Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Business Continuity Includes Preparing for Death

Business Continuity Includes Preparing for Death

It’s never an easy thing to talk about, but it does need to be talked about. If one of your key employees were to pass away, how would it affect your business? How do you prepare for this type of inevitability?

We talk about Business Continuity a lot. Usually when we discuss it, we’re talking about backing up your data or having a plan in place to bounce back after a major disaster were to happen.

For example, if a fire were to take out your server room, what steps have you taken to prepare for it, and how quickly can you be back up and running?

The answer should be something like this:
We have our data backed up to an internal device in the server room. We can always rely on that, provided that the backup device remains operational. In the event that the backup device suffers from the disaster, we also back up our data in the cloud. The restore is a little more complicated, but we can manage for a few days from the cloud-based backup while new infrastructure is installed onsite.

That’s a really solid answer, and that is something that we specialize in helping Florida businesses achieve. However, that’s your backup strategy. That’s just a small part of your overall business continuity. That data backup is a real lifesaver when it comes to a physical disaster, but what happens when the disaster is a loss of life, or incapacitation, or even just a key individual suddenly walking out the door?

Let’s Look at a Scenario

Let’s say Bob is the business owner. He makes all of the decisions, he signs the contracts, he pays the bills. If Bob gets sick or suffers a stroke and becomes incapacitated, who takes over until he recovers? If Bob’s son works for the company, does the son have legal authority to take over?

We’re covering a lot of ground here, but technically, only the courts can intercede and make these types of decisions if it isn’t properly prepared for. You might run into a scenario where the court will choose someone to run the business temporarily while it is decided what to do next. This process can be slow, and the outcome might not be ideal.

If Bob establishes an Estate Plan, he can pick a successor to have legal authority to run the business. The Estate Plan should include a Revocable Living Trust and Powers of Attorney.

Let’s take a moment here to admit that we are not lawyers, and not offering professional legal advice, and that you should consult your lawyer before making any legal decisions. 

On top of all of this, you’ll want the family of the incapacitated business owner to maintain its lifestyle while keeping the business chugging along.

Business Continuity is About Smooth Recovery

Just like how we always recommend a backup device that can restore data quickly without a lot of overhead, the rest of your business continuity plan should cover a broad enough range of emergencies to enable the business to stay afloat during the toughest tides.

That plan should include taking a significant person or role out of the loop and continuing to operate normally. That may require thorough documentation and training for other capable employees before something bad happens.

Does your business continuity plan, or Emergency Action Plan (EAP) clearly cover this? If you would like to have a deeper conversation about business continuity, please reach out to us at Total Tech Care to set up a call.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Google Business Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Upgrade Phishing Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Server Save Money Data Recovery Cloud Computing Office Passwords Windows 10 Gadgets Chrome Social Media Virtualization Tech Term Saving Money Holiday Microsoft Office Automation Managed Service Managed IT Services Operating System Artificial Intelligence Facebook Computers Cybercrime Internet of Things IT Support Hacking Wi-Fi Health BYOD Mobile Device Management Networking Office 365 Managed Service Provider Alert Telephone Systems Covid-19 Information Information Technology Remote Spam Social Engineering Mobility Recovery Employer-Employee Relationship Router Bandwidth BDR Big Data App History Password Money Encryption Mobile Computing Applications Human Resources Data Breach Application Remote Monitoring Law Enforcement Private Cloud Blockchain How To Paperless Office Managed IT Office Tips Training Apps Data Storage Patch Management VPN Remote Computing Government Mobile Office Data Security Bring Your Own Device Wireless Data Management Work/Life Balance Gmail Flexibility Infrastructure Vulnerability Voice over Internet Protocol Marketing Settings WiFi Windows 7 Word IT solutions Entertainment Google Drive Two-factor Authentication Website Budget Servers Mouse Avoiding Downtime HaaS Meetings Save Time Vendor Risk Management Managed Services Telephone System Staff Hacker Software as a Service Display Machine Learning Cleaning The Internet of Things Remote Work Connectivity Lithium-ion battery Employee/Employer Relationship RMM Conferencing End of Support Scam Education Physical Security Firewall Safety Sports HIPAA Virtual Reality Redundancy Apple USB Vendor Management Keyboard Data Protection Social User Error Current Events Wearable Technology Business Technology Content Management Document Management Telephony Solid State Drive Wireless Technology Samsung Retail Access Control Hard Drives Instant Messaging Managed Services Provider How to Downtime Virtual Assistant Robot Excel Database Value Authentication Biometrics Data storage Electronic Medical Records Virtual Desktop Remote Workers Automobile Spam Blocking Processor Hiring/Firing DDoS Update Computing Infrastructure Virus Going Green SharePoint Hard Drive Google Docs Unified Threat Management Identity Theft Computer Accessories Battery Shadow IT Customer Service Computing Environment Legal Business Intelligence Audit Internet Exlporer Worker Augmented Reality Fax Server Fraud Printer IT Management Bluetooth PDF SaaS Remote Worker Botnet Digital Signage IT Plan Cryptocurrency Proactive IT Unsupported Software Network Congestion Best Practice eWaste IT Consultant Procurement YouTube Charger Workplace Strategy Comparison Net Neutrality Black Market Compliance CES Humor Help Desk OneNote Computer Care Printing Cost Management Evernote ROI Search Wire Video Conferencing Two Factor Authentication Sales Social Networking Bitcoin Travel Shortcuts iPhone Netflix Root Cause Analysis Printers Point of Sale Personal Consultant Millennials Cryptomining Smart Office Supply Chain Management Wireless Charging Analytics HBO Knowledge Music Running Cable Monitoring Batteries Skype Files Workforce Data loss Chromecast Virtual Private Network Windows 8.1 Digitize Best Available Memory WIndows 7 Cables Windows Server 2008 R2 Outlook Leadership Troubleshooting Uninterrupted Power Supply Customer relationships Start Menu Colocation Telecommuting Manufacturing Screen Mirroring Loyalty Project Management Email Best Practices Nanotechnology IT Assessment Cortana Frequently Asked Questions Monitor Books Computer Tips Digital Signature Managed IT Service Mobile Science Security Cameras Windows 10s Biometric Security Cast Warranty Virtual CIO OneDrive HVAC Peripheral User Google Apps PowerPoint Tip of the week Windows Media Player Reputation webinar Streaming Media Emergency Public Cloud Tech Support Employer Employee Relationship Distributed Denial of Service Digital Security Cameras Customer Relationship Management Analysis Using Data Content Professional Services Analyitcs 5G Techology Laptop Assessment Administrator Devices Copiers Enterprise Content Management Quick Tip Managing Stress Programming Windows Server 2008 Customers MSP Ergonomics Accountants Audiobook Tools Smartwatch Credit Cards OLED Cameras Touchpad Television Microchip Thought Leadership Development Antivirus Password Management PCI DSS Password Manager Virtual Machine Advertising 2FA Fiber Optics Politics Windows 8 Multi-Factor Security Employee Cabling Public Computer Search Engine IT service Twitter Messaging Notifications Transportation NIST Policy Business Mangement Hypervisor Regulations Computer Fan Rootkit Dark mode Smart Tech Trend Micro Tablet Trending Amazon Default App Printer Server Domains Addiction SMS Benefits Procedure Recycling Saving Time Relocation Workers FENG IaaS Wiring dark theme Maintenance Practices Shopping Google Search Bloatware Amazon Web Services IT Infrastructure Video Games IBM Cache AI Smart Technology Safe Mode FinTech Criminal Worker Commute Flash Bing GDPR Hosted Computing Social Network Experience Tablets Entrepreneur Online Shopping Investment Scalability Software Tips Supercomputer Wireless Internet File Sharing Employees Employee/Employer Relationships Business Owner Sync Emails NarrowBand Camera Windows 365 Shortcut Inventory Specifications ISP

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code