online Shopping Cortana Alert Biometric Security Information Technology Gmail File Sharing ISP Value Workforce Virtual Machine Credit Cards PDF HVAC Flash Workers Compliance Specifications Windows Server 2008 R2 Data Management Printer Tip of the week Virtual Private Network Trending IT Infrastructure Social Network Mobile Computing Evernote Cleaning Manufacturing Computing Recycling Solid State Drive Devices Wireless Cryptomining Hypervisor HaaS Windows 10s Authentication Google Search Downtime YouTube Mouse Windows Server 2008 Remote Workers Safe Mode Security Cameras Investment Printing Cache Smart Office HBO Practices Screen Mirroring Virtual Reality Professional Services eWaste Audit Thought Leadership Physical Security Remote Worker Database Telecommuting Vendor Management Amazon Employer-Employee Relationship Shortcuts Save Time Hard Drive Root Cause Analysis Microchip Computer Care Managed IT Service Smartwatch Skype ROI Personal Wireless Internet Document Management Camera Outlook Project Management Charger Hosted Computing Cast Mobility Cabling Fiber Optics Legal 5G Wiring Business Technology Travel Remote Work Saving Time Amazon Web Services Accountants Enterprise Content Management Password Manager Public Cloud Nanotechnology Proactive IT Tools Work/Life Balance Search Engine Managed Services Provider Digitize Search Productivity Printers Marketing Twitter Budget Competition Financial Customer Relationship Management IP Address CrashOverride Customer Service Mobile Office Managed Service Provider Domains Hiring/Firing Regulation Windows 10 Fun Public Speaking Presentation Lithium-ion battery Emergency Company Culture Wireless Technology Tech Support Safety Personal Information Hard Drives IBM Managing Stress