Posts

Showing posts from February, 2019

Why Small Businesses Shouldn't Avoid Making Disaster Recovery Plans.

Image
Why Small Businesses Shouldn't Avoid Making Disaster Recovery Plans. Entrepreneurs and small businesses, especially ones that are fairly new, often don't think about making plans to recover in case of a disaster. However, it is the smallest business that most likely has the fewest resources to fall back on in case of disaster. Why does this happen? It isn't on an entrepreneur's radar - The challenge and hurdles of starting out are what drive small business owners. The excitement that comes with getting a new client or releasing a new product are what motivates them. To be honest, things like disaster recovery plans are a little dull and aren't part of the exciting day-to-day hustle of running a company. As a result, these issues get put on the back burner.Planning tools can seem too complex - Ideas like "risk assessment" and "business impact analysis" can be intimidating. Many SMBs may just feel the whole area is overwhelming and leave it to anothe…

Outsourcing? Really. Its OK: How it can save time and money

Image
Outsourcing? Really. It’s OK: How it can save time and money Almost by definition, small business owners and entrepreneurs cringe at the concept of outsourcing. Those who start their own companies like the control and autonomy it provides them. Unfortunately, that preference for control and autonomy may have some bad side effects when it comes to IT. Small business don't have the resources to fully support all of their IT infrastructure needs. The present in-house staff is most likely very busy putting out day-to-day fires. One statistic suggests 65% of IT budgets go to nothing more than keeping the lights on. In short, staff is busy making sure the printer works or reloading a PC infected by a virus after an employee fell for a phishing email. This means that small firm's expenditures on IT are not improving operational, efficiency, or enhancing productivity or competitiveness. There is an alternative. Managed Service Providers are outside consultants you can bring in to handle …

What is a business impact analysis?

Image
What is a business impact analysis?

You have heard of a business continuity plan, but you may hear less frequently about one of its important components: the business impact analysis. A business impact analysis is the step where you make an inventory of the what business functions or assets would be impacted by any major negative events that could strike your business, such as a natural disaster, loss of key personnel, power or internet connectivity, floor, or fire. The business impact analysis breaks down all of the individual components of your business and evaluates how any disaster could restrict their ability to function. For example, a quick general list of targets would include: people; property and business locations; supply chain links; any portion of your technology infrastructure, including communications technology; operations; support; contractual agreements; the environment; and brand reputation. In short, this asks you to define the scenarios that could play out if any …

Run your Business, not an IT Company

Image
Run your Business, not an IT Company You went into business because you have an interest and expertise in some particular product or service. You began the firm to offer that product or service, but a dirty little problem came along with that new company. IT requirements. You need equipment, and you need networks, and printers, and data storage to keep the company up and running. As a consequence, you've become responsible for managing something you probably don't care very much about or even understand especially well. Managed Service Providers can be a solution. A small business can off load a variety of IT tasks that are becoming a distraction to everyday business operations and strategy.Here are just two examples. Software updates and security audits: Your present in-house staff may be spending most of its time fixing everyday problems. As a result, they may have to delay vital security measures, such as applying tested security patches or updating virus software programs. Wo…