Bredy Network Management Corporation Blogs

3 minutes reading time (663 words)

How to Be Sure Your Business Continuity Plan is Complete

How to Be Sure Your Business Continuity Plan is Complete

While it may not be fun to consider the worst-case scenario, it is important that you have a plan to ensure that your business will be able to survive when the chips are down. This plan to ensure that your business will continue is called (appropriately enough) a business continuity plan, and needs to address a few things that we will go over here.

In order to really be effective, a business continuity plan needs to be comprehensive - otherwise, your operations will still be interrupted when you encounter a lack of some resource that you need access to. A complete plan will document the following considerations and the strategies for completing them:

  • Threat Matrix - The first thing your plan should address is the variety of threats it might face, from the mundane events that can be mitigated with relatively little effort to the catastrophic, do-or-die disasters that require in-depth planning and proactive activities to weather. This portion of your plan should acknowledge these threats and propose your company’s response to them.
  • Critical Processes - Every business has workflows, chains of command, and other processes that it requires to properly operate. Your business continuity plan needs to both identify and detail these processes so they are able to continue with minimal interruption.
  • Command Chain - Or in other words, who’s in charge. A hierarchy of authority is crucial to the continuation of the business as someone needs to be in command, and equally importantly, have it be common knowledge that they are in command to avoid grandstanding. Otherwise, nothing can or will be accomplished.
  • Employee Safety and Evacuation Plan - In order for business to continue, there has to be someone there to continue it. A business continuity plan needs to have a dedicated section that addresses how and when to evacuate employees to ensure their safety in a dangerous situation.
  • Communication Plan and Contact Information - Anyone associated with your company, from your employee to your clients to your business partners, needs to be kept in the loop throughout whatever scenario is in play. Your plan needs to address when, how, and why different contacts should be updated.
  • Backup Processes and Location - In order for your business continuity preparations to be complete, you should be maintaining a backup somewhere offsite - ideally in a cloud solution. Another piece of your plan should be dedicated to ensuring that this backup can be accessed. This also pertains to the possibility of identifying a backup location to turn to when your original offices are uninhabitable in order to resume at least some semblance of productivity.
  • Inventory and Infrastructure - There are a lot of pieces to the typical workplace infrastructure, including hardware and software. Therefore, you need to be sure that you can reliably identify the inventory and infrastructure you had for both insurance purposes and to acquire replacements.
  • End of Incident Criteria - Just like you need to know when something crosses the line over to “disaster,” you need to know when the disaster ends. Creating a list of conditions that must be met before reviewing the damage and beginning recovery will allow you to more efficiently begin the process, without jumping the gun and taking more damage.
  • Post-Incident Debriefing - Finally, when the dust has settled, you need to survey the damage and deliberate how things could have been handled better. Take the opportunity to review your business continuity strategy and make any changes and improvements. Your business continuity plan should also include a template to create a questionnaire to have your contacts fill out to give you the maximum amount of feedback and insight. This will allow you to make your plan better, in case of “next time.”

If you see to proactively considering, strategizing, and documenting these facets to your plan, you will have a much greater chance of a successful recovery. BNMC can assist you with the technological aspects of it. Give us a call at 978-482-2020 for more information, or to get an evaluation of your current solutions.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, August 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Malware Business Computing Microsoft Software Hackers Internet Google Computer Hosted Solutions Business IT Services Ransomware Mobile Devices Network Security Tech Term Managed IT Services Small Business Android Backup Smartphone Windows Data Recovery Data Management User Tips Efficiency Saving Money Business Continuity IT Support Hardware Internet of Things Cloud Computing Data Cybersecurity App Browser Innovation Data Backup Windows 10 Encryption Business Management Server Facebook Gmail Artificial Intelligence Remote Monitoring Office 365 Managed IT Services Productivity Smartphones Chrome Word Outsourced IT Managed Service Provider Phishing Analytics Windows 10 Productivity communications Tip of the week Network IT Support Money Vulnerability Communication Infrastructure Disaster Recovery Government Passwords Big Data IT Management Google Drive Bandwidth Content Filtering Settings Microsoft Office Upgrade Employer-Employee Relationship YouTube Robot Risk Management Data storage Social Media Antivirus Website Applications Office Tips The Internet of Things LiFi Telephone Systems Hosted Solution VPN SaaS Data Security Company Culture Administration VoIP Firewall Server Management Holiday Maintenance Mouse Business Technology Miscellaneous BYOD Virtual Private Network Alert Managing Stress Apple Workplace Tips Storage Information Wireless Vendor Management Monitors HIPAA Save Money Two-factor Authentication Mobile Device Avoiding Downtime Paperless Office Automation Scam Mobile Security End of Support Outlook Spam Computing Virtual Reality Unified Threat Management Business Intelligence WiFi Data loss IT Technicians Optimization Social Servers Google Calendar Connectivity Spying Budget Network Congestion Emergency Typing Humor Network Management Access Control desktop Modem FinTech Analysis Information Technology Dark Web Digital Payment Staff Leominster Writing Disaster Regulations Current Events Wi-Fi Cyber Monday Digital Language Value Best Practice Collaboration Mirgation Recycling Cybercrime Legislation IoT Employee-Employer Relationship Downtime Computers K-12 Schools Cryptocurrency Touchscreen SharePoint Cookies MSP Managed Service Marketing Apps Dark Data Microsoft Excel Augmented Reality Google Docs Quick Tips Retail Techology Uninterrupted Power Supply Social Networking Gadgets IT solutions Going Green Managed IT Smart Technology Document Management Spyware Computing Infrastructure Professional Services File Sharing Chatbots eWaste Education Hacks Statistics Tablet Politics Computer Care IBM Star Wars PowerPoint How To Display Lenovo Wearable Technology Network upgrade Bitcoin Downloads Solid State Drive Nanotechnology Development Google Wallet Customer Service Mail Merge Blockchain Business Growth VoIP Office Unified Threat Management Samsung Motherboard Cables Users Halloween Printing Shortcut Distributed Denial of Service Identity Theft Alerts USB Identity Continuity Password Bluetooth Comparison Tech Support Training Corporate Profile Fraud Cost Management Onboarding Legal Firefox Superfish Smart Office Windows 8 Hard Disk Drive Screen Reader Charging Slack Unified Communications Drones Address Chromebook Permissions Automobile Hacker Social Engineering User Error Dell Wires Scary Stories Patch Management Managed IT Service Licensing Dongle Customer Relationship Management Cabling Solar Running Cable Specifications Websites WannaCry Assessment Deep Learning Work Heating/Cooling Multi-Factor Security Smart Tech Monitoring Buisness Google Maps Virtual Desktop Alt Codes Time Management Safety Printer Router Voice over Internet Protocol Sports Break Fix Cooperation Service Level Agreement Networking Remote Computing Compliance Laptop Search Black Friday Hotspot Internet Exlporer Bring Your Own Device Operating System 3D Printing IT Consultant Cortana Cameras Processors Meetings Machine Learning Tracking Unsupported Software Cleaning Virtualization CCTV Update Webcam Computer Repair Relocation Mobile Data How To Work/Life Balance Recovery Error Point of Sale Ben McDonald shares Health Private Cloud Black Market Travel Law Enforcement G Suite Notifications BDR Electronic Medical Records Supercomputer CrashOverride Twitter Motion Sickness Mobile Device Management Physical Security Staffing Upgrades Gadget Taxes Regulation Emoji Administrator Crowdsourcing Web Server what was your? IT Budget Mobile Computing Personal Information Botnet GPS

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3