When it comes to protecting your business from disasters, the first thing that comes to mind is natural disasters. Maybe it’s the overload of end-of-the-world movies or 5th grade emergency preparedness programs, but when creating a disaster recovery plan, technological catastrophes are often overlooked. Meanwhile the actions we take in our everyday lives revolve around multiple forms of technology, often unprotected and susceptible to criminal activity. Safeguarding yourself from technological threats and planning out how you’ll recover from one is imperative.

Experian disaster recovery planIn the case of either a natural disaster or security breach, coming up with solutions for damaged or stolen physical and nonphysical data is a fundamental piece of the puzzle. Backing up data through a cloud service and destroying expired physical data properly are two procedures that will help get your business back up and running in the case of a hardware malfunction or data corruption.

As criminals and hooligans are getting better at hacking into security systems and accessing confidential information, you should regularly evaluate and update your security infrastructure. Even if a criminal’s intent isn’t to steal data, a single virus can turn your business upside down, wreaking havoc on your day-to-day operations.

To make matters worse, nowadays criminals don’t need to be a master of disguise to steal data. According to Experian’s 2015 Data Breach Industry Forecast, “employees will be companies’ biggest threat”.  Performing employment screening and periodic audits of existing staff is imperative.

“These incidents prove we need to rethink our approach to information security,” Sword & Shield Director of PCI/EI3PA Services John Harmon said.  “We need to take a holistic approach and remember that just because a company is compliant doesn’t mean it’s secure and being secure doesn’t mean you are invulnerable.”

As you put together your written disaster recovery plan, make digital security a priority. Be proactive in updating your software, backing up your files, and performing employment screening to keep the disgruntled employees and ne’er-do-wells at bay.

In the event of a major disaster, CIC utilizes cloud based technology and maintains a physically separate backup facility to ensure service continuity and meets EI3PA Level 1 compliance. Keep channels like this in mind as you discuss what digital methods you’ll employ during a disaster to maintain communication with your community and avoid a backlash from your customers. No one likes living in the danger zone.

For more resources on emergency preparedness from cyber security to flooding and fires, go to the U.S. Small Business Administration.

For more helpful tips to protect your business, be sure to subscribe!

Enter your email address to follow this blog and receive notifications of new posts by email.

About the Author

Author Becky BowerBecky Bower is a communications intern here at the Resident Screening Blog. She holds a degree in English, with a focus in creative writing, from CSU Channel Islands. Her biggest weakness is cake and favorite superhero is Batman.

One comment

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s