094 90 48200     Get SUPPORT

Aniar IT Services Blog

Business Continuity Includes Preparing for Death

Business Continuity Includes Preparing for Death

It’s never an easy thing to talk about, but it does need to be talked about. If one of your key employees were to pass away, how would it affect your business? How do you prepare for this type of inevitability?

We talk about Business Continuity a lot. Usually when we discuss it, we’re talking about backing up your data or having a plan in place to bounce back after a major disaster were to happen.

For example, if a fire were to take out your server room, what steps have you taken to prepare for it, and how quickly can you be back up and running?

The answer should be something like this:
We have our data backed up to an internal device in the server room. We can always rely on that, provided that the backup device remains operational. In the event that the backup device suffers from the disaster, we also back up our data in the cloud. The restore is a little more complicated, but we can manage for a few days from the cloud-based backup while new infrastructure is installed onsite.

That’s a really solid answer, and that is something that we specialize in helping County Mayo businesses achieve. However, that’s your backup strategy. That’s just a small part of your overall business continuity. That data backup is a real lifesaver when it comes to a physical disaster, but what happens when the disaster is a loss of life, or incapacitation, or even just a key individual suddenly walking out the door?

Let’s Look at a Scenario

Let’s say Bob is the business owner. He makes all of the decisions, he signs the contracts, he pays the bills. If Bob gets sick or suffers a stroke and becomes incapacitated, who takes over until he recovers? If Bob’s son works for the company, does the son have legal authority to take over?

We’re covering a lot of ground here, but technically, only the courts can intercede and make these types of decisions if it isn’t properly prepared for. You might run into a scenario where the court will choose someone to run the business temporarily while it is decided what to do next. This process can be slow, and the outcome might not be ideal.

If Bob establishes an Estate Plan, he can pick a successor to have legal authority to run the business. The Estate Plan should include a Revocable Living Trust and Powers of Attorney.

Let’s take a moment here to admit that we are not lawyers, and not offering professional legal advice, and that you should consult your lawyer before making any legal decisions. 

On top of all of this, you’ll want the family of the incapacitated business owner to maintain its lifestyle while keeping the business chugging along.

Business Continuity is About Smooth Recovery

Just like how we always recommend a backup device that can restore data quickly without a lot of overhead, the rest of your business continuity plan should cover a broad enough range of emergencies to enable the business to stay afloat during the toughest tides.

That plan should include taking a significant person or role out of the loop and continuing to operate normally. That may require thorough documentation and training for other capable employees before something bad happens.

Does your business continuity plan, or Emergency Action Plan (EAP) clearly cover this? If you would like to have a deeper conversation about business continuity, please reach out to us at Aniar IT Services to set up a call.

The Three Key Steps to Stop Malware
A Brief Look at Emerging Technologies
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, April 02 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Productivity Privacy Cloud Workplace Tips User Tips Innovation Email Internet Microsoft Network Security Hosted Solutions Data Software Hardware Hackers Efficiency IT Support Data Recovery Google Data Backup Smartphones Tech Term Cybersecurity Communications Mobile Devices Communication Small Business IT Services Windows 10 Managed IT Services Business VoIP Collaboration Android Computer Phishing Gadgets Cloud Computing Malware Backup Users Smartphone Outsourced IT Network Mobile Device Artificial Intelligence Miscellaneous Saving Money Windows Business Continuity Business Management Internet of Things BDR Server Upgrade Spam Information Facebook Browser How To Social Media Managed Service Router Chrome Office 365 Windows 7 Blockchain Automation Passwords BYOD Paperless Office Holiday Word Cybercrime Microsoft Office Computers Applications Encryption Data Storage Managed IT Infrastructure Human Resources History Quick Tips Networking Mobile Device Management Bandwidth Disaster Recovery Staff Data Breach Vulnerability Two-factor Authentication Operating System Patch Management Data Protection Save Money Apps Ransomware Telephone System Remote Monitoring Connectivity Settings Money Virtualization Data Security Display Fraud Software as a Service Scam Training Update Business Intelligence Keyboard Content Management VPN Spam Blocking Botnet Processor Password Government Virtual Assistant Managed IT services Bring Your Own Device Redundancy Voice over Internet Protocol Wi-Fi IT Management Business Technology App Telephone Systems Meetings Social Engineering Augmented Reality HIPAA Google Drive Avoiding Downtime Servers Education Managed Services Provider Identity Theft Comparison Vendor Private Cloud IT Plan OneNote Help Desk Google Docs Machine Learning Access Control Digital Signage Law Enforcement Big Data Sports Cryptocurrency Telephony Website CES Unsupported Software HaaS Virtual Machine AI Recycling Devices Cryptomining Biometric Security Information Technology YouTube Mouse Windows Server 2008 Windows Server 2008 R2 OneDrive Authentication Data loss Google Search Virtual Private Network Computer Fan IT Infrastructure Social Network Practices Safe Mode Security Cameras Cache Software Tips Smart Office HBO Amazon Shortcuts Hypervisor Remote Wireless eWaste Thought Leadership Remote Worker Database Telecommuting Manufacturing Computing Microchip Computer Care Copiers Cortana Alert Save Time Remote Workers FENG Outlook Investment Printing Charger Hosted Computing Smartwatch Skype Wireless Internet Document Management Camera Virtual Reality Professional Services Amazon Web Services Accountants Enterprise Content Management Mobility Vendor Management Going Green Legal Wiring Travel Remote Work Search Engine Hard Drive Development Password Manager Nanotechnology Proactive IT Tools Work/Life Balance Managed IT Service Frequently Asked Questions Recovery ROI Personal Wireless Charging Inventory Health Start Menu Project Management USB Solid State Drive Printers Cabling Fiber Optics Downtime Password Management Social Sync Multi-Factor Security Saving Time 5G Criminal Windows 10s Firewall Bing WiFi Messaging Business Mangement Smart Tech Screen Mirroring MSP Net Neutrality Millennials Digital Signature Entertainment Warranty Excel GDPR Digitize Hacker Google Apps Employer-Employee Relationship Employee Bitcoin The Internet of Things Electronic Medical Records Wire Audit Physical Security Cables Trend Micro Online Shopping Root Cause Analysis NIST Procurement Addiction Unified Threat Management HVAC Flash SMS Gmail Cast File Sharing ISP Value Workforce OLED Using Data Credit Cards PDF Printer Tip of the week Remote Computing IT Assessment Workers Compliance Specifications Batteries Data Management Default App Shopping Evernote Cleaning Trending Employee/Employer Relationship Public Cloud Mobile Computing Search Customer Service Mobile Office Regulation Domains CrashOverride Company Culture Emergency Windows 10 Public Speaking Managed Service Provider Presentation Managing Stress Lithium-ion battery Hiring/Firing Tech Support Wireless Technology Twitter Fun Personal Information Safety IBM Marketing Productivity Budget Financial Competition Customer Relationship Management IP Address Hard Drives