Latest Post

Blog

Twitter warns about cyber attacks

Earlier this month, social media platform Twitter alerted a number of its users to the fact that their accounts may have been hacked into by something, or someone, known as a “state-sponsored actor.” While a warning of this kind is certainly not unprecedented – for some time now, both Facebook and Google have also been contacting any of their users who they think may have been targeted – it suggests that attacks of this type are becoming more widespread.

But how at risk actually are you from a state-sponsored cyber attack? Is your small or medium-sized business in danger of being targeted? And who is behind these hacking attempts? Well, going by the warnings recently issued by Twitter, reports so far suggest that people, companies or organizations connected to internet security and freedom of speech are currently most likely to be at risk. But ‘currently’ is somewhat ambiguous, for in the world of cybercrime things can happen at lightning speed, and someone who is a target today might be deemed out of danger tomorrow – and vice versa.

As always, the best form of protection is to be forewarned, and you can only do that by learning as much as you can about the latest threats, scams and attacks. If you are a Twitter user, be it personal or for business use, you may be wondering why you have not yet heard of these alerts. That’s because Twitter’s messages were only sent to a small, and mostly rather niche, group of users. The email informed these users that Twitter was contacting them as a precaution due to their accounts “possibly” having been hacked by the state-sponsored actors. The email also stated that they believed that the actors may (or may not) be associated with a government, and that those involved had been looking to obtain personal information such as email addresses, phone numbers and/or IP addresses. So far, so vague!

Twitter then goes on to say that, although they have no evidence that any accounts were compromised or any data was stolen, they are actively investigating. They also lamented the fact that they wished they could say more…but that they had no additional information at that time. The email goes on to attempt to reassure users that their accounts may not have been an intentional target, but admits that if a user tweets under a pseudonym, that Twitter understands they may have cause for concern. But with so many Twitter users tweeting under a different name – and perfectly innocently, at that – what’s the real cause for concern here?

The issue lies with the type of accounts that were mostly targeted. The majority of these belonged to people or organizations connected to, or concerned with, cyber security. In fact, Twitter even offered some handy advice on protecting your online identity, suggesting users read up on the subject at the Tor Project website. Somewhat coincidentally, one of the victims of the attempted Twitter account hack is an activist and writer who currently educates journalists about security and privacy – and who used to work for the Tor Project. Another is a Canada-based not-for-profit organization involved with freedom of speech, privacy and security issues, and one of its founders is a contractor for the Tor Project.

Other Twitter users who received the email are also involved in some way or another in cyber security, albeit as self-described “security researchers” or simply by way of following or engaging with the online security community. This might lead you to the conclusion that, if you’re not in the business of security and instead keep your tweets to sport, entertainment, and the latest must-have gadgets, you are not at risk. But we urge you not to be so hasty. That’s because, within that small group of people who were contacted by Twitter, a large proportion of them had nothing to do with activism, freedom of speech, calls for greater privacy, or anything of the sort.

This means that, far from brushing this latest round of cyber threats under the carpet, individuals and business owners – whatever industry they are in – do have at least some cause for concern. As yet Twitter has not released details of the state the “actors” are sponsored by, so for now we are none the wiser as to whether it’s a homegrown issue or one from further afar – say North Korea or China.

What does all this mean for you as a business owner or manager? It means that you should be taking your online security more seriously than ever. It’s no longer just your network that is at risk; now simply having an account on a social media site such as Facebook or Twitter could be providing less-than-desirable third parties with the portal they need to access your company’s private information.

If you’d like to know how to ensure the online safety of your organization, give us a call today. Our experts have experience in everything from securing your computer network to increasing safety when it comes to sending out those all-important tweets!

Published with permission from TechAdvisory.org. Source.

Google and the art of safe mobile browsing

With the vast majority of end users turning to Google as their search engine or default browser of choice, it comes as no surprise to learn that the company takes security seriously. But in a perpetually changing landscape where anti-virus and anti-malware tools are constantly chasing their tails in order to stay up to date with the latest threats, there cannot be many small to medium-sized business owners who can afford to ignore the issues surrounding cyber security. So what exactly is the internet giant doing to keep your users – and your organization – safe?

With more than one billion people using Google’s search engine on their desktops, and over a billion more accessing it through mobile devices, it is clear that security is – or should be – paramount. Google already claims to protect desktop users with its Safe Browsing service, but what about its mobile users?

With cyber threats ranging from the annoying, such as adware, to the unsavory – hello spyware – and the downright terrifying (ransomware, we’re looking at you), mobile device users are increasingly demanding to know that they are being adequately protected when using Google’s products, tools and services. So in order to protect the mind-bogglingly large number of people who are using Google on their smartphones, laptops, notebooks and tablets, Google recently unveiled plans to extend its Safe Browsing service to mobile users – or at least to who are using Chrome on an Android device.

Whether you regard this as a blatant ploy to get users to switch to Android is something we’ll let you decide for yourself, but the fact is that Google is taking steps to protect its users. Back in August 2014, the company bolstered its Safe Browsing warnings with messages alerting users to unwanted software programs trying to sneak onto their computers by attaching themselves without warning to a legitimate download. In addition, both the Android platform and the Google Play Store have security measures in place to weed out potentially dangerous apps.

However, not every cyber security threat comes from an app or installation so, while Google is doing the right thing by guarding against threats in these areas, there are other issues that require a different means of protection. Enter social engineering, and phishing in particular, which can cause untold harm – such as data or identity theft – to a business or individual.

In order to protect against social engineering, an up-to-date list of malicious websites needs to be stored upon the device – this enables Google to send an alert to the user before they get ambushed. But there are problems with this which Google has had to overcome, not least of which is how to keep the list updated in the face of new threats. Compounding this issue further are factors that are unique to mobile browsing: mobile data speeds can be slow and connectivity patchy, depending where the user is. A fast, stable connection is crucial when the timing of an alert is paramount. Not only that, but using mobile data costs the end user money!

Bandwidth (and battery) limitations mean Google has had to find a way to ensure the data they send to users is as small as possible. Protecting their customers is crucial – but so too is not sapping battery life and data plans. Because this boils down to connectivity and speed factors, a device’s location is now taken into account. For example, if a known phishing scam is only affecting certain locations, only devices that are in that part of the world receive a warning.

Google also prioritizes data by sending information on a need-to-know basis – in other words, bigger threats take precedence over more minor issues. They have also designed the software to limit network traffic, and to be as light as possible on memory and processor usage.

Since its announcement in early December, Google is now protecting all Chrome users on Android devices as default, making Safe Browsing part of their Play services from Version 8.1 onwards. Chrome Version 46 is also the first app to initiate Safe Browsing.

How do you know whether you are protected by Safe Browsing mode? Go to your settings in Chrome, and check your Privacy menu. How do you know if your small or medium-sized business stands the best chance of survival in the face of a cyber attack or phishing scam? Talk to us today and we’ll be more than happy to share our up-to-date knowledge with you.

Published with permission from TechAdvisory.org. Source.

When should you invoke your BCP?

A Business Continuity Plan (BCP) is a valuable security blanket for countless companies across the nation. And while business owners hope they never have to invoke their continuity plan, it is important to understand which events might necessitate it coming into action. By understanding how certain disasters can impact your business, you’ll have a better idea of when and if your BCP needs to take affect.

When a disaster happens, your first thoughts will likely revolve around how it will affect your business and the services it provides. Depending on what occurs, you might be required to call your Business Continuity Plan (BCP) into action to ensure your company remains operational and that any Recovery Time Objectives are met.

Unfortunately, too many business owners fail to properly prepare themselves for taking this action, by viewing disasters as two-dimensional events. Realistically, a disaster has many possible outcomes and is not as black and white as you may think. For instance, think about how a flood can disrupt your company.

The logical conclusion for most business owners is to picture their office underwater. While that is one possibility, several others may also exist that could require you to consider implementing your BCP. A flood may not disturb your office, but what if it strikes an off-site storage facility where you keep digital or paper data? This is likely to have just as great an impact on your business, and necessitate your BCP coming into action.

Here we’ll take a look at a few other disasters that can happen, and which factors you need to consider before implementing your BCP.

Fire

If a fire takes place at your business, invoking your BCP is a fairly obvious decision. However, what do you do if a fire occurs in the same building as your office, or next door to you? It can be a problematic situation as you may not know what, if any, damage has occurred. Smoke travels fast and can leave behind soot, which may render your servers inoperable or highly unstable. There may be health issues at play as well, and sometimes it is not be feasible to have your employees working in the office in the immediate aftermath of smoke damage.

Before invoking your BCP in this situation, you will want to speak with fire crews on the scene about when they will let you back into your office and what kind of damage has been done. This should give you the necessary information on how to proceed, and enable you to decide whether your BCP needs to be put into action.

Civil unrest

It can be hard to gauge what to expect in times of civil unrest. We have witnessed large protests that remained peaceful, but we have also seen ones that have become unruly and destructive. Several business owners had to halt or significantly reduce services in places like Missouri and Baltimore because of the latter. Only time will tell if they are able to recover, or end up having to shut their doors for good.

Due to the volatility of these events, it is impossible to fully prepare yourself, since you can never completely know how the situation will pan out. Instead make sure you and your staff are prepared to invoke your BCP should the situation deteriorate. Even if something were to happen at your premises, if you’re diligent and paying attention you should be able to act quickly and prevent a large-scale service disruption.

Security threats

Most people don’t put things like viruses and security breaches in the realm of disasters, and that in and of itself can be disastrous. Let’s use one of the fastest growing security threats to small businesses, ransomware, as an example. It could be downloaded to your network by a deceptive email and opened by an employee. When ransomware makes it way onto your network, it will encrypt or block all access to your data until you pay a sum of money.

Because ransomware can appear suddenly, often business owners get flustered and either pay the ransom or suffer a long period of downtime trying to figure out how to fix the problem. Either way, money is lost. If ransomware or any other security breach occurs, it’s important to quickly analyze the situation and determine whether you need to invoke your BCP, which should allow you to avoid both downtime and ransom payments.

It’s important to remember that a disaster can appear in many different ways, shapes and forms. If you need help on determining when it is appropriate to initiate your BCP, or have any other questions about how a BCP would help your business, give us a call.

Published with permission from TechAdvisory.org. Source.

The keys to a successful Office 365 migration

Microsoft Office 365 is growing in popularity as more and more businesses make the move to the cloud. However, without proper planning and testing beforehand, you could get stuck in the middle of the migration process, end up with duplicated data, or even have to abort the transition completely. Needless to say, all of these scenarios could result in serious network downtime. But you can easily avoid a migration nightmare by considering these key points before making the switch to Office 365.

Do your research

Researching Office 365 can seem a little overwhelming at first, but it will certainly give you a good idea of how everything will work, and what you can expect before, during, and after the migration process. You should understand and anticipate how your business’s daily operations will change when you make the move to a cloud-based platform. You also need to be aware that traditional Microsoft Office programs and Office 365 applications are completely different in terms of functionality, features, and interface.

Create a checklist

Most businesses fail to create a comprehensive migration checklist, because they tend to focus on the technical aspects without addressing other areas that are critical to the migration’s success. These include elements such as training, informing users, and gathering adoption feedback. You can start by drafting a step-by-step plan that clearly defines the phases of the migration process, and then keep refining the plan until everything is covered.

Check email settings

For a seamless transition, you need to synchronize accounts between your active directory domain and Office 365, by using Microsoft’s Azure Active Directory Synchronization tool. Don’t forget to point your company’s mail exchanger record to Office 365, so new emails will be sent directly to the new mailboxes in Office 365. Misconfiguration of email sync during the migration could flag your organization’s email as spam, disrupting the communication process with your clients and partners.

Choose your migration

Each migration plan looks different, and you should choose the one that best fits your needs. Generally, Office 365 migrations can be divided into three categories:

  • Cutover migration – this is a single provisioning and transfer of mailboxes, users, contacts, and mail groups to Office 365. The cutover process can handle up to 2,000 mailboxes, and the migration time depends on the number of users and mail volume.
  • Staged migration – if you don’t want to migrate all your resources at once, staged migration is a good alternative. It allows you to move mailboxes in smaller batches over a much longer period of time.
  • Hybrid migration – this type of migration is perfect for organizations that need to move more than 2,000 mailboxes and wish to run local Exchange servers and Office 365 simultaneously.

Test everything

Once you have broken down the whole migration into various phases, it will be easy to design a testing procedure for each phase. Standard testing processes include migrating a small amount of data, sending and receiving emails, and application trials, in order to ensure that everything works as expected. The more components you can test before migrating to the platform, the less chance there is of your company facing issues afterwards.

If you’re considering an Office 365 migration, why not let our expert technicians do the job for you? We can migrate your resources seamlessly and smoothly without disrupting your business. Get in touch today.

Published with permission from TechAdvisory.org. Source.

Adding value to your company’s blog

Blogging has gone from being a fun side project for aspiring creatives to an absolute necessity for businesses of all sizes. For many companies, especially small to medium-sized ones, it’s likely to be just about the only web page that is updated with any regularity on their websites. And that’s why you need to be pushing your blogs. With hard work and engaging content, you can morph your company’s blog from afterthought to valuable asset that brings in people to your site.

Do any of these sound like your blog?

Sporadic posts often months apart
A once vibrant blog that is now nothing more than digital tumbleweeds blowing by
A page that says “coming soon”

We’re not here to judge. However, if any one of these scenarios resembles the current state of your blog, it might be time to do something about it. We know you’re busy and that the last thing you want to do is write about your business but, with content that is carefully crafted and curated, your company will have an unique asset that can help lead your marketing, by establishing you as an expert in your field, and promote sales efforts by driving people to your website.

You’re probably wondering where to begin. Well go ahead and reset the password for your WordPress or Tumblr account, because we have a few pointers to help you get started.

Use your blog to build your brand identity

For small and medium-sized businesses, it can be difficult to build a brand identity. You have your logo and colors, but what does your brand consist of beyond that? What is its personality, what characteristics does it have, and what is its tone? These are just a few of the questions you need to consider before you begin writing your blog posts, or having someone else write them for you, of course, which is a good option for busy business people.

A blog that reflects the personality of your business helps to give you a brand identity in the minds of readers by letting them know just what your company is. A hardware store is most likely going to want the contents of its blog to be straightforward, reliable and no-nonsense, while a marketing company is likely to have a blog that shows off its creativity, playfulness and skill at design and wordplay. This is your chance to develop your company’s identity, and explore just how you wish to be perceived by online readers.

Tip: Before starting to write posts for your blog, picture your business as a person, and write down what this person would say and how they would say it. This should be used as the foundation for each and every blog post.

Create a strategy and schedule for your blog

A clearly defined schedule and game plan for your blog will help make sure that once the ball starts rolling, it keeps rolling. Your goal from a scheduling perspective should be to have at least one new post a week. More is always better, but weekly posts will at least let both readers and Google know your site is still active.

In terms of a blogging strategy, don’t feel like every post needs to be a second coming of The Odyssey. Sometimes all you need to do is come up with a quick tip, or share a video you think is useful to people visiting your website. Varying the the length and type of content featured on your blog is a good way to keep things fresh.

Tip: At the start of each month, you should come up with blog topics and a deadline for each post. This should help make sure content is always going up on your blog.

Lead and inform, but do not sell

One of the biggest challenges for small and medium-sized businesses with a blog is to keep the content related to your company without putting on the hard sell. Realistically, the goal of your blog should be to point people in the direction of your business without pushing them into buying something. They should be able to reach that conclusion organically.

Let’s use an auto parts store as an example. A blog on the quality of the windshield wipers it sells is unlikely to generate a lot of interest. That’s because it is not something that resonates with a lot of people. A post on the dangers of driving with old wiper blades, however, will help get readers more interested in investing in new blades. And the good news for them is that they can purchase new wiper blades right, without even having to leave your website.

Tip: In addition to creating informational posts, don’t be afraid to add blog posts about your employees, especially if you do not have dedicated staff pages on your website. This can enable people get to know the names and faces behind your business, and help potential customers to feel more comfortable with your company as a whole.

You made it to our blog, so there must be something to this whole blogging thing. Get in touch with us if you want to know more about how blogging, or any other technology-related tools, can help add value to your business. And of course, feel free to keep reading our blog while you’re here!

Published with permission from TechAdvisory.org. Source.

Your guide to smart BI planning

You have finally decided your small or medium-sized business is ready to utilize Business Intelligence (BI) software. This is a big step for your company and one that must be approached with diligence. If you are not careful the cost of BI software, not to mention training, could far outweigh the actual benefits you end up receiving. However, with thoughtful BI planning, you are likely to see results you would have never thought possible.

Quite a few business owners see other companies using BI software and tools successfully and hope to emulate those results. Unfortunately, BI goes far beyond installing a program on your employee’s computers and expecting them to churn out results because of it. In fact, without proper planning in place, you could end up losing money on your BI investment.

If you’re ready to bring BI software and tools to your small or medium-sized business but aren’t quite sure what your should be looking for, here are four things you need to consider during the planning process.

What data do you need to know

BI software is great at helping you obtain data and presenting it to you in all kinds of different ways. But it’s only helpful if you can actually use the information. Too many businesses jump on the BI software bandwagon because they hear about the great results other companies have achieved using these tools. However, if you don’t know what information you’re looking for or how to use that data to your advantage, BI software essentially becomes a toy for you and your staff to play with.

That’s why you need to fully understand what information and data your business needs before implementing any BI software. This will help you pick the best tool for your needs and then utilize it to great effect.

Create specific goals

When you are planning to implement BI software it is vital to have a specific endgame in mind. Increasing profits sounds great but it’s hard to utilize BI effectively when tackling a goal of that magnitude. Instead focus on performance metrics you can measure like higher closing rates or more online conversations. This will help make your planning easier and allow you to find the BI tools required to reach those goals as well as track your progress along the way.

Think about today and the future

It is important to not only think about BI software in correlation to your short term goals but your long term ones as well. You want to make sure your BI software is useful both now and in the future. Find something that can grow alongside your company over the long haul. You don’t want to constantly be changing or adding on to BI tools unless it is absolutely necessary. If possible, find BI solutions that are scalable and flexible so they can help over a longer period of time.

Keep it simple

Sometimes the desire to know more about your company can see you end up overloading your staff and employees with complex toolsets and data. The goal, especially for small and medium-sized businesses, should be data that is quickly accessible and easy to comprehend. This will allow you and your team to make speedy and informed decisions. Convoluting the process with unnecessary information or complicated process will only serve to negate what you are trying to do by installing BI software in the first place.

BI tools and software are designed to help you work smarter, not harder. When you plan to bring them to your company, this is something you will want to keep at the forefront of your decision making process.

If your company is looking to start utilizing BI tools, our team of experts can help. Together we can create a BI plan that works best for your business.

Published with permission from TechAdvisory.org. Source.

What to consider before you buy a new PC

With the holidays approaching, computers are likely to be among the season’s best-selling gifts. But there are so many different types of computers out there, each with varying specifications and capabilities – how do you find the best one for your needs? Whether you’re purchasing a computer for yourself, for your loved one, or for your friend at work, here are a few things to keep in mind that will help you make the right decision.

Desktop or Laptop?

This depends on your working style and environment. The rule is quite simple: if you rarely work out of the office, get a desktop PC. If you need to work at home, on the go, or at client meetings, then go for a laptop. It’s worth noting that desktops are generally cheaper than laptops at similar specifications, have a longer usage life, and make for easier changing or upgrading of components. Laptops, on the other hand, are very portable due to their compact size, they consume less energy, and they offer a more flexible user experience.

Processor

If you want a computer that loads programs in a flash, completes tasks almost instantly, and runs smoothly at all times, then we recommend you invest in the strongest processors available. The performance of a processor is determined by its number of cores and speed, so the bigger the number, the better. Processors with two to four cores will often suffice for most users. However, if your tasks involve rendering high-definition images, animations, graphics, and analysis, then for optimum results it makes sense to get a processor with more than four cores.

RAM

Random Access Memory (RAM) allows your computer to perform multiple tasks at once without a hitch. Just like processors, the amount of RAM your computer has will determine how fast it will run when you work on several programs simultaneously. Nowadays, standard computers come with 1-2GB of RAM. However, we advise you to get at least 4GB, or even 8GB, of RAM so that you can navigate smoothly between tasks such as email browsing, Internet surfing, and working on word processing documents and spreadsheets.

Hard Drive

The bigger the hard drive, the more space you have to store files. If you plan on using your computer with no peripherals, you’ll want to choose a computer that offers the biggest hard drive. But remember that you can always purchase an external hard drive to transfer or store files if your current hard drive is running out of space. Another thing to consider in a hard drive is its spin speed. Modern computers usually have 5400rpm or 7200rpm drives, the latter being more efficient. The faster your hard drive disk is spinning, the quicker data can be transferred to and from it.

Operating Systems

Picking an operating system is a big decision when it comes to choosing a new computer. You’ll probably want to stick with an operating system you’re already familiar with, since it can take some time to adapt yourself to a new OS. Here are some of the popular options available on the market:

    • Windows
    • Mac
    • Linux
    • Ubuntu

Most people will just go for either Windows or Mac OS, because the complexity of Linux and Ubuntu mean they are are not popular among everyday users.

Want more hardware tips and tricks? Get in touch with our technology experts today.

Published with permission from TechAdvisory.org. Source.

Office 2016 for Mac is here

For Mac users who have been waiting with great anticipation, Office 2016 for Mac is finally available. The new version is worth the wait; Microsoft has implemented exciting new upgrades to improve the user experience. Office 2016 possesses far superior functionality and user interface than its predecessor, Office 2011. We’ve highlighted some of the new features of Microsoft Office’s core applications and cloud-based services that you need to be aware of.

So what’s new?

The obvious change in Office 2016 for Mac is the user interface. You’ll experience a cleaner and more modern design that looks consistent across all core applications. The toolbars and icons have been redesigned with a minimalistic approach, resulting in less clutter and making it easier to find what you’re looking for.

Looks are not the only improvement. Office 2016 for Mac provides huge improvements to the performance of Microsoft’s well-known applications.

Word 2016

Apart from the interface changes, in Word 2016 multiple Mac users can now work simultaneously on the same document. When a user working on a file saves any changes, a notification that highlights the changes is sent to other users. This new feature is similar to that of Google Docs, where users can collaborate by sharing and editing files online. Word 2016 includes a style pane on the right-hand side of the screen. When selected, you can apply pre-set styles to texts and paragraphs. What’s more, Word 2016 also adds a nifty new navigation pane, allowing you to navigate through files based on the changes you’ve made, including comments, formatting, deletion, and more.

PowerPoint 2016

The most prominent change made to PowerPoint 2016 is the redesigned ribbon. Many ribbons have been removed, renamed, and given new icons. The new PowerPoint also has the very same collaboration features as Word, meaning you and your colleagues can edit presentations simultaneously. In addition, Microsoft has added 24 all-new themes to PowerPoint, and these aren’t just normal themes – with just one click, you can alternate between different color palettes, fonts, and background styles for your current theme. These new features are identical to the ones in PowerPoint for Windows, but they have more functionality and are much easier to use.

Excel 2016

As soon as you launch Excel 2016, you’ll be greeted by its modern new appearance. One addition is a slicer tool that greatly increases the performance of pivot tables. With slicers, you can create buttons that simplify data filtering in a pivot table report without the need to use drop-down lists. Another new feature worth mentioning is the inclusion of the Analysis Toolpak extension. This add-on is especially useful if you want to generate complex statistical and engineering data – the Analysis Toolpak offers a number of advanced formulas that were absent in the former Excel for Mac 2011.

Outlook 2016

The previous Outlook for Mac 2011 proved to be flawed in many areas. And if you find that Apple Mail is not living up to your expectations, Outlook 2016 will be a great alternative to meet your email needs. As with other Office 2016 applications, the new Outlook has gotten a visual revamp. Some notable new features include improved usability, such as a blue vertical bar spanning across unread messages, faster email search and filtering, and a more powerful database and mail server that enables you to send and receive messages much more quickly.

Want to learn more about Office 2016 for Mac, and how you can implement it into your business? Give us a call today; we’re sure we can help.

Published with permission from TechAdvisory.org. Source.

Communication before the storm is key

As it is only a matter of time before the first winter storms hit in many places, you might want to consider taking a look at your company’s business continuity plan. Each year heavy snowfall and other weather-related incidents interrupt services and cost businesses money. One way to prevent this from happening is by communicating with clients and staff before a storm hits, in order to ensure everyone is prepared.

While weather varies drastically depending on where you live, nowhere is immune from inclement conditions during the winter. It’s only a matter of time before your local weatherperson appears on TV warning you to brace for yet another “Storm of the Century”, and in turn everyone whips themselves into a frenzy preparing for the worst-case scenario.

However, you shouldn’t just be focusing on your personal affairs; you need to make sure your business is ready as well. Even if the forecast doesn’t turn out to be accurate, it’s always better to be safe than sorry. For this to happen, you will need to stay in constant contact with both your employees and customers before and during a storm to make sure they know what to expect. Doing this will help limit interruptions and make sure clients can adjust the expectations they have of your business. Here is how you can use communication technology to prepare for any possible service interruptions caused by bad weather.

Employees

The great thing about technological advancements over the past few years is that they allow for many employees to work from home, or from anywhere that has an internet connection. However, they must be prepared to do so. That means you should be letting employees know that there is a chance they might be working from home three or four days before a storm is due to hit. During this time, have your IT department or provider check with those employees to ensure they have the capabilities to work from home, even if it is in a limited capacity.

During this time, designate certain employees as flex workers if you can’t determine just how bad the weather will be the next day. This means that they will check the weather in the morning and come in if it is safe. They will also be in charge of informing other employees whether or not they will need to come into work.

Finally, make sure there is an updated spreadsheet or file with all your employees’ contact details, and that this is available to those who may need it. It is important that each person at your company is able to be reached via multiple channels, because you never know which services a storm may knock out. Having this ready before anything happens will allow for more efficient communication during inclement weather.

Customers

Your customers depend on you, and it is absolutely vital that you keep them informed of how the weather situation will affect your business. One of the easiest ways to do this is via social media. In the days leading up to the storm, let your followers know that you are keeping an eye on the situation, and provide contact information for someone at your company who can give them additional information if needed.

If your business will have to close because of bad weather, it’s good practice to announce it as far ahead of time as possible. Ideally this will be done on the night before or, at the latest, early in the morning of the closure. You don’t want customers trekking in three feet of snow to get to your shop or office, only to find out it’s closed.

Make sure you get in touch with clients right away to inform them of any delays that might occur in delivering goods or services because of the office shut-down, and give them an estimate as to when your business will be fully operational again. Just because you aren’t responsible for the weather doesn’t mean you can stop being accountable altogether. Staying ahead of the game will prove to clients that your company is organized and prepared for anything.

Of course, communication is just one part of a comprehensive business continuity plan. Contact our experts today and find out how we can keep your company functional no matter the weather.

Published with permission from TechAdvisory.org. Source.