Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Business Continuity Includes Preparing for Death

Business Continuity Includes Preparing for Death

It’s never an easy thing to talk about, but it does need to be talked about. If one of your key employees were to pass away, how would it affect your business? How do you prepare for this type of inevitability?

We talk about Business Continuity a lot. Usually when we discuss it, we’re talking about backing up your data or having a plan in place to bounce back after a major disaster were to happen.

For example, if a fire were to take out your server room, what steps have you taken to prepare for it, and how quickly can you be back up and running?

The answer should be something like this:
We have our data backed up to an internal device in the server room. We can always rely on that, provided that the backup device remains operational. In the event that the backup device suffers from the disaster, we also back up our data in the cloud. The restore is a little more complicated, but we can manage for a few days from the cloud-based backup while new infrastructure is installed onsite.

That’s a really solid answer, and that is something that we specialize in helping Florida businesses achieve. However, that’s your backup strategy. That’s just a small part of your overall business continuity. That data backup is a real lifesaver when it comes to a physical disaster, but what happens when the disaster is a loss of life, or incapacitation, or even just a key individual suddenly walking out the door?

Let’s Look at a Scenario

Let’s say Bob is the business owner. He makes all of the decisions, he signs the contracts, he pays the bills. If Bob gets sick or suffers a stroke and becomes incapacitated, who takes over until he recovers? If Bob’s son works for the company, does the son have legal authority to take over?

We’re covering a lot of ground here, but technically, only the courts can intercede and make these types of decisions if it isn’t properly prepared for. You might run into a scenario where the court will choose someone to run the business temporarily while it is decided what to do next. This process can be slow, and the outcome might not be ideal.

If Bob establishes an Estate Plan, he can pick a successor to have legal authority to run the business. The Estate Plan should include a Revocable Living Trust and Powers of Attorney.

Let’s take a moment here to admit that we are not lawyers, and not offering professional legal advice, and that you should consult your lawyer before making any legal decisions. 

On top of all of this, you’ll want the family of the incapacitated business owner to maintain its lifestyle while keeping the business chugging along.

Business Continuity is About Smooth Recovery

Just like how we always recommend a backup device that can restore data quickly without a lot of overhead, the rest of your business continuity plan should cover a broad enough range of emergencies to enable the business to stay afloat during the toughest tides.

That plan should include taking a significant person or role out of the loop and continuing to operate normally. That may require thorough documentation and training for other capable employees before something bad happens.

Does your business continuity plan, or Emergency Action Plan (EAP) clearly cover this? If you would like to have a deeper conversation about business continuity, please reach out to us at Total Tech Care to set up a call.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Business Management Users Upgrade Managed IT Services Windows Phishing Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Server Save Money Data Recovery Office Windows 10 Passwords Tech Term Chrome Virtualization Social Media Gadgets Saving Money Holiday Microsoft Office Managed IT Services Automation Managed Service Operating System Facebook Computers Artificial Intelligence Cybercrime Networking IT Support Hacking Internet of Things Wi-Fi Health BYOD Mobile Device Management Spam Managed Service Provider Office 365 Telephone Systems Information Technology Remote Alert Information Covid-19 Social Engineering Router Mobility BDR Recovery Employer-Employee Relationship Bandwidth Encryption Remote Monitoring Applications Big Data App History Data Breach Law Enforcement Mobile Computing Human Resources Application Password Money Mobile Office Data Storage Patch Management Government Office Tips Training Private Cloud Blockchain VPN Paperless Office Managed IT How To Apps Remote Computing HaaS Google Drive Vulnerability Windows 7 Word Avoiding Downtime Wireless Servers Flexibility Gmail Marketing WiFi Settings IT solutions Data Security Entertainment Website Bring Your Own Device Budget Data Management Work/Life Balance Two-factor Authentication Infrastructure Voice over Internet Protocol Mouse End of Support Education Physical Security User Error Employee/Employer Relationship Safety Meetings Conferencing RMM HIPAA Sports Redundancy Data Protection Scam Keyboard Risk Management Hacker The Internet of Things Vendor Management Lithium-ion battery Save Time Software as a Service Telephone System Staff Machine Learning Firewall Connectivity Remote Work Vendor USB Cleaning Virtual Reality Apple Managed Services Display Social Hiring/Firing Humor Shadow IT Augmented Reality Legal Fraud Hard Drive Internet Exlporer Remote Worker Wearable Technology Hard Drives Computing Cryptocurrency PDF Retail Business Intelligence Instant Messaging Robot Excel Audit Worker Proactive IT IT Management Comparison Biometrics Best Practice Virtual Desktop Digital Signage Botnet CES YouTube Black Market IT Plan Virus DDoS Unified Threat Management Business Technology Content Management Access Control SharePoint Unsupported Software Computer Accessories Procurement Document Management Wireless Technology Workplace Strategy Charger Net Neutrality Virtual Assistant Solid State Drive How to Authentication Downtime Compliance Help Desk Customer Service OneNote Environment Printing Computer Care Data storage Printer Current Events Automobile Bluetooth Telephony Fax Server Update Samsung Managed Services Provider Computing Infrastructure SaaS Going Green Google Docs Value Database Identity Theft Spam Blocking Remote Workers Electronic Medical Records IT Consultant Network Congestion Battery eWaste Processor Windows 10s Tablets Managed IT Service Security Cameras Audiobook Password Management Mobile Password Manager Computer Tips Touchpad Virtual CIO Cast Multi-Factor Security Entrepreneur OneDrive Biometric Security Emergency Search Engine Twitter Tip of the week Peripheral webinar Public Cloud Using Data Employer Employee Relationship Politics NIST Advertising Professional Services Business Mangement Shortcut Digital Security Cameras Smart Tech Consultant Trending Cost Management Copiers Assessment 5G Addiction Windows Server 2008 Amazon Analytics Notifications Social Networking Quick Tip Smartwatch Tools Recycling Ergonomics Practices Best Available Development Television OLED Wiring Cache WIndows 7 Relocation Running Cable Amazon Web Services PCI DSS Virtual Machine 2FA Memory Fiber Optics Employee Safe Mode Criminal Hosted Computing Messaging Public Computer Cabling GDPR Video Games Hypervisor Transportation Worker Commute Wireless Internet Regulations Online Shopping Policy Dark mode Computer Fan Trend Micro Rootkit Experience File Sharing Scalability Inventory Specifications SMS Default App Camera Saving Time Benefits Business Owner Wire User Evernote PowerPoint Procedure Workers Windows Media Player Science NarrowBand dark theme FENG Travel Shopping Google Search Search Millennials AI IBM IT Infrastructure Printers Smart Technology Bing Smart Office Managing Stress iPhone Distributed Denial of Service Flash Wireless Charging Customer Relationship Management FinTech Analyitcs Social Network Software Tips Workforce Cameras Programming Supercomputer Investment Virtual Private Network Employee/Employer Relationships Files Sync Cables Employees Emails Chromecast Windows 365 ISP Project Management Nanotechnology Antivirus Telecommuting Video Conferencing ROI Windows 8 Bitcoin Two Factor Authentication Shortcuts Colocation Cortana Uninterrupted Power Supply Sales Netflix Digital Signature IT service Point of Sale Root Cause Analysis Personal Cryptomining Warranty Monitor HBO Printer Server Supply Chain Management Knowledge Music Tablet Batteries HVAC Skype Google Apps Monitoring Analysis Domains Windows 8.1 Data loss Digitize Administrator Devices Reputation Outlook Streaming Media Leadership Windows Server 2008 R2 Troubleshooting Content Enterprise Content Management IaaS Start Menu Tech Support Maintenance Customer relationships Accountants Laptop Email Best Practices Screen Mirroring Bloatware IT Assessment Loyalty Manufacturing MSP Techology Books Microchip Thought Leadership Customers Frequently Asked Questions Credit Cards

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code