Blog

December 18th, 2014

SocialMedia_Dec15_AWhen working with social media in your business there are a number of metrics commonly used to determine whether the content you create and share is effective. One of the best metrics to employ is the number of shares each piece of content receives. More shares usually means higher visibility and therefore a greater impact. However, many businesses struggle to get their content shared. Here's four reasons why.

1. The vast majority of people are hesitant to share content

According to a study conducted by Carnegie Mellon University and Facebook over a 17 day period, approximately 15.3 billion comments and posts were written but were then deleted and not posted on Facebook alone.

While the reasons will have been varied, the numbers highlight that the vast majority of users are sensitive to what they post on Facebook, and most most likely other networks as well. What does this mean for businesses? Well, you need to ensure that the content you are posting offers value to not only your audience, but their audience as well.

Think about when you have shared content on any network. You probably didn't do so 100% for yourself, but instead shared the content or created a post so your audience would interact with it, or possibly get something out of it. Think of this as the "hmm, that's interesting, other people will like it too, so I'll post it" mentality. By sharing content others enjoy or respond to you get the benefit of increased recognition.

If you can create content that gets people to think this way, there is an increased chance that they will share it.

2. Facebook users want to be seen in a positive light

According to a study carried out by INC. 80% of respondents share content because it shows that they are being a good friend to those they care about. People use social media to foster good relationships and connect with those they care about. And if somebody regards your posts as potentially able to tarnish their image on social media, they won't share it.

Businesses looking to capitalize on this need to try to create content and campaigns that help users better relate to one another. Combine this with the above example of creating interesting-to-share content and you will be more likely to see an increase in shares.

3. Content doesn't fit our salient identities

Because social media has become an extension of society, many experts apply common social science principles to it. The most commonly applied theory is of the five identities (relational, personal, social, superficial, and collective) that determine how people behave in a certain situation.

If you are posting content that doesn't fit with an an individual's current identity then it's not going to be shared. So, how can businesses capitalize on these changing identifies? One effective way is to get to know your main target audience; how they act and react to certain social cues, and then create content to fit with this behavior.

For example, if your target group for posts is parents, then using language and content that triggers parental instincts could increase shares as parents associate better with it.

You might want to widen your focus too and try developing content that capitalizes on different identities, tracking what works best.

4. Content doesn't mesh with a user's values and goals

The same INC. study found that after being a good friend, 63% of users surveyed noted that they were more likely to share content that reflected their goals, values, and dreams.

How can a business capitalize on this? The best way is to get to know your audience. Look at their posting and sharing habits and the type of content they share on a regular basis. This may change over time, but you will see patterns evolve for different groups. If you can develop and post content that reflects these main goals and values then you are more likely to see your content being shared. Try different approaches and keep in mind who you are developing content for.

If you are looking to learn more about social media, contact us today to see how our systems can help you integrate it with your business success.

Published with permission from TechAdvisory.org. Source.

Topic Social Media
December 12th, 2014

productivity_Dec12_AEmail has become the main form of communication for many businesses. When first launched, many people treated email as simply an electronic version of company memos and letters and therefore created and styled them as such. Over time, email has become much more informal, and while this is great it can lead to problems in overall clarity of communication. However, there is one effective way you can ensure all of your messages are clear and understandable, by adopting PAR.

Better email structure for small businesses

In order for your emails to be clearer and to get the overall message across easily, you might want to implement a PAR structure. This three part framework has been used by many business owners and managers to improve overall communications, and consists of:

Problem

At the very top of the email, below the salutation, provide a brief yet clear overview of the problem which is the subject of the email or the reason you are making contact. When writing this overview don't assume anything, including shared knowledge or agreements, unless you have discussed these with all recipients beforehand. The key here is that you are looking to be able to summarize the main issue.

If you need more than two paragraphs, then you should probably create a longer form report that is attached in the email. The reason for this is because the vast majority of people will simply scan an email, and if it's too long, they will usually skip it, or possibly miss key points. If it is easy to scan and read, then there is a greater chance all parties will be on the same page.

Beyond this, if you are struggling to come up with a short explanation or can't clearly summarize the problem in writing, then email may not be the best medium to be using. Opt instead for a meeting or phone call to discuss the issue more fully.

Action

After stating what the problem is, clearly mark any proposed actions or recommendations using a relevant heading, then specifically lay them out in an easy to read format. You want to be as specific as possible here, ensuring that all parties understand what you want to happen and the actions they will need to take as a result.

For example, if you use vague language, such as: "I need this by the end of the month", people may only carry out what you are asking for on the very last day of the month. Instead, you might be better to give a specific delivery date, and possibly a set time, so that any deadlines are clearly defined. Bulleted and numbered lists can really help here, as long as they are clear and understandable and don't muddle the issue.

Results

Finally, identify the expected results based on the actions you want the recipients to take. This helps ensure that every recipient knows what they should be striving for, as well as serving as an indicator of whether the problem has been specifically solved or not.

If the results aren't met, you have a good opportunity to look back at the process and see if there is any room for improvement, or try to pinpoint exactly why something went wrong or didn't happen as you planned. This in turn, if leveraged correctly, can help improve overall productivity.

Looking to learn more about increasing productivity in your office? Contact us today to see how our systems can benefit your business.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
December 11th, 2014

BusinessValue_Dec11_AThe holiday season can be stressful and expensive for everyone, employees and business owners alike. While it is great to start a new year, it can be tough to justify or find the funds for new expenses, even if there is a real need. Instead, you may want to look for cost saving tools that can help improve business operations for less. To help, here are five free or affordable tools that can make your business life easier.

  1. Canva If you are a business owner, chances are that you aren't the world's best graphic designer, unless you run a graphics company of course! In order to design graphics, icons, flyers, and even posters you need specific graphics software. This can be expensive and the software is not going to be easy to use for design novices. You may even need an in-house graphic designer. This is where Canva comes in.

Canva is an online app that allows users to quickly and easily create professional looking graphics using drag and drop functionality and a wealth of free, or affordable, stock images. In other words, you can create designs in a short amount of time.

The service itself is free, but some images do need to be purchased.

  1. FreshBooks Most business owners are not certified accountants either, and even if you understand the basics of accounting and tracking of finances, the money side of your business is often a full time or at least a specialized job. If not handled correctly, this could spell disaster for your business. One solution is cloud-based FreshBooks.

FreshBooks is accounting software that allows you to invoice clients, track payments, accept payments, track expenses, and access financial reports at the click of a button. Beyond this, you can connect FreshBooks with your payroll services to ensure that your employees are paid on time.

The platform offers a free plan that allows you to track and manage one client, while paid subscriptions start at USD 19.95 a month.

  1. Hootsuite Many businesses have a presence on more than one social media network. While this is a great way to reach out to the highest number of customers, it can be a chore to manage and maintain a presence on all of these networks all of the time. Hootsuite is specifically aimed at this task.

Hootsuite is a tool that allows you to manage your social media accounts from one platform. Using Hootsuite you can schedule posts, set up streams, establish keyword tracking, and track engagement. It really is a one-stop-shop for all of your social media platforms.

Hootsuite offers a free subscription which allows you to manage three social media profiles, while a business subscription starts at USD 8.99 and allows you to track up to 50 profiles and gives you access to more advanced analytics and features.

  1. Podio Managing projects and ensuring that all employees are aware of what they should be doing, and what others are doing, can be one of the toughest tasks for any business owner. Sure, spreadsheets and communication work to a point, but there is always room for error and of course improvement, which is what Podio provides.

Podio is a project management app that allows you to easily manage projects, tasks, deadlines, and even files. Using an intuitive dashboard that all users have access to, employees and managers can easily see who is doing what, as well as what needs to be done and what has already been done.

Podio is free with limited features for five users and costs USD 9 per user, per month for the full subscription plan.

  1. CoSchedule If you have a blog, either on WordPress or hosted by WordPress, sharing the articles you post on your social media profiles is a great way to increase content reach and interaction. However, it can be time consuming to actually create posts on each different platform, unless you use CoSchedule.

With CoSchedule you can write your social media posts for a blog article and schedule them to be posted once the article goes live. Think of it as automating the sharing of your blog articles. This will save you time, while making it easier to manage your content, largely because the calendar included in CoSchedule is easy to work with and gives you a good view of your content.

CoSchedule is USD 10 per month, per blog.

If you are looking for more affordable ways to improve your business operations, contact us today to see what boost we can offer you at a price you can afford in 2015.

Published with permission from TechAdvisory.org. Source.

December 10th, 2014

iPhone_Dec08_AIf you have an iPhone that you use for business it can be tempting to be constantly connected, after all, the device and various apps are designed to give users the ability to do almost anything. While this is great for business, it may not be ideal for a healthy work-life balance or if you really need to concentrate on a specific task. Luckily, if you have iOS 8 installed on your device there is a useful feature, called Do Not Disturb, that could help promote a break from your phone.

What is Do Not Disturb?

Do Not Disturb is a handy iOS 8 feature that when enabled, silences all notifications, calls, and alerts that you usually get coming through when the device is locked. You can either turn it on and off manually, or schedule a time for when it is to be activated. If your device is unlocked, e.g., you are using it, notifications will usually still trigger.

Turning Do Not Disturb on

To turn this feature on simply:
  1. Slide up from any screen on the device to open the Control Center.
  2. Tap on the crescent moon icon at the top of the Control Center.
This will turn on the Do Not Disturb feature. You should see a crescent moon icon appear in the menu bar at the top of your device's screen indicating the feature is activated. To turn it off, open the Control Center and tap the crescent moon icon again so that it disappears from your screen.

Setting a Do Not Disturb schedule

If you would like to schedule a time where your device automatically puts itself into Do Not Disturb mode, simply:
  1. Open the Settings app on your iPhone.
  2. Tap on Do Not Disturb.
  3. Slide the radio beside Scheduled to On (green).
  4. Set a time to enable this feature.
As with the manual triggering of this feature, you will see a crescent moon icon in the top menu bar of your device when it is active.

Changing feature settings

If you tap on Settings and then select Do Not Disturb you will also be able to tinker with the settings related to this feature. The options you will see include:
  • Manual - Allows this feature to be manually enacted via the Control Center.
  • Scheduled - Schedule a time when this feature will be automatically enacted.
  • Allow Calls From - Pick which contacts to allow calls and notifications from so that these sound even when Do Not Disturb is active.
  • Repeated Calls - Set whether multiple calls in a short amount of time will ring when the feature is active. If enabled, two calls from the same person in less than three minutes will cause the device to ring.
If you would like to learn more about using the iPhone for business, please contact us today to see what difference we can bring to your business.
Published with permission from TechAdvisory.org. Source.

Topic iPhone
December 3rd, 2014

iPad_Dec2_AAs we enter the holiday season, there is a good chance that many iPads will be given as gifts from loved ones and even from companies. While these devices do make great presents, if you receive one but already have your own device, then you will need to know how to authorize it on iTunes. So, if you receive a new iPad to replace an old one this festive season, here's what you need to do.

First, understand what authorizing your device is

When people and Apple experts talk about "authorizing your device", what they really mean is linking it with iTunes and the account you use for this on your computer. Once you do this, you can download already-purchased media and apps onto a new device without having to pay for the content again.

The way iTunes works is that there is usually a limit on how many devices you can download apps and media onto at the same time. Any purchases can be installed on 10 devices or five computers via iTunes at the same time. If, for example, you have an existing iPad for which you have already purchased apps via iTunes, and you receive a new device, you will need to authorize the existing iPad before you are able to download apps onto this new one.

If you have more than 10 devices or five computers authorized and want to add another, you will need to first deauthorize one device. Similarly, if you are giving an iPad away, it is a good idea to make sure it is deauthorized before you give it away or the new user may have access to your iTunes account.

Second, how do you deauthorize an existing device?

This process is actually fairly easy, but you will need to do it from the PC or Mac you use to sync your iPad with iTunes. To do this:
  1. Launch iTunes on a computer that it is installed on and log into the account you use to purchase apps for your devices.
  2. Click on your name. This is located at the top-right of the window. If you see Sign In, click that and log into the account you use on your iPad.
  3. Select Account info from the drop-down menu.
  4. Enter the password for your account.
  5. Scroll down and click on Manage Devices which is under iTunes in the Cloud.
  6. Click Remove beside the device you would like to deauthorize.
  7. Press Done.
When you do this, the apps you've paid for should either be deleted automatically from the device, or become inaccessible the next time the device syncs with iCloud (which is responsible for linking devices in iTunes).

How do you authorize your new device?

If you receive a new device this holiday season, authorizing it is as simple as logging into your Apple account using the username and password you have used in the past to purchase apps and media.

Once this is done, go into the App Store on your new device, log in, if you haven't already done so, and tap on Purchased. You should be taken to a list of all apps and media that you have purchased and which are still available on the App Store. Tapping on any of the apps and then hitting Download will install the selected app on your new device. If you are above the limit of devices on your account, you will see an error message telling you there are too many devices with the app installed. You will then need to deauthorize an older device before proceeding.

If you would like to learn more about your new iPad, or how Apple products can be used in your business, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic iPad
December 3rd, 2014

Security_Dec01_ASpend even a small amount of time looking at the various massive malware threats out there and you will find that security experts are usually able to figure out who developed it, the intended targets, and where it is most prevalent. In early November, news broke about a mystery security threat called Regin that has been around for years, but which experts seem to know comparatively little about. Many business owners are worried about Regin, but should they be?

What exactly is Regin?

What is most interesting about Regin is that a number of security experts seem to not really fully understand it. They know that it exists, they know it is complex, and they know it is one of the most advanced pieces of malware ever created. But, they don't know what exactly it does, or where it comes from.

What we do know is that Internet security firm Symantec is credited with first bringing Regin to public attention, and that it has been around since at least 2008. So far, the company has said it is similar to the Stuxnet virus that was supposedly developed in (or by) the US and used to attack and subvert the Iranian nuclear program.

Regin is known to infect Windows-based computers and at its core is a backdoor trojan style of infection. From detected infections it is looks like the purpose of the malware is not to steal information but to gather intelligence and facilitate other types of attacks.

What makes this malware so powerful and disturbing is that it is much more advanced than other infections. Using various encryption methods it can hide itself extremely well, making it difficult to detect. It can also communicate with the hacker who deployed it in a number of different ways, thus making it a challenge to block or stop. As a result, it is far from easy to actually figure out what exactly this malware is doing and why.

Who has been infected?

According to various security experts we have been able to compile a list of companies and organizations that have been targeted to date. These include:
  • Telecommunications companies
  • Government institutions
  • Financial companies
  • Research companies
  • Individuals and companies involved in crypto-graphical and mathematical research
At the time of this article, no known attacks have been carried out against companies in the US, Canada, or the UK. The main countries targeted so far have been Russia and Saudi Arabia, along with a smaller number of infections in Malaysia, Indonesia, Ireland, and Iran. A total of 10-15 countries have been targeted since the malware was first discovered in 2008.

Is this a big deal for my company?

Just because your company is operating in a country that hasn't been affected thus far, doesn't mean that you aren't at risk of being attacked by this malware in the future. If you operate in any of the industries or sectors listed above, you could still be at risk, especially if you do business with clients in infected regions.

For now, however, it appears that Regin is only infecting larger government bodies and large companies outside of North America and much of Europe, so the chances of you being infected are relatively low. Although as with any threat, this can change at any moment.

What we recommend is that you ensure your antivirus and antimalware solutions are kept up to date and always switched on. You can rest assured that eventually experts will learn more and block this malware from infecting systems. Beyond this, working with an IT partner, like us, who can ensure that your valuable data and systems are secure, is also be a good idea. The same goes with watching what you download and any emails you open. If you don't know or trust the source, don't download any program, open an attachment, or read an email connected to it.

Looking to learn more about the security of your systems? Contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Security
December 3rd, 2014

GeneralHealthIT_Dec03_AYou may not want to rely on the Food & Drug Administration’s (FDA’s) app approval system: Roughly 90 percent of Android health-care apps have been hacked, and 22 percent of them were FDA-approved. That information comes from latest State of Mobile App Security report from Arxan Technologies, which attributed the high rate to a lack of information-security training and resources in the health-care field.

Of health-care apps, none that were Apple iOS-based have been hacked. But, looking at all apps, the risk is close between Android and iOS. Looking at the top 100 paid apps, 97 percent of those that are Android-based have been hacked, and 87 percent of those that are iOS-based have been hacked.

Because health-care apps tend to hold confidential patient information, these breaches present serious risk. “Make application self-protection a new investment priority, ahead of perimeter and infrastructure protection,” says Joseph Feiman in a Gartner Maverick Research report, “Stop Protecting Your Apps; It’s Time for Apps to Protect Themselves.”

Click here for an infographic that shows the state of app security, and contact us if you are looking to make sure that your apps are secure.

Published with permission from TechAdvisory.org. Source.

December 3rd, 2014

HealthGeneral_Dec03_AIDC Health Insights has issued its predictions for health-care in 2015, and just as one might expect, they revolve around cost, technology, and operational efficiency. Here are some of the key takeaways.

Cybersecurity. By 2020, 42% of digital health-care data will be unprotected. That creates a risk. By 2015, half of all health-care organizations will have experienced one to five cyberattacks in the previous 12 months—and one third of those attacks will have been successful.

Cloud computing. Hosted infrastructure will become key to data collection, aggregation and analysis, such as by 2020, 80% of health-related data will pass through the cloud at some point in its lifetime.

Mobility. Health-care organizations will seek to improve consumer experience, leading to 65% of transactions to happen on mobile devices by 2018. This will require health-care organizations to develop multi-channels that cater to various screen sizes.

Chronic-condition management. Around 70% of health-care organizations will invest in consumer-facing wearables, remote monitoring tools, and virtual care and the like in order to better manage patients with chronic conditions.

Big data. All of this will lead to more demand for big data. And, more than half of health-care organizations will manage it with routine operational IT by 2018.

Read more about IDC Health Insights’ predictions here. If you are looking to integrate better technology in your practice, please contact us today to see how we can help.

 

Published with permission from TechAdvisory.org. Source.

November 25th, 2014

Hardware_Nov25_AThere are many different pieces of technical equipment most businesses need in order to operate successfully, with one of the most essential being the wireless router. Routers allow one network connection to essentially be split into many and then shared by different users and devices, often over a Wi-Fi connection. If you are looking for a new Wi-Fi router for your office there are some important features you should be aware of.

Essential features

For the vast majority of users, there are five main features that all wireless routers must have in order to make them useful in the office. They are:
  • Network type - Look at any router and you will quickly see that there are a number of different networks available. The four most commonly found are 802.1b, 802.1g, 802.1n, and 802.11ac. These designations are for how fast the router can transfer wireless data, with 802.11ac being the fastest of these four. Most offices should be able to get by on n routers, but those who have users connecting via Wi-Fi and cable may do better with 802.11ac routers - which are backward compatible with other slower network versions.
  • Throughput - This is closely associated with the router's network type, and is usually one of the first things listed on router boxes and specifications. To spot the router's throughput, look for Mbps. This indicates the speed at which the router is supposed to transmit data from your connection to users. It is important to note here that if you have a 100Mbps Internet connection, but buy a router that is only say 80 Mbps, then the total speed will be the lower figure, 80Mbps. Therefore, it would be a good idea to get a router with a higher throughput, or a close throughput, to your main Internet connection.
  • Range - This is particularly important for users who will be connecting via Wi-Fi, as they will likely not be sitting right beside the router. Generally speaking, the further you are from your router, the slower and weaker your connection will be. As a rule of thumb: 802.11ac and n routers will offer the strongest connections and greatest range. But this will all depend on where the router is placed and any natural barriers like concrete walls, etc.
  • Bands - On every single router's box you will see numbers like 5Ghz and 2.4Ghz. These indicate the wireless radios on the router. A dual-band router will have both a 5Ghz and 2.4Ghz radio which allows devices to connect to different bands so as not to overload a connection. Those who connect to a 5Ghz band will generally have better performance, but the broadcast range will be much shorter than the 2.4Ghz radio.
  • QoS - Quality of Service is a newer feature that allows the router administrator to limit certain types of traffic. For example, you can use the QoS feature of a router to completely block all torrent traffic, or to limit it so that other users can have equal bandwidth. Not every router has this ability, but it is a highly beneficial feature for office routers.

Useful features

As well as the above features, which are essential for business Wi-Fi routers, there are also some useful features that may help improve overall speeds and usability. Here are three of the most useful, but not essential:
  • Beam-forming - This is a newer feature being introduced in many mid to high-end routers. It is a form of signal technology that allows for better throughput in dead areas of a business or home. In other words, it can help improve the connection quality with devices behind solid walls, or in rooms with high amounts of interference. By utilizing this technology, routers can see where connection is weak and act to improve it. While this is available on routers with many network types, it is really only useful with routers running 802.11ac, so if you have devices compatible with 802.11ac, then this feature could help.
  • MIMO - Multiple-Input, Multiple-Output is the use of multiple antennas to increase performance and overall throughput. Most modern routers don't actually use multiple antennas or extra antennas to increase performance, instead utilizing this concept to ensure that more devices can connect to one router with less interference and better performance.
  • Antennas - Some routers, especially those geared towards home use, don't have physical antennas, while other higher-end routers do. With many wireless routers, the idea behind antennas is that they allow the direction of the best connection to be configured. It can be easy to think that these antennas will help improve connection, but when it comes to real-world tests, there is often only a nominal improvement if the antennas are configured and aimed properly.
While these features can help improve the overall connectivity and speed of a wireless network, they are not necessary for most business users. If you are going to be tweaking networks however, then these may help. Beyond that, concepts like beam-forming only work well if you have a wealth of devices that are 802.11ac compatible and these are still less popular than devices that are say 802.1n compatible.

Features to watch out for

There are a number of router features that manufacturers often tout as essential, important, etc., when in reality these features are often more about marketing and will pose little use to the vast majority of users.
  • Routers with advertised processor speeds - With many pieces of equipment, the processor speed is an important indicator as to how fast it will run, and how well systems will run. With routers however, there is usually a small requirement for processing power. Sure, some features like firewalls require processing power, but the vast majority of routers have the power to run these. Therefore, advertised processor speeds with Wi-Fi routers offer no realizable benefit to the majority of users.
  • Tri-band - While many routers have dual broadcasting bands, some newer ones are now tri-band. The idea and marketing behind this is that with a third band, throughput can be dramatically increased and this is often reflected in the speeds manufacturers say these routers can offer. In reality however, this often isn't the case, as all this extra band really does is allow for more devices to connect. You will most likely not see an increase in overall connection speed.
  • Patented or trademarked features - Almost every router these days will have individual features (also known as proprietary technology) that the manufacturer includes with the idea that it makes the router that much better, or at least uniquely different, than any other. While many of these features can be useful to some users, they should not be the main reason to select a router.

How do I pick the best router?

Go to any hardware retailer and you will quickly find that the sheer number of wireless routers out there is overwhelming. Sure, they all do the same thing, but some will be better than others. One thing to try is to look at the user submitted reviews of different routers online. While the manufacturers may claim one thing, it is the real-world users who can shed the best insight into products. Try to find more business-oriented reviews rather than views based on domestic use.

What we recommend is to contact us. We can work with you to help you find and set up the best router for your business. Get in touch today to learn more.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
November 25th, 2014

BCP_Nov24_AAs a business owner you must be constantly aware of threats to your business. One of the best ways to mitigate many of these dangers is to develop and implement a Disaster Recovery Plan. In order to help ensure that your business is ready to recover from any disaster, here are five real-world tips that can help see you through.

1. Have a full copy of your data backed up outside of your operating region

Almost every company, regardless of size, has backup measures in place. These backups can be either physical or digital, and are supposed to be carried out on a regular basis. If a disaster strikes, having access to your data can help ensure that you can recover your systems and resume operations in the minimal amount of time.

While backups are great, if you keep your backups in the same area as your main systems, or even if your offsite backups are in the same region, there is a chance that a large disaster, like a flood, or power outage, could also affect these backups too. One of the best solutions is to keep a current backup offsite, and outside of your operating region, with most experts recommending at least 150 miles (250 km) away from your main business area.

How do you achieve this? The best option is to use cloud-backup. Many providers host their backup service at a number of different data centers in various locations, so that should a disaster strike both your business and a nearby data center, your data is still safe at other centers.

2. Realistically test your plan

It can be tempting to simply develop a plan and then test it in a closed environment once or twice a year, make some changes where necessary and then sit back and hope it works. In truth, for any plan to really be effective it needs to be tested in a realistic environment. If this is not carried out then there is a possibility that the plan could fail when activated.

Because disasters come in almost any form and size, you are going to want to first identify as many potential problems as possible. From here, test your recovery plans based on these scenarios and see how effective they are. Be sure to also involve your colleagues and employees, as they too will need to know what to do when disaster strikes and what their role in the recovery of data is.

A good way to look at these tests is to think of them more as practice runs. As with anything, the more your practice the easier and more effective it becomes. In this case, good practice could literally save your business.

3. Update your plan as you update your systems

When you develop a recovery plan, you need to base it on the systems and technology you currently have in your business. However, these systems and devices may not be in use six months, to a year from now, or you may introduce new systems and improvements.

As soon as you make any changes, your existing recovery plan could become obsolete. Therefore, you need to ensure that when you introduce new systems or technology you are also updating the recovery plan to cover and fit with these changes.

4. Create an accessible plan

Many experts agree that having a physical plan that employees can see and access during a disaster is one of the best ways of ensuring that it is actually implemented properly. Therefore, when you develop a Disaster Recovery Plan make sure that all of your employees can access it at any time. This includes during and immediately following a disaster.

Beyond this, you need to make sure that the plan is consistent. If you update the master plan, but fail to update the copies you store in say a public cloud, or at different worksites, this will lead to confusion and even an increased recovery time or complete recovery failure. When you do update your plan, let all parties involved know that it has been updated and remind them where they can find copies of the plan.

5. Don't be the only fully-trained disaster recovery expert in your company

As a business owner or manager it can be easy to try and run everything yourself. Afterall, it is your business and you know exactly how to look after everything, right?. The problem is that if you are the only fully-trained disaster recovery person you are making yourself the weakest link in the plan.
Published with permission from TechAdvisory.org. Source.