Blog

June 30th, 2015

164_Mic_AImagine a world where you no longer rely on passwords. What would it look like? Would there be flying cars speeding through the skies? Would there be robots serving you coffee in Starbucks? While these two changes are still probably decades away, a password-free world is not. Here’s how Microsoft Windows 10 is taking the first steps to eliminating passwords now.

The problem with passwords

The problem with passwords is simple - they can be stolen. And from Facebook to iTunes to Flickr and thousands more, nearly every major website and thousands of niche ones require a password to use. And because we Internet users are logging onto dozens of these sites and services everyday, it’s virtually impossible for us to create a unique, complex password for each one. So people resort to using only a handful of passwords, or even just one master password, since it’s easier. But of course, this poses a security risk. So what’s an Internet user to do?

Microsoft Windows 10 is pioneering a new technology that is ready to flip this dated system on its head and eliminate the password problem for good.

Login to your devices with biometrics

Passwords can be stolen easily, but how easy is it to steal a person’s physicality? Microsoft’s new technology, named Hello, uses biometrics - such as your fingerprint, or face or iris scan - to log into your computer, laptop or other device. This ensures that no one can login to your device but you.

Well, what about using a photograph to login instead, you might ask? It won’t work. Using technology that takes a detailed map of your face in 3D, Hello is trained to reject the token photograph or selfie on login attempt. This makes it virtually impossible for anyone, besides you, to login to your device.

Use biometrics to login on the web

Logging into your computer with biometrics is great, but what most users really want is a more secure solution to login to websites while not having to remember a bazillion passwords. This is where Microsoft’s Passport comes in. Passport allows you to login into applications and online content without the need for a password. For example, instead of using your typical password to sign into your Microsoft Windows Account, you can now use Windows 10 facial recognition (or other biometrics) to log you in instead. That means you can access Skype, Xbox Live, Office 365 and more without a standard password. In addition to your Microsoft Windows Account, you’ll be able to use the biometric capabilities of Passport to access thousands of enterprise Azure Active Directory online services. Bear in mind, though, that it will be quite some time before you can use Passport to replace all your standard logins, since not every website has implemented this technology yet.

Want to hear more exciting Windows 10 news, or need assistance with your Windows device? Get in touch with one of our technology experts today.

Published with permission from TechAdvisory.org. Source.

June 29th, 2015

Windows_Jun18_AIt’s finally here - the long-awaited release of the new Windows 10 operating system from Microsoft has been confirmed for July 29. The tech giant is skipping number 9, making this the latest release since Windows 8 failed to live up to expectations. That means Microsoft has gone back to the drawing board, and emerged with countless impressive features. If you’re ready to get started with Windows 10 this summer, here’s what you need to know.

You can get it for free

They say the best things in life are free, and that might just be the case with Windows 10. Microsoft has kept its word about making its newest operating system free to access - at least if you’re currently running an authentic version of Windows 7 or 8.1, its two most recent releases. You’ll enjoy a free lifetime upgrade to Windows 10 provided you make the move within the next year and, better still, it’s an automatic upgrade directly from your existing Windows 7 or 8.1 interface. If you’re running an older version of Windows, you’ll need to make a fresh install and you’ll also need to pay - the various available versions of Windows 10 are expected to retail starting at $119.

It’s being launched in phases

Although the official release date is July 29, in reality Microsoft is expected to undertake a phased launch. This means that you might not end up using the brand new Windows 10 on July 29 itself - instead, Microsoft is likely to make the new operating system available to desktop and laptop users first, and only later to mobile and other devices. What’s more, the firm already has its next move in the pipeline. Upgrade and update plans for Windows 10 are anticipated to be on the way in two phases, in June and October 2016. But we are expecting these changes, codenamed Redstone, to come in the form of more minor tweaks to the Windows 10 infrastructure rather than a full overhaul.

It’s the last you’ll see of Windows

Microsoft has made no secret of the fact that it sees Windows 10 as the operating system’s final release. But that’s not quite as ultimate as it sounds - this is not really the end of Windows. Instead, what we’re seeing is the transition of Windows from a product to a service. Microsoft envisions a future where, instead of major new versions of Windows emerging every few years, there are regular improvements and updates - far beyond the WIndows Updates that we know at the moment.

It’s likely that version numbers will come to play far less of a role in system updates in the future - in much the same way as mobile apps operate, we’ll instead settle into enjoying a frequently updated service that incorporates the latest features Microsoft has developed. And while some have expressed fears that this could lead to home and business users being tied into a subscription model in order to stay up to date, Microsoft appears committed to ensuring that ongoing upgrades are free.

Ready to make the leap to Windows 10? Want to find out how best to make the transition with minimal disruption to your business? Give us a call and let us walk you through it.

Published with permission from TechAdvisory.org. Source.

June 29th, 2015

BusinessContinuity_Jun25_AData backup is one of the most important aspects of your company's infrastructure. Without data availability, your business will come to a standstill. So it's bizarre that most business owners fail to have a proper data backup strategy in place - and when disasters strike, it will be too late to act. You really do need to take a proactive approach to backing up your data and keeping your business functioning normally at all times. There are several methods and devices you can use for backing up data - here are some to consider.

There’s no one-size-fits-all solution when it comes to data backups. You’ll want to consider the pros and cons of each of the backup devices below before making a purchase.

USB stick

USB flash drives are basically miniature hard drives that you connect to your computer using a USB port. The drives are extremely cheap, with prices depending on their capacity. They’re also portable, and can be used to backup information from several computers to the same drive.

Although USB sticks are highly convenient, they’re still not a complete backup solution, and are best suited for intermediate backups, such as storing file recovery programs or critical business documents.

External hard drive

An external hard drive is perfect when used as backup storage media. It has the lowest cost per gigabyte when compared to the other backup devices out there. External hard drives use the same plug-and-play functionality as USB sticks, so you can plug the drive into your computer and immediately start selecting the files you want to backup. The transfer rate is also very fast, and you can backup a large amount of data within seconds.

One of the evident drawbacks of using an external hard drive is that you’ll need to update your backups on a regular basis, or else new files won’t be included. There’s also the risk of the device being stolen or misused. For instance, a colleague may take your drive when you’re away from your desk, or a disgruntled employee may copy all of your important business files and take it with them when quitting.

Network attached storage

Network attached storage, or NAS for short, is a dedicated device with its own IP address. It can be used as a multimedia server, and can function as an email or lightweight database server. NAS offers data redundancy, meaning it will generate a backup of your backups, so you can ensure your files are fully protected.

The main downside of NAS is its inability to scale beyond the limits of the system; you have to purchase additional hard drive bays when you need more capacity. You also have to take full responsibility for data security if you’re implementing NAS.

Cloud storage

Cloud storage is becoming more and more popular among businesses of all sizes, due to its many benefits such as allowing users to access data anywhere on smartphone devices, as well as enabling you to work with the most current hardware and up-to-date software. It is also affordable, since you’ll only have to pay for what you use. What’s more, cloud computing is very convenient, because your service provider will take care of the installation, management, and maintenance processes.

On the downside, some cloud service providers don’t employ sufficient security measures on their systems, so your data could be exposed to potential cybersecurity threats. This means that it is not always the ideal solution for companies dealing with very sensitive data - medical practices and law firms, for example. Predicting costs can also be hard; if your business is growing rapidly, then you might find you have not adequately planned for incremental costs.

Choosing the best system for backup is a critical decision that will impact your business on a daily basis. There are trade-offs among backup devices, which is why you need to choose the solution - or solutions - best suited to your business. Contact us today and our experts will assess your company’s needs and provide the best backup solutions for you.

Published with permission from TechAdvisory.org. Source.

June 19th, 2015

BusinessIntelligence_Jun9_ACompanies today are adopting business intelligence (BI) tools to represent data in a way that makes information comprehension and analysis simple. But all too often business owners make mistakes in selecting and implementing a BI software solution, resulting in unnecessarily high costs and ineffective execution. To help, we have put together the most common BI mistakes organizations make, and how to avoid them.

Mistake #1: Not defining business problems

One of the biggest mistakes in BI implementation is jumping to conclusions too soon without first identifying what your business wants to accomplish. When it comes to integrating BI into business operations, there’s no such thing as a one-size-fits-all solution. Looking for a single BI tool to solve all analytics problems is one of the main reasons many BI projects fail.

You need to clearly define the business problem you’re trying to solve, and understand the specific tools required to solve those problems. Only then will you be able to select and purchase the BI tool that best suits your needs.

Mistake #2: Not getting buy-in from end users

Even the best BI tools are ineffective if they’re not properly utilized. Forcing your employees to use newly purchased BI technology without informing them or hearing their thoughts beforehand is a big mistake.

Instead of telling employees they have to use something, first focus on highlighting the benefits of the new BI system. Help employees understand why they’ll want to use it, and convince them by showing them what they stand to gain from the new BI technology.

Mistake #3: Rushing implementation

A rushed deployment of new technology is often times not a successful one. When it comes to deploying BI solutions, patience is key. If you hurry into BI implementation too quickly, your end users may not have enough time to develop the skills required to use the software effectively.

Take an incremental approach to implementing BI solutions. Make a list identifying business problems and, rather than expecting to solve every business problem all at once, try to prioritize specific outcomes you want to achieve. When you have solved the first issue, move on to the next one and so on until you have incrementally solved all the problems on the list.

Mistake #4: Insufficient training

New BI systems are complex structures that require a lot of training in order for users to make the most of them. If users lack the skills necessary to operate the software, then bottlenecks can occur. The product may be left dormant for long periods of time as users wait for experienced IT staff to resolve teething problems.

Spend wisely on providing ongoing training, so that users really understand how to use the system. Consider hosting weekly lunch sessions where a different aspect of the BI system is discussed. You could also provide online training videos that enable users to learn more about the new system at their own pace.

Mistake #5: Not making use of information and reports

BI tools are designed to analyze raw data and turn it into valuable information that can be used in business decision making. But some organizations fail to exploit the information fully - it is not shared, not analyzed, and not acted on. BI software can generate reports on various data points, identify risks, and predict trends. It’s important to leverage the information gathered and to apply it to your business’s objectives and goals.

Business intelligence software is a highly useful tool that, when used properly, can drive your business forward. Avoid these mistakes in order to make the most of your BI solutions. If you’re looking to implement BI tools to your company, contact our experienced consultants today and see how we can help.

Published with permission from TechAdvisory.org. Source.

June 8th, 2015

HealthcareIT_Jun8_AThe past few years have seen rapid technological advancements in the medical industry, and healthcare institutions are focusing more than ever on implementing devices that deliver cheaper, faster, and more efficient patient care. Thought leaders in the healthcare industry are pushing out new ideas and technologies that are capable of increasing patient safety and survival rates - here are the latest innovations in medical practice.

Electronic aspirin

For people who suffer from daily or chronic headaches, or excruciating facial pain, taking ordinary aspirins may no longer do the trick. Now scientists have invented a new technology that is attached to Sphenopalatine Ganglion (SPG) in order to alleviate migraines and other similar pains. The electronic aspirin is a patient-powered tool for blocking SPG signals at the first sign of a headache.

The system involves the permanent implant of a small nerve-stimulating device in the upper gum on the side of the head. The tip of the implant connects to the SPG, and when a patient feels the first signs of an imminent headache, they simply place a remote controller on their cheek, next to the implant. This triggers an electronic charge to stimulate nerve cells and block the pain-causing neurotransmitters. In tests, the end results showed clinical improvement in 68 percent of patients, who stated that they felt less pain.

Insulin patches

Diabetes self-care is a pain - literally. As well as conducting your own glucose blood tests, you also need to take daily insulin shots, which increases the risk of infection. Insulin patches are designed to deliver insulin painlessly through the skin similar to how transdermal patches like nicotine patches and muscle pain relief patches work.

An insulin patch is placed on the skin, and agents in the patch help insulin to pass through the skin and into the blood vessels. It can also be used to read blood analytes through the skin without actually drawing blood. The technology utilizes an electronic device that removes top-layer skin cells to place the patient’s blood chemistry within the signal range of the patch’s biosensor. The data is transmitted data wirelessly to a remote sensor, which emits an audible alarm if glucose levels are too high.

Cancer scanner

A surgical biopsy is an effective way to identify and diagnose skin cancer. But more often than not doctors find it hard to make the right call, and patients are left with unnecessary biopsy scars and end up paying for the high cost of surgery. The cancer scanner is a handheld tool used for tissue analysis and is not used to confirm a clinical diagnosis of cancer, but rather for when a dermatologist needs additional information to make the decision to perform a biopsy.

These healthcare innovations can reduce the overall cost of medical care, and help medical experts and patients to respond to health issues quickly, as well as to take preventative measures. If you’re looking to implement technology to your healthcare business, contact us today and see how we can help.

Published with permission from TechAdvisory.org. Source.

June 2nd, 2015

Virtualization_May28_AVirtual machines are a robust platform for storing data, documents and applications for most organizations today. But with the emergence of containers, another platform for virtual file storage, the question arises: which platform is right for my business? With that in mind, let’s take a look at how containers and virtual machines differ and which would be best for your organization.

Containers, just like virtual machines, are used for storing files, critical data and applications in an organized manner following specific access rules. So how do they differ from virtual machines, and what are the pros and cons of containers? We’ll take a look below.

Containers can pack a lot more applications into a single cloud or data center than a virtual machine can. And because containers only require little memory from an operating system and its supporting programs and libraries, you can put two to three times as many as applications on a single server with a container than you can with a virtual machine. In addition, containers allow you to create a portable, consistent operating environment for development, testing and deployment.

Still, there's a lot more to containers than how many apps you can put in a box, and not everything about them is sweet. One of the problems with containers that is often overlooked is security. Simply put, containers do not contain. What this means is that if a user or application has superuser privileges within the container, the underlying operating system could be cracked. And while you can secure containers by mounting a /sys filesystem as read-only among other options, it takes a lot of time and effort to do so.

Another container security issue stems from the release of many containerized applications. This is a problem because if you happen to install the first container that comes to hand, you’re likely to have brought a Trojan Horse into your server. You need to inform your staff and employees that they simply can’t download apps from the Internet into a container like they do games for their smartphone. Not only that, but breaking deployments into more functional discrete parts using a container is possible, but means more parts for you to manage. The whole point of a container is to run a single application, so the more functionality you stick into a container, the more likely it is you should actually be using a virtual machine in the first place.

So how do you decide between containers and virtual machines? Ask yourself whether you need to run the highest possible number of instances of a particular application on the fewest possible servers, because if so then containers are the best option for you. But if you want the flexibility of running multiple applications on your servers and you have a variety of operating systems, virtual machines are your safest bet.

Looking to learn more about how virtualization can help your business prosper? Contact us today - we’re sure we can tailor a solution that meets your unique needs.

Published with permission from TechAdvisory.org. Source.

June 2nd, 2015

BusinessValue_June2_ATechnology has completely changed the way we do business. Gone are the days when customers had to drop by your company to purchase your products and services. Now they can simply visit your website, see what you have to offer, and make an online payment - all in a matter of minutes. But if you want to expand your customer base, your website needs to rank high in search engines, so that it’s easy for potential customers to find you. That means implementing search engine optimization (SEO) strategies; here’s all you need to know about SEO to increase your online presence.

SEO defined

The practice of SEO has been around just about as long as search engines themselves. SEO is basically a methodology of techniques and tactics used to increase the number of visitors to a website by obtaining a high-ranking placement in search engine results. There are a lot of crackpot theories about SEO out there, and you’ll have to sift through them to find the techniques that really work for your business.

There’s a saying in the world of SEO that if you’re not first, you’re last. When it comes to SEO there’s no short cut, and the idea of getting your business website ranked on the first page of Google search results in one day is ludicrous. To make things clearer, we’ve compiled a list of the basic SEO practices business owners tend to overlook.

1. Research keywords Keywords are key to your online presence. Add the right keywords to your website and your chances of being found are much higher. First, invest time in keyword research. Find out which keywords your customers are using in search engines, and gather all crucial data for SEO purposes, whether it’s search volume, trends, or competition. Make a list of keywords related to your niche. Don’t be tempted to only go after phrases with the highest search volume - they will be very hard to rank for and might be too broad.

2. Create quality content Based on the researched keywords, generate high quality content with the focus on your readers. Make sure this content reads naturally for human visitors - don’t overdo it by stuffing keywords into your text in the hope of getting high rankings, as most search engines will penalize your website for using this underhand tactic. Good content has relevant keywords in it, but a great one has the keywords while also providing real value to visitors.

3. Place call-to-action buttons A business website should always have a call-to-action to convert visitors into customers. Make sure you add a call-to-action button to each of your most important pages, whether that means the About Us page, service pages, FAQs, or case studies. Call-to-action buttons may vary. They don’t always have to lead to a contact form; they can be links to other content, incentive offers, free downloads - the list goes on.

4. Create an internal link structure After you have quality content, you must show the search engines that your site has a page hierarchy. The general rule of thumb is, all your articles should link back to the home page, service pages, and even other articles. Linking internally allows for easier navigation for your visitors, and there’s a good chance they will spend more time on your website, which is good for SEO purposes.

5. Install analytics tools Tracking your visitors’ behavior on your website is important. Connect your website to analytics tools like Google Analytics and Google Webmaster Tools to gain valuable insight into your website’s statistics. By closely monitoring performance, you can eliminate keywords that aren’t generating you leads, and tweak content that visitors ignore.

SEO is an ongoing process that requires patience and time. These suggestions are meant to set a stronger foundation for your business to expand. If you’re looking for other ways to increase business value, get in touch with us today.

Published with permission from TechAdvisory.org. Source.

June 1st, 2015

Security_May27_AInformation security is on everyone’s mind - all too often we hear of a high-profile data breach in the news, and even the smaller scale attacks that don’t make headlines can wreak havoc on growing businesses. So it’s heartening to know that Google places a high premium on security. Their latest move to bolster protection for Google Drive for Work sees the introduction of physical Security Keys - here’s what you need to know.

Google already offers security precautions like two-step authentication, which provides additional protection by requiring you to enter not only your password but also a one-time code received by SMS or similar. This is a crucial weapon in the fight against hackers, since weak usernames and passwords are still be the primary reason for accounts being breached. Security Keys now take things one step further, strengthening your Google Drive account’s coat of armor to an even greater extent.

The Security Key is a physical USB device that is plugged into your computer, and which sends an encrypted signature, instead of a password or other code, to verify your identity and permit you access to your Google account. Crucially, Security Keys are inexpensive - starting from around $6 per unit - and require no additional software for deployment, use or management. Administrators have the ability to track when and where each key is used, as well as being able to disable them if lost and issue backup codes to allow staff uninterrupted access even if they do misplace their key.

Simplifying the login process is also a key part of what Google has tried to achieve with Security Keys. To that end, the first time you use your key to access your Google account on a particular computer, you can opt for Google to remember that device. On subsequent occasions you can quickly sign in using only your password, and without requiring either your key or a two-step authentication code. You can still sign in using your key on other machines, and if a hacker tries to access your account without your key they will also be prompted for a two-step verification code (which, unless they have access to your cell phone, they shouldn’t be able to provide).

Security Keys aren’t an entirely perfect solution, though - there are some significant limitations to the technology. For one, you can’t use them on mobile devices, since they require a USB port to work, and they only allow you to access your Google account through the Chrome browser. Windows, Mac OS, ChromeOS and Linux operating systems are all supported, but if you’re working from your phone or on a browser other than Chrome then you’ll need to continue using two-step authentication. Google says you can mix and match different methods of verification, opting to use Security Keys where they are supported and two-step verification otherwise (or if you don’t have your key with you).

What’s more, only Google Drive currently supports Security Keys - it’s not yet possible to use them with Google Apps, for example. But, while the technology is primarily targeted at Google Drive for Work users, it’s possible to link a single key to multiple accounts, meaning you can use it to access both your work and personal Google accounts. Some users have also queried how much of a safeguard the technology really provides in the absence of an additional PIN code or fingerprint authentication being required for activation, suggesting that a stolen Security Key could be used to access a computer that a user has previously asked Google to remember. But Security Keys do appear to offer at least some additional protection, which will be of comfort to businesses handling sensitive data.

Give us a call to find out how to employ Security Keys and other technology solutions to bolster your protection against network intrusion and data breaches.

Published with permission from TechAdvisory.org. Source.

Topic Security
June 1st, 2015

BusinessContinuity_June1_ACompanies of all sizes today are aware of the data security risks posed by unexpected disasters, and so have a business continuity plan in place to prevent data loss. But entrusting data backup to the average IT guy is a certain way to lose your critical business data, since making configurations and changes to managed backups can be downright complex and confusing. That’s why you should turn to cloud hosting for a more simple data backup and recovery process. Here’s why you’ll want to utilize cloud computing in your business continuity plan.

Better uptime

Backing up to an internal drive or an external hard drive won’t completely secure data. If someone steals your computer, you lose the hard drive and the backup. Natural disasters or man-made errors will also likely destroy your backups. Your company could face expensive downtime if your backups are lost or damaged. With cloud-hosted backup, however, things are different. The entire purpose of a cloud backup is to make sure your data is available when you need it. Top cloud service providers will offer redundancy, which means they will make a backup of your backups. This increases uptime and ensures optimum levels of data availability.

Fast resource provisioning

When backups are being implemented, spikes in user activity or cloud environment accessibility can rise rapidly and slow down a website or other running systems. This is where a cloud hosting provider comes in. By closely monitoring user activities, providers can see spikes either before or as they are happening. The provider will provision more resources and virtual machines to manage the influx of users. This type of flexibility is particularly useful for when data backups are in process.

Backup frequency

Most companies work on files and update information throughout the day, so it’s important to have a real-time backup plan ready in case an unexpected disaster occurs. When you backup data to the cloud, you will no longer have to worry about managing the frequency of your backups. Most cloud-hosted providers offer hourly, daily, monthly, or other fixed backup frequencies, while others let you set your own backup schedule. Some of the services offered by these providers will back up files as you make changes, so you’ll know that the very latest version of files and data are always backed up.

Distributed infrastructure

Cloud-hosted backup literally means the delivery of data backup to users all over the world. Selecting the right type of cloud hosting partner is equally as important as having a cloud backup plan in the first place. If international users are trying to access database or download applications through your business website, latency will become a factor - the closer the user is to the data, the faster they’ll be able to access information. A suitable cloud hosting partner will be able to provide backup servers at the location that best suits your company’s business continuity needs. Distributed infrastructure is beneficial if you’re looking to support a large number of worldwide users.

Businesses everywhere are utilizing cloud backup solutions - don’t be the one left behind. If you’re looking for a managed cloud backup service to protect your business data, give us a call today to see how we can help.

Published with permission from TechAdvisory.org. Source.

May 26th, 2015

BusinessContinuity_May26_AEvery business owner knows that having a business continuity plan in place is crucial to the success of their organization. Yet even if your business continuity framework is at the ready, when the unexpected does happen the question that many overlook is how confident they are in taking care of the backbone of the business — their employees? With that in mind, let’s take a look at the five deadly business continuity mistakes to avoid at all costs.

Mistake #1: Assuming your employees will be there to support you

Companies that survive unexpected incidents are the ones that thought about their employees’ needs. It is important that your management team are aware of the business continuity plan’s SWOT analysis, which examines the strengths, weaknesses, opportunities and threats you face in a disaster. Review and obtain formal management sign-off on the SWOT analysis and have your management team make decisions in advance about actions that require expenditure.

Review decisions on paying all employees during a period of business interruption for a minimum period of time. Communicate your strategy and message to your employees to let them know that you will be there to support them and their families in the event of a crisis. This way, your employees will have peace of mind knowing you and the company are there for them, and in turn they will be there to support you.

Mistake #2: Using only words, not actions

Once you have your business continuity plan documented and your SWOT signed off, you need to think about the small stuff to ensure your plan is executable. This includes logistical considerations like food, travel and living requirements, medical aid and monetary support.

Walk the walk and ensure your medical providers have made arrangements in advance. Have an Employee Assistance Program (EAP) in place to make sure your employees have access to people who can give them support in the event of an incident. Staff will remember if you provided them with care and support, and will remember even more clearly if you didn’t.

Mistake #3: Not showing your employees how the plan will work

While many business owners worry about downtime, they overlook the fact that explaining the plan and its execution to employees is critical to minimizing lost productivity.

As part of your maintenance program, include your employees as well as your security, medical and EAP team in the testing process. Execute a live test where various providers can demonstrate their capability to support your employees. This way, your employees will know that you care and can have faith you will be able to support them when the tables have turned.

Mistake #4: Not dealing with your employees first

When an incident occurs, the first assessment most businesses make is to determine the impact it has on the company. But how do you execute that process without people? When disaster strikes, your employees will naturally want to be taking care of their families, not your business.

Ensure your crisis management team addresses the people issues first. Where are they? What do I need to do for them? Are there any special employee needs I must address? After having accomplished this, you gain the ability to show your people that you’re in control and that you truly care.

Mistake #5: Reacting rather than communicating

In the event of a disaster, the most important thing to get right is communication. It is imperative that your employees know you can provide them with the most up-to-date information.

Set up a toll-free hotline so your employees can call in for regular updates, or create an open forum where your employees can tell you what you could have done better and what failed. With that, you provide consistent messaging and you can eliminate second-hand information and employee guesswork, while gaining insight into what could have been improved.

If your business continuity plan takes into account that your employees are your biggest assets, you’ll have peace of mind knowing the core of your organization is still standing strong even if the worst should happen.

Looking to learn more about business continuity and how it can help your business? Contact us today and see how we can help.

Published with permission from TechAdvisory.org. Source.