2. Disaster-Proofing
Why Disaster-Proofing a Small Business
is So Important
Data disasters tend to strike when you least
expect.
Ignoring basic disaster recovery planning can be
very dangerous to your company’s survival.
Small businesses without a formal in-house
computer support function are especially
vulnerable to these potentially catastrophic risks.
3. Physical Security
Procedures need to be in place to guard
your data backups against tampering or
theft.
Critical technology assets, such as
servers, hubs, routers and phone system
controllers, should be in locked areas of
your office.
4. PC/Workstation Security
Your company’s desktop PCs and
notebooks need to run a locally securable
operating system.
Be sure power-on passwords are used to
prevent unauthorized boot-ups or
tampering with BIOS configuration
settings.
5. Network Security
Protect individual data files on network-
shared folders.
Make sure usernames and passwords are
required to logon to all servers.
Policies need to be in place that mandate
sophisticated password selections.
6. Data Backup
Know where all of your company’s crucial
data files are located and how these files
are being backed up.
There should be automation and controls
in place to make sure that data backup
jobs run correctly and consistently.
7. Organizational Concerns
Keep common, easy-to-replace spare
hardware parts, such as a mouse, keyboard
or monitor, on hand to minimize downtime.
Employees should have a list of key
personnel home phone numbers.
Have a chain of command for deciding that
an event is in fact a data “disaster” for your
company.
8. Power Protection
Every sensitive electronic device in your
company, both PC and non-PC equipment,
should have at least some form of real surge
protection.
Don’t be fooled by cheap power strips
masquerading as surge protectors.
Protect your telecommunications lines with
appropriate data line surge protection.
9. Virus Protection
Antivirus software needs to be installed on
every desktop PC, notebook and server in
your organization and should be current.
Your e-mail client applications and server(s)
need to be protected to keep viruses from
spreading through inbound (POP3),
outbound (SMTP) and other related
messaging mechanisms.
End users should be trained on how to
recognize telltale signs of a virus.
10. The Bottom Line
It’s impossible to plan for every conceivable data
disaster, but there are a number of painless and
inexpensive best practices your company can put
into place right away to get proactive.
Learn How You Can Disaster-Proof
Your Computers ... BEFORE It's Too Late!"