Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Business Continuity Includes Preparing for Death

Business Continuity Includes Preparing for Death

It’s never an easy thing to talk about, but it does need to be talked about. If one of your key employees were to pass away, how would it affect your business? How do you prepare for this type of inevitability?

We talk about Business Continuity a lot. Usually when we discuss it, we’re talking about backing up your data or having a plan in place to bounce back after a major disaster were to happen.

For example, if a fire were to take out your server room, what steps have you taken to prepare for it, and how quickly can you be back up and running?

The answer should be something like this:
We have our data backed up to an internal device in the server room. We can always rely on that, provided that the backup device remains operational. In the event that the backup device suffers from the disaster, we also back up our data in the cloud. The restore is a little more complicated, but we can manage for a few days from the cloud-based backup while new infrastructure is installed onsite.

That’s a really solid answer, and that is something that we specialize in helping Florida businesses achieve. However, that’s your backup strategy. That’s just a small part of your overall business continuity. That data backup is a real lifesaver when it comes to a physical disaster, but what happens when the disaster is a loss of life, or incapacitation, or even just a key individual suddenly walking out the door?

Let’s Look at a Scenario

Let’s say Bob is the business owner. He makes all of the decisions, he signs the contracts, he pays the bills. If Bob gets sick or suffers a stroke and becomes incapacitated, who takes over until he recovers? If Bob’s son works for the company, does the son have legal authority to take over?

We’re covering a lot of ground here, but technically, only the courts can intercede and make these types of decisions if it isn’t properly prepared for. You might run into a scenario where the court will choose someone to run the business temporarily while it is decided what to do next. This process can be slow, and the outcome might not be ideal.

If Bob establishes an Estate Plan, he can pick a successor to have legal authority to run the business. The Estate Plan should include a Revocable Living Trust and Powers of Attorney.

Let’s take a moment here to admit that we are not lawyers, and not offering professional legal advice, and that you should consult your lawyer before making any legal decisions. 

On top of all of this, you’ll want the family of the incapacitated business owner to maintain its lifestyle while keeping the business chugging along.

Business Continuity is About Smooth Recovery

Just like how we always recommend a backup device that can restore data quickly without a lot of overhead, the rest of your business continuity plan should cover a broad enough range of emergencies to enable the business to stay afloat during the toughest tides.

That plan should include taking a significant person or role out of the loop and continuing to operate normally. That may require thorough documentation and training for other capable employees before something bad happens.

Does your business continuity plan, or Emergency Action Plan (EAP) clearly cover this? If you would like to have a deeper conversation about business continuity, please reach out to us at Total Tech Care to set up a call.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Cybersecurity Quick Tips Users Business Management Upgrade Managed IT Services Windows Phishing Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Server Save Money Data Recovery Office Windows 10 Passwords Social Media Gadgets Chrome Virtualization Tech Term Saving Money Holiday Managed IT Services Automation Microsoft Office Managed Service Facebook Operating System Artificial Intelligence Cybercrime Computers Networking IT Support Internet of Things Hacking Wi-Fi Health BYOD Mobile Device Management Office 365 Telephone Systems Managed Service Provider Information Technology Remote Alert Information Covid-19 Spam Bandwidth Router BDR Social Engineering Mobility Recovery Employer-Employee Relationship App History Law Enforcement Big Data Data Breach Human Resources Password Money Mobile Computing Encryption Remote Monitoring Application Applications Data Storage Patch Management Government Office Tips Training Private Cloud VPN Blockchain Managed IT Paperless Office Apps Remote Computing How To Mobile Office Avoiding Downtime Vulnerability Wireless Windows 7 Word Gmail Servers Settings Bring Your Own Device Flexibility Data Management Two-factor Authentication Marketing Work/Life Balance Data Security WiFi IT solutions Mouse Entertainment Infrastructure Voice over Internet Protocol Website HaaS Budget Google Drive Sports HIPAA Redundancy Data Protection Keyboard Risk Management Hacker Conferencing Scam The Internet of Things Lithium-ion battery Save Time Vendor Management Staff Software as a Service Firewall Telephone System Machine Learning Cleaning Vendor Connectivity Virtual Reality Remote Work Managed Services Apple Display Social End of Support USB Education User Error Physical Security Employee/Employer Relationship Meetings Safety RMM PDF Retail Hard Drives Computing Hiring/Firing Remote Worker Instant Messaging Excel Humor Cryptocurrency Robot Proactive IT Biometrics Best Practice Virtual Desktop YouTube Comparison Digital Signage Black Market Business Intelligence CES DDoS Audit Worker SharePoint IT Management Content Management Procurement Document Management Business Technology Solid State Drive Access Control Botnet Wireless Technology Workplace Strategy Net Neutrality How to Downtime IT Plan Help Desk Virtual Assistant Customer Service Authentication Environment Printing Virus Data storage Unsupported Software Unified Threat Management Automobile Fax Server Charger Computer Accessories Managed Services Provider Update Compliance SaaS Computing Infrastructure Going Green OneNote Computer Care Database Current Events Telephony Google Docs Remote Workers Network Congestion Identity Theft Samsung Printer Processor Battery eWaste Bluetooth Shadow IT Legal Value Hard Drive Internet Exlporer Spam Blocking Electronic Medical Records Augmented Reality Fraud IT Consultant Wearable Technology Smart Tech Mobile Ergonomics Trending Windows 10s Smartwatch OLED Addiction Amazon Cast Development PCI DSS webinar Virtual Machine Emergency Running Cable Relocation Recycling Tip of the week Practices Professional Services Memory 2FA Public Cloud Fiber Optics Employer Employee Relationship Employee Wiring Cabling Video Games Cache Amazon Web Services Messaging Assessment Policy Hypervisor Worker Commute Safe Mode Criminal Windows Server 2008 GDPR Hosted Computing Tools Dark mode Consultant Trend Micro Experience Analytics Default App Scalability Wireless Internet Online Shopping SMS Television Science Procedure Saving Time Business Owner File Sharing Camera Inventory NarrowBand dark theme Specifications Best Available Shopping Google Search Public Computer IT Infrastructure Search Wire Evernote WIndows 7 AI Regulations FinTech Travel Transportation Bing Distributed Denial of Service iPhone Customer Relationship Management Printers Analyitcs Millennials Computer Fan Social Network Rootkit Investment Smart Office Programming Wireless Charging Employees Workers Employee/Employer Relationships Benefits Files Virtual Private Network Chromecast Windows 365 Workforce FENG ISP IBM PowerPoint ROI Windows Media Player Antivirus Cables User Video Conferencing Flash Uninterrupted Power Supply Windows 8 Sales Bitcoin Smart Technology Shortcuts Colocation Project Management IT service Nanotechnology Point of Sale Telecommuting Personal Cryptomining Supercomputer Monitor Cortana Software Tips Managing Stress Supply Chain Management Digital Signature Sync Tablet Monitoring Emails Batteries Warranty Domains Windows 8.1 Digitize Cameras Windows Server 2008 R2 HVAC Reputation Google Apps Streaming Media Maintenance Analysis Tech Support Customer relationships Netflix Two Factor Authentication Content IaaS Manufacturing Administrator Techology Devices Laptop Bloatware Email Best Practices Root Cause Analysis IT Assessment Knowledge Music Enterprise Content Management Customers HBO Accountants Skype Tablets Computer Tips Managed IT Service Security Cameras Audiobook MSP Biometric Security Microchip Thought Leadership Touchpad Entrepreneur Virtual CIO Credit Cards Data loss OneDrive Printer Server Peripheral Leadership Troubleshooting Password Management Password Manager Outlook Advertising Shortcut Start Menu Digital Security Cameras Multi-Factor Security Using Data Politics 5G Search Engine Twitter Cost Management Screen Mirroring Copiers Loyalty Notifications Quick Tip Books NIST Social Networking Business Mangement Frequently Asked Questions

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code