Sharing calendars with Microsoft 365 is easy

If you want to keep everyone updated on each other’s assignments or improve your team’s productivity, sharing your calendar on Microsoft 365 is a must. In this article, we’ll take a look at how you can sync your schedules on different versions of Outlook. Outlook on the web If you have Microsoft 365 or another email service based on Microsoft Exchange Online, follow these steps to share your calendar: Open the Calendar by clicking on the calendar icon at the bottom of the page. Once you’re in Calendar, go to the toolbar at the top of the page. Click on Share and choose which calendar you want to share. Keep in mind that you can only share calendars you own and not other people’s. Indicate whom you want to share your calendar with by entering their email address or name. Select which activities recipients are permitted to perform on your calendar. You can choose from the following: Can view when I’m busy ⁠– if you want the calendar to show when you’re busy but hide certain details Can view titles and locations ⁠– if you want the calendar to indicate when you’re busy, as well as key details like an event’s title or location Can view all details ⁠– if you want the calendar to reveal all details about an event Can edit ⁠– if you want recipients to be able to modify your calendar Delegate ⁠– if you want recipients to be able to alter your calendar and share it with other users To proceed, click on Share. If you change your mind, click on the Trash icon to cancel sharing your calendar. Alternatively, you can publish your calendar and share it with others using a URL. Here’s how you do it: In Calendar, go to Settings and click View all Outlook settings. Select Shared calendars. Go to Publish a calendar and choose which calendar you want to publish and how much information is revealed to recipients. Click Publish. You will be given the choice between using an HTML or an ICS link. The HTML link can be used to view your calendar using a browser like Firefox or Google Chrome. An ICS link allows recipients to import your calendar and view it on their own Outlook calendar. Outlook.com Like Outlook on the web, Outlook.com allows you to share your calendar directly or publish it. The steps for sharing are exactly like those used in Outlook on the web, too, except you only have two options for how recipients can use your calendar. These are “Can view all details” and “Can edit.” Publishing your calendar on Outlook.com requires you to:: Click on the calendar icon to open the Calendar view. In Calendar, go to Settings and click View all Outlook settings. Go to Calendar and select Shared calendars. In “Publish a calendar,” select which calendar you’re publishing and how much information it contains. Click Publish and choose to use either an HTML or ICS link. Outlook on iOS and Android If you’re using a mobile version of Outlook, these are the steps for sharing your calendar: On your Outlook app, click the hamburger button at the top-left corner and select Calendar. Go to Share and tap on Add People to indicate your calendar’s recipients. Input each recipient’s name or email address. Once you’re done, tap on the Check button at the top-right corner of the page. You will see a list of recipients. Tap on a name to edit their permissions and how much information they’re allowed to see. As with Outlook on the web, available options are “Can View,” “Can Edit,” “Delegate,” “Only When I’m Busy,” “Only Titles and Locations,” and “All Details.” To remove a user from your recipients, tap on Remove at the bottom of the page. After you’ve set permissions, tap on the Check button at the top-right corner of the page. The Outlook calendar is an excellent feature for managing your team’s events and workflows and can help boost your efficiency and productivity. If you have other questions and concerns about Microsoft 365, get in touch with us today. Published with permission from TechAdvisory.org. Source.

Improve your customer reach with a well-designed website

Most modern businesses build and maintain their own website to reach more customers. It’s good to have an online presence, but know that your competitors are also doing their best to optimize their websites for better brand awareness and profitability. Don’t fall behind — follow these web design trends to increase web traffic and boost your bottom line. Mobile-friendly layouts Many websites today are designed to have a mobile version. With around 47.07% of all internet traffic coming from mobile devices, it’s safe to assume that you are losing a big percentage of your viewership by not having a mobile-friendly website. Implementing a thumb-friendly mobile web design is also critical, as most people who browse websites on mobile do so with one hand while on the go or doing another task or activity. Putting important navigation features within reach of a mobile user’s thumb on the screen will greatly improve your website’s user experience. Website load time One of the most important web design features these days are high-speed website load times. Site visitors seem to be more impatient than ever, and they would most likely close websites that take three or more seconds to load. According to a study conducted by Pinterest, efforts to speed up web page load times reduced perceived wait times by 40%, resulting in a 15% increase in search engine traffic and sign-ups. One technique for cutting down load times for content-rich sites is to lazy load the page instead of fully loading it before it can be viewed. Lazy loading is when a browser is configured to only load the portion of the page that is currently viewable on the screen. The parts of the page that are currently off-screen won’t be loaded so that they don’t consume too much processing power. This works great for websites that are configured to have infinite scroll, like Pinterest. Micro-interactions Micro-interactions are small animations that provide subtle feedback after they complete an action. These are usually found on navigation and tool buttons to further emphasize the purpose of each button. For example, if your cut button is a pair of scissors, you can make it do a couple of snip motions during mouseover. Or if your delete button is a rubbish bin, you can make its lid pop open during mouseover. These actions will make your website more lively and easy to navigate for site visitors. It’s also a great way to keep them on your site for longer periods of time. Micro-animations Although similar to micro-interactions, micro-animations are more for aesthetic purposes. You can use them to make your site more visually appealing, as well as to subtly direct visitors toward certain parts of your site that you would like to gain more attention. For example, if you run a coffee business, your website’s micro-animations can be a pot of coffee brewing for page loads, or a big puff of steam from an espresso machine for page transitions. Dark mode Many users appreciate dark mode because it helps them conserve device power and lessens the strain on their eyes when they browse the internet before bedtime. Websites that offer this option may entice visitors to stick around to read articles and learn more about the product offerings, simply because the site is comfortable to use. If you need help staying on top of website design trends or adapting to an ever-changing digital landscape in general, give us a call. Published with permission from TechAdvisory.org. Source.

5 Business continuity errors to avoid

Business continuity plans (BCPs) are designed to protect an organization’s critical data in case of a crisis. But there is more to BCPs than securing data; it also entails making sure employees are safe during a disruption. If you want an infallible business continuity plan, cover every base and avoid the following mistakes. Mistake 1: Not considering the small details Once you’ve created a general business continuity plan, you need to think about the specifics to ensure that what you envision is executable. This includes fleshing out logistical considerations like medical aid and technology support. For instance, you need to inform partner medical providers about your BCP so that they can make arrangements in advance. This may entail asking for key personnel whom your employees can directly contact if they ever need medical support during an incident. You may also need to figure out how your employees can securely access company data in case they can’t physically come to the office. Planning for the tiniest details may save your data and your employees’ lives, so run through your strategy regularly to ensure that they’re up to date and still effective. Mistake 2: Failing to plan for employees Companies that can bounce back after unexpected incidents are those that have thought about their employees’ needs when making a BCP, so plan every detail that may concern your staff during a disruption, from evacuation routes to emergency communication procedures. Doing so will ensure that your employees have everything they need to survive the worst. Discuss your strategy with your employees and ask for their input in matters that concern their safety or ability to work. Also, let them know that you will be there to support them and their families in the event of a crisis. This way, your employees will have peace of mind knowing that the company is there for them, and this, in turn, ensures their loyalty. Mistake 3: Not showing your employees how the BCP works While many business owners worry about downtime, they may neglect to explain to employees how to effectively execute the BCP to minimize lost productivity. Your staff are part of your overall plan, so they must know the BCP strategy to be able to carry out their roles satisfactorily. Demonstrate exactly how your employees are supposed to respond during a crisis, such as informing them who they’re supposed to contact during a natural disaster and what they’re supposed to say to clients if systems are down. Walk them through where and how they will work when the primary office is inaccessible. Then, have your staff do these tasks until they’re confident that they can perform them when a disaster strikes. Mistake 4: Putting greater priority on operational continuity over employee safety When an incident occurs, it’s understandable for business owners to assess the disaster’s impact on business. But being solely concerned with operational continuity and neglecting employees’ well-being and safety has consequences, too. Check on your people first, as they are crucial in executing processes. If you have a data backup plan but no one to facilitate it, then your plan — no matter how meticulous — is rendered useless. Make sure that your workforce is reachable, safe, and able. Make it a priority for the crisis management team to contact your employees and see what help may be given to make their situation better. Supporting your team when the worst happens is a guarantee that they can get back on their feet and return to work more swiftly. Mistake 5: Not having the right tech solutions in place You shouldn’t wait for a natural disaster to hit before setting up a toll-free hotline that employees can call in for regular updates. You also shouldn’t wait for a data breach before you start looking for ways to secure your data backups. Without the proper technology solutions to mitigate an incident, your business might face increased risks, prolonged downtime, and steep revenue loss. Talk to your IT department or consult with a technology specialist to ensure that you have all the tech safeguards you need in case things go south. The right IT solutions will streamline company-wide communication, secure workloads, and most likely minimize downtime. Want to learn more about business continuity and how it can help your business? Contact us today. Published with permission from TechAdvisory.org. Source.

Protect your privacy in Windows 10

Since its release in 2015, Windows 10 has gotten a bad rap for supposedly gathering too much personal information from its users. Whether you believe Microsoft’s operating system is invasive or you just want to pull out all the stops to keep your personal information safe, here are some Windows 10 settings you can tweak to protect your privacy. Turn personalized advertising off Windows 10 assigns each user an “advertising ID” that is used for ad personalization based on your recent browsing history. If you’d rather see generic ads targeted to you based on demographics rather than your ID, we recommend turning this feature off. Here’s how to do it: Click on the search box at the bottom left of your screen. If your search bar is hidden, right-click the taskbar and select Search > Show search box. Next, type in “Privacy,” then click on Privacy Settings and select General. Turn off the option that states “Let apps use advertising ID to make ads more interesting to you based on your app activity.” Lastly, open your web browser and go to this link. Once there, turn off the “Personalized ads wherever I use my Microsoft account” and “Personalized ads in this browser” options. Following these steps resets your ad ID, letting you surf the web without targeted advertisements. Disable Cortana Voice-controlled digital assistants have become big business. Microsoft aims to capitalize on this market with Cortana, an incredibly resourceful built-in assistant that allows you to quickly set reminders, schedule events, and send emails, among many other intuitive features. However, the way it uses the information it collects can become overbearing at times. Here’s how to disable Cortana: Type “Task Manager” in the search box, or use the keyboard shortcut Ctrl + Shift + Esc. In Task Manager, click the Startup tab and find Cortana in the list of programs. Right-click the row and click Disable. Open the Start menu, then find Cortana under All Apps. Right-click on Cortana, select More, and click on App settings. Toggle the switch under “Runs at log-in.” Once disabled, the Cortana option disappears and you’re now left with just a search bar, which you can use to search for things online or on your desktop. Stop peer-to-peer file sharing With peer-to-peer or P2P file sharing enabled, Windows 10 shares downloaded updates to your PC with other Windows 10 users in the same network by default. This helps other users update their systems faster and speeds up your upgrade downloads. However, if you are unhappy with your files being used by other users, you can turn P2P sharing off. Click the Windows icon and head over to Settings. Click on Update and Security then choose Delivery Optimization from the sidebar. Under “Allow downloads from other PCs,” switch the toggle to “Off.” If you want to share your files with PCs on your in-house network only, leave this option on and select the option that says “PCs on my local network.” For more detailed instructions on how to stop P2P updates, click here. Blunt Microsoft’s Edge Microsoft Edge is chock-full of features — such as Cortana Integration and typing prediction — that send data back to Microsoft. To turn off these intrusive functionalities, open Edge and click on the three dots in the far right corner. Then, click on Settings > Cookies and site permissions. There you have the option to disable a bunch of settings, such as those related to ads, automatic downloads, and location sharing. These simple security tips will stop Microsoft from tracking your online activities for good. Don’t hesitate to contact us today for all matters security-related. Published with permission from TechAdvisory.org. Source.

Security best practices for BYOD policies

Bring your own device (BYOD) policies give employees the flexibility to use devices they are comfortable with while allowing businesses to reduce hardware spending. However, BYOD also carries plenty of security risks. Loss or theft of devices – Employees often bring their personal devices wherever they go. This means there’s a higher chance of devices, as well as the data stored in them, being lost or stolen. Man-in-the-middle (MITM) attacks – Cybercriminals can intercept information transmitted from employees’ devices if these are connected to poorly secured public Wi-Fi networks. Jailbroken devices – Jailbreaking is the process of removing the restrictions imposed by the manufacturer of a device, typically to allow the installation of unauthorized third-party software. This increases the risk of an employee inadvertently installing malicious software on a personal device. Security vulnerabilities – If employees have outdated operating systems and software on their devices, cybercriminals can exploit unpatched vulnerabilities to gain unfettered access to company systems Malware – A personal device that has been infected with malware can spread that malware to other devices that are connected to the company network and cause data loss and downtime. To mitigate these risks, you must devise a BYOD security policy that works for the needs of your business as well as the needs of your employees. Here’s what you need to do: 1. Set passwords on all BYOD devices Prevent unauthorized access to company data by enforcing the use of passwords on all employee devices and accounts. Passwords should be unique; contain letters, numbers, and symbols; and are at least 12 characters long. It’s also a good idea to implement multifactor authentication to add another method of identity verification such as fingerprint scans or temporary passcodes sent via email. 2. Blacklist unsanctioned applications Blacklisting involves prohibiting the installation of certain applications on BYOD devices that are used for work purposes. This includes applications like games, social networking apps, and third-party file sharing platforms. The simplest way to blacklist applications is through a mobile device management platform that enables IT administrators to secure and enforce policies on enrolled devices. 3. Restrict data access Adopt the principle of least privilege on both BYOD and company devices. This means that a user is able to access only the data and software required to do their job. This can reduce the effects of certain types of malware and limit the fallout in the event of a data breach. 4. Invest in anti-malware software Anti-malware software identifies and removes malware before they cause irreparable harm to a device. The best anti-malware programs are often backed by the latest threat intelligence databases and use behavior-based detection techniques to pick up any traces of malware. 5. Backing up device data A well-thought-out BYOD policy can go a long way toward minimizing the risk of a security breach, but if something manages to slip past your defenses, you need to have backups prepared. Back up your data in off-site servers and in the cloud to ensure that any data stored locally on a device can be quickly recovered. 6. Educate your staff about security The vast majority of BYOD-related security risks involve human error. This is why you should educate your employees about proper mobile safety. Train them on spotting apps that could contain malware, sharing security threat updates, and securing their devices beyond enabling default security settings. You should also approach us if you need assistance with protecting your BYOD environment. As a professional managed IT services provider, we keep tabs on the latest trends and innovations related to BYOD and will recommend solutions that work for your company. Contact us today to see how we can help. Published with permission from TechAdvisory.org. Source.

6 Ways to save energy with your PC

It may be difficult to save energy when you use your PC every day. In fact, a complete desktop computer setup (i.e., one that includes an internet modem, a pair of loudspeakers, and a printer) that is on for eight hours a day consumes 600 kWh per year. But don’t worry, you can use the following tips to reduce your PC power consumption. 1. Unplug your computer when not in use When you’re not using your computer, it’s best to shut it down and unplug it. This is because a plugged-in PC — even when switched off — still consumes standby power. 2. Disconnect external devices When they’re connected to your PC, devices such as printers, headphones, and webcams consume power even when they’re not in use. This is why you should disconnect or remove external devices from your PC once you’re done using them. 3. Alternatively, use a smart strip, especially for computers you cannot turn off A smart strip is a series of several electrical outlets in one strip, with circuits to monitor and maximize your gadgets’ power consumption. It can electronically unplug any device so that they stop drawing current, which saves energy. By connecting your PC and peripherals (e.g., printers, scanners) to the smart strip, you won’t need to unplug your equipment when you’re not using them. 4. Adjust your computer’s energy settings Adjusting your PC’s power settings will help you consume less energy. For example, you can opt to put your hard drive and monitor into sleep mode when they’re left idle for a few minutes. Lowering the brightness of your screen also saves electricity. 5. Use a charger only when your laptop is charging When we charge our laptops, we tend to forget about them, leaving them plugged in for hours. Unfortunately, overcharging degrades the battery over time. Leaving the charger plugged in — even if it’s not connected to your computer — also consumes standby power. To save energy, make sure to unplug your laptop charger once you’re done charging. Alternatively, you can use a wall outlet with a timer or plug your charger into a smart strip. 6. Choose an Energy Star-compliant PC Energy Star is the US Environmental Protection Agency’s symbol for energy efficiency. Every product that earns the Energy Star symbol is guaranteed to deliver both quality performance and energy savings. The more stars a product has, the more energy-efficient it is. Studies show that a single Energy Star-compliant computer and monitor can save between $7 and $52 per year in electricity bills. These tips should help you lower your electricity costs and make smart hardware choices. If you need assistance in choosing the best hardware for your specific needs, give us a call. We’ll be glad to help. Published with permission from TechAdvisory.org. Source.

Everything you need to know about business phones

Should you consider adopting new phone systems for your business? To help you decide, we’ve defined the various types of phone systems, their different life cycles, and technology options in the past and the present. Different phone systems Today’s businesses still use landlines to connect with various stakeholders, such as customers, investors, and suppliers, to service their needs. However, telephony has come a long way from when it first came about in 1876. For instance, Voice over Internet Protocol (VoIP) phones have virtually unlimited reach, are automated, and are cheaper than ever to acquire. VoIP is a telephony solution that uses the internet instead of wired circuits to transmit data. VoIP does more than just transmit audio — it can also send a variety of data (video, multimedia, SMS, etc.) and perform other tasks as well. A VoIP system’s hardware (phone units, cables, CPUs, etc.) and software (one or more applications that run the system) can be either on-premises or hosted: On-premises – Hardware and software are physically housed within the premises of the company. Hosted – Some of the hardware, like phone units and other equipment, can be found within the premises. But most, if not all, of the software is hosted online. Service providers look after hosted systems for their clients. Life cycles: On-premises vs. hosted With hardware, it doesn’t matter whether it’s on-premises or hosted. Hardware is affected by the wear and tear stemming from daily use. Barring any accidents or physical damage, VoIP hardware should last several years. On the other hand, software requires regular updates. It’s worth noting that it’s faster and cheaper to update software that’s hosted in the cloud versus one that’s on premises. However, there’s not much difference in how much either one can last — software for both types of VoIP systems can last upwards of 10 years, depending on how dependable your IT support is. Technology today vs. before In the past, hardware and software were built to last. Today, they’re built to adapt and change, thanks to cloud technology. The effect of this shift on hardware and software is dramatic: Most hardware components are very similar, with replacements and upgrades coming every 5–8 years on average. Cloud software is faster, easier, and cheaper to upgrade than software for on-premises systems. Critical cloud updates can be released almost constantly, and a cloud system may be completely overhauled in as short as 2–3 years’ time. Whichever phone system you choose, it should integrate smoothly with the other systems in your business, such as email or customer relationship management software. And as your business expands, your chosen phone system should easily scale with it, too. Be a step ahead Downtime results in loss of potential sales and, essentially, wasted money. If your phone service is spotty and constantly unreliable, perhaps it’s time to switch to VoIP phones. Nowadays, it’s not the longevity of a tech solution that’s important, but rather staying ahead of the curve to trump the competition. Call our experts today so you can always leverage the best VoIP and other IT solutions available today. Published with permission from TechAdvisory.org. Source.

How Workplace Analytics improves your team’s productivity

Microsoft Workplace Analytics is a cloud-based service that allows organizations to assess employee performance using data gathered from Office 365. This enables business leaders to identify inefficiencies in how tasks are carried out, and then come up with a strategy for eliminating these in order to increase productivity. How does Workplace Analytics work? A paid add-on to Office 365 enterprise plans, Workplace Analytics extracts behavioral insights from data gathered from emails, calendars, documents, and Office 365 apps. This means any data an employee enters into Office 365 can be used to assess their performance and productivity. The data from which insights are gleaned are generated by employees themselves — how much time they spend on meetings, who they communicate with, and how much time they spend on productive tasks. All this data can be viewed on the Workplace Analytics dashboard, where information is sorted using the following metrics: Week in the life provides information on how the entire organization spends time and how employees collaborate with one another. Meetings overview shows the amount of time people spend in meetings. Management and coaching presents information about one-on-one meetings between each employee and their direct manager. The internal networks metric shows how people within your organization communicate and collaborate with one another. External collaboration provides insights into how your employees connect with individuals or teams from third-party organizations. Teams collaboration takes a look at how employees and managers use Microsoft Teams to communicate with their colleagues. What does Workplace Analytics aim to do? Workplace Analytics is designed to solve businesses’ most common problems, specifically issues related to productivity and engagement. Using Workplace Analytics data, business leaders can develop effective productivity strategies for the entire company. For instance, if the data shows that employees spend 60% of their time in meetings, managers can come up with a strategy to make meetings shorter or less frequent so staff can focus on productive tasks. Similarly, human resources personnel can use data on employees’ work patterns to identify the causes of burnout — now a widespread issue across businesses and industries — and make recommendations to address it. Workplace Analytics can be also used to determine how workers collaborate with internal and external parties. Suppose a member of your sales team frequently works and communicates with certain vendors. The sales team’s manager can pull up Workplace Analytics data and use it to assess whether or not this collaboration is helping the team meet targets, or if it’s causing them to miss out on other, more critical opportunities for collaboration and/or making a sale. Based on this information, the manager can also identify which employees are most likely to meet or exceed their targets and set company-wide standards accordingly. Finally, Workplace Analytics allows managers to determine an employee’s level of engagement, and whether workloads are fairly distributed among workers and/or departments. To ensure you get the full benefits of Workplace Analytics, partner with a reputable managed IT services provider like us. Our experts are highly skilled and experienced in implementing and managing Microsoft programs and services, so you can rest easy knowing your business is in good hands. Drop us a line today. Published with permission from TechAdvisory.org. Source.

Learn why you should only visit HTTPS sites

Everyone uses the internet daily for a variety of reasons: to work, shop, or communicate with other people. Browsing the internet has become so commonplace that we often forget to check whether the websites we visit are safe. Let this serve as a reminder: a website can be deemed safe if the website’s URL has an “S” after the “HTTP.” Learn why that “S” matters. HTTPS encryption The “S” in HTTPS stands for “secured.” It was introduced in 1995, so older websites that have been left on their own without regular maintenance usually don’t have it. But even to this day, unsecure websites exist, and fraudsters can easily take advantage of them. When you visit a site with an HTTP connection, everything you type or click on that website is sent without encryption. This means that anyone who intercepts the data transferred between the website and your computer can view them as is. Cybercriminals know this, and they can exploit this fact to gain access to your Social Security number, credit card information, and other personal data. This puts you at risk of identity theft and other fraudulent activities. HTTPS certificates When you visit a website, your computer uses an online directory to translate its alphanumeric name into a numerical address. It then saves that information on your computer so that it doesn’t have to check the online directory every time you visit the same website. In case your computer gets compromised, it could be manipulated into directing a perfectly safe web address like www.google.com to a malicious website. Most of the time, users are sent to sites that look exactly like the legitimate site but are actually fake copies designed to trick them into divulging their credentials. To prevent such incidents from happening, the online directories mentioned earlier issue an ecosystem of certificates that turn HTTP into HTTPS, making it impossible for anyone to be redirected to a fraudulent website. How does this affect our daily browsing habits? We often visit a multitude of websites in a short period of time without checking each one for padlocks and certificates. Unfortunately, we can’t ignore the importance of HTTPS, so here are a few things to consider the next time you browse the internet: If your browser marks a website as “unsafe,” think twice about clicking “Proceed anyway.” Click the prompt only if you are absolutely certain no confidential data will be transmitted. Add web browser extensions such as HTTPS Everywhere that create encrypted connections to unencrypted websites. These extensions encrypt your communication with websites and are compatible with Chrome, Firefox, and Edge browsers. Always be vigilant. Some sites may have HTTPS, but it doesn’t mean they’re safe. For example, goog1e.com (with the “l” replaced with a one) could have a certificate, but the misspelling clearly indicates that it’s an untrustworthy site. Cybercriminals use similar spellings of authentic websites to fool people into thinking that they’re on a secure site. This is called typosquatting or URL hijacking. And perhaps, just follow the easiest step of all: avoid sites that don’t use the HTTPS prefix. If you want to learn more about safer browsing habits and endpoint security, give our office a call. Published with permission from TechAdvisory.org. Source.

7 Steps to making your data hurricane-proof

Hurricanes are a common occurrence in many parts of the United States. Not only do they destroy property and endanger lives, but they can also disrupt your business’s operations. In this blog, we offer tips on how you can ensure fast access to your data following a disaster and immediately get back to business. Determine recovery hierarchy Certain parts of your IT system are more mission-critical than others. Ask yourself which systems and/or data must be recovered in minutes, hours, or days so your business can resume operations quickly For example, you may find that recovering sensitive customer information and eCommerce systems take priority over recovering your email server. Whatever the case may be, prioritizing your systems ensures that the right ones are recovered quickly after a disaster. Pay attention to location First and foremost, your backup site should be in a hurricane-free zone. Ideally, your off-site facility should be located at least 100 miles away from your main location. If this isn’t possible, make sure it is built to withstand wind speeds of 160 miles per hour (as fast as Category 5 storms) and is supported by backup generators and uninterruptible power supplies. You should also request an upper floor installation or, at the very least, keep critical IT equipment 18 inches off the ground to prevent water damage in case of floods. Use image-based backups Unlike fragile tape backups, image-based backups take “snapshots” of your systems, creating a copy of the OS, software, and data stored in them. From there, you can easily boot the virtual image on any device, allowing you to back up and restore critical business systems in seconds. Take advantage of the cloud The cloud enables you to host applications and store data in high-availability, geo-redundant servers. This means your backups can be accessed via the internet, allowing authorized users to access critical files from any device. Expert technicians will also watch over and secure your backups, allowing you to enjoy the benefits of enterprise-level backup facilities and IT support. Back up your data frequently Back up your data as often as possible, especially during disaster season. If your latest backups were created on September 15th and a storm makes landfall in your area on the 28th, you could lose nearly two weeks of data. Test your disaster recovery (DR) plan After setting up your backups, check whether they are restoring your files accurately and on time. Your employees should be drilled on the recovery procedures and their responsibilities during and after a disaster. Your DR team should also be trained on how to failover to the backup site before the storm hits. Finally, providers, contractors, and customers need to be notified about how the hurricane will affect your operations. As cell towers and internet connections may be affected during a hurricane, make sure your company forums are online and have your employees register with the Red Cross Safe and Well website so you can check their statuses. It’s nearly impossible to experience disruptions during disasters like Harvey or Irma, but with the right support, you can minimize downtime. If you’re concerned about any natural disasters putting you out of business, call us today. We offer comprehensive business continuity services that every company should have. Published with permission from TechAdvisory.org. Source.