Top 8 Reasons Your Business Needs a Disaster Recovery Plan

The importance of a disaster recovery plan cannot be overstated. Many business leaders may consider a disaster to be a hurricane, tornado, flood or earthquake. However, the truth is a disaster is any event that prevents a business from accessing the data and systems it requires to operate, including regional power outages, cyberattacks, human error, employee sabotage and hardware failure. Every company faces the risk of IT interruptions that can grind business to a halt, risking high financial costs, reputation loss or even greater risks for you and your customers.

Below are 8 reasons your business should consider a Disaster Recovery Plan.

1. Because your business cannot afford any downtime. 20% of businesses experience a failure (fire, flood, power outage, natural disaster, etc.) in any given year, and 80% of those businesses will go under in just over a year.

2. Because your customers and potential customers expect it. The average consumer now expects the information they want to access to be available whenever it is convenient for them. Downtime means a lack of availability to your customers and a loss of business in the immediate and possibly long term.

3. Because you have spent a significant amount of time and money building your reputation – you need to protect it. Downtime and lost data can ruin reputation, brand and ultimately diminish trust that can result in lost revenue.

4. Because nature is unpredictable. Businesses that don’t have a backup and disaster recovery plan in place can find it almost impossible to resume operations after a major disaster hits. An estimated 80% of all companies that experience a business interruption of greater than five days, without recovery plans, go out of business.

5. Because machines and hardware fail. While we’ve made huge strides in the reliance of our technology, it’s still not perfect and is bound to have issues here and there. You can buy the best equipment on the market but that does not safe guard you from malfunctions, lemons and breaks. Although it may be expensive for your company to eliminate any single point of failure in your IT infrastructure, it is really the only way you can be sure that a hardware failure will not interrupt your service or cause data loss. We recommend all our clients to back up their data regularly, ideally using our highly secure managed hosting services.  This will help to eliminate any interruptions in case of IT infrastructure failures.

6. Because we live in a 24/7 world that requires ‘always on’ capabilities. 72% of web users report abandoning a company website for a competitor’s due to frustrations with the website . If a website goes down, online shoppers are not willing to wait for the unknown time at which the site will be back online. If you aren’t protecting your internet and network you could end up sending your business straight over to your competitors.

7. Because you can’t predict what data might be lost and the value it had to the running of your company. 43% of companies were immediately put out of business by a “major loss” of computer records, and another 51% permanently closed their doors within two years — leaving a mere six percent “survival” rate.

8. Because humans make mistakes. While this is among some of the hardest mistakes to prevent and correct, ensuring your data is regularly backed up lets you restore it to an error-free state. 80% of unplanned outages are due to ill-planned changes made by administrators and 60% of availability and performance errors are the result of misconfiguration.

For help with your DR planning, call BCN Group on 0345 095 7000.

What is Agile?

Agile methodology is perhaps one of the most misunderstood concepts in the IT industry. What started as a software development methodology has now been adopted by many other industries and departments. It wouldn’t be unusual to hear an events organiser or manufacturers referring to their work as agile. Here at BCN, you may hear us refer to ourselves as an agile solution provider, but what exactly does this mean? To understand the meaning of the term agile, let’s start by looking at the history of the phrase…

What is agile?

The Agile Manifesto was established in 2001 by a team of software developers. Their belief was that their skills would be put to better use if they were able to focus on solving problems and finding a better way to collaborate with their colleagues and customers. The team valued things like individuals and interactions over processes and tools and working software over comprehensive documentation. These principles have now been stretched and skewed to match a number of industries outside of software development.

How has agile evolved since then?

Since the early days of agile offering a way for software developers to redefine the way they work, it has now been adopted as a general management technique. It isn’t unheard of for managers to apply agile methodology to every aspect of a business. The idea of creating a minimum viable product as soon as possible is very attractive to business owners as it means they can make all of the important decisions based on feedback. The idea that done is better than perfect is not lost on money-conscious business owners.

Could agile work for me?

Agile is a difficult concept to get right in an organisation as it is a huge departure from more conventional management practices. Agile only works if everyone understands it and is on board with the methodology. Getting rid of the usual hierarchy, architecture and structure of a team can be difficult. One of the hardest areas to get right is letting go of the idea that the business is a steady state machine. Instead, business owners have to be willing to take risks, try new things and implement things that might later be scrapped. While this might sound risky, that’s because it is. However, it’s also an important part of learning and can allow a business to grow faster than it would if left in a steady state.

How is BCN agile?

We work with some of the industry leaders in agile solutions providers, including Nimble Storage, VMware and Cisco Meraki. We have an in-depth knowledge and appreciation for how agile solutions can help to transform businesses. Our partners are the ones leading the way in agile development, transparency and continuous improvement.

Is Your Business Guilty Of Data Hoarding?

Computer storage has come a long way in the past 30 years. There are people alive today who have never encountered a 3.5” floppy disc. These storage devices could house a paltry 1.44 MB. To put this in context, you’d need over 736 floppy discs to equal 1GB of storage. We now have an abundance of storage available on every device we own, which means we get to be a lot less picky the data we hang on to, but this abundance of storage has led to a new security problem. Data hoarding.

What is data hoarding?

Data hoarding is what happens when individuals and companies don’t have a policy in place for sorting through their data and keeping the relevant information while deleting the rest. With storage becoming cheaper and more readily available, the risk of data hoarding is higher than ever before. After all, it’s much easier to just cling on to everything rather than making decisions about what needs to stay and what can go.

What does data hoarding mean for security?

Unfortunately, data hoarding can have serious implications for security. The reason for this is very simple. Imagine you have a giant stack of papers. Most of the pieces of paper contain useless information, but a few of the pieces have your bank details on them. If you lost track of a few pieces of paper, it would be difficult for you to know if the information contained on the paper was important or useless. Data hoarding works the same way. Unless you have a system in place for organising and then sorting your data by importance, then you could end up hanging on to some potentially damaging data in amongst the useless data.

Data breaches are sadly not uncommon and can have serious financial ramifications for companies. Ensuring you know what information you hold on customers is the first step in keeping it safe. Data hoarding can lead to holding duplicate files or hanging on to sensitive information for longer than you need to. Putting a plan in place to ensure only essential information is kept on file is the best way to protect against data hoarding.

Switching to cloud storage is one of the best ways to prevent duplicate versions of files causing problems for data security. By keeping everything in one secure and central place, this can help to prevent employees from keeping duplicate versions of the same files on their computers or mobile devices. This also makes it much easier to establish a system for organising the files and ensuring only essential information is kept around.

If you’d like to know more about how BCN can help you prevent data hoarding, get in touch today on 0345 095 7000, email us on info@bcn.co.uk or fill in the contact form below.

Beyond The Four Walls: Essential Mobile Security for Businesses

The internet has revolutionised the way we do business. Securing your company used to be all about keeping things within the four walls of your office. A firewall and antivirus software could keep threats at bay and this was widely accepted as sufficient for IT security. Then the mobile device came along and turned this four-walls theory on its head. With devices coming in and out all the time, accessing sensitive emails over coffee shop WiFi networks and falling between the cracks of internet security, the issue of mobile security doesn’t come up nearly as often as it should. Every company should have a mobile security policy in place to protect sensitive data from falling into the wrong hands.

Update your company mobile security policy

Every business should have a mobile policy that includes security provisions. This should outline what is and what isn’t acceptable on a company mobile device. This includes phones, tablets and laptops as they can all be taken away from the office and are therefore at higher risk. Your policy should also specify if users can access company data from their own devices.

Designate responsibility for mobile security

Things like keeping software and antivirus software up-to-date can often fall between the cracks, particularly for personal and mobile devices. Deciding who is responsible and making sure they are aware of this responsibility is essential. This can become part of the mobile security policy and should be checked frequently to ensure employees are compliant.

Switch to the cloud

The cloud provides unrivalled security for users on the go. If you want to keep your data secure, then storing all of your sensitive data on a cloud account is far safer than saving it on a mobile device. If your phone, laptop or tablet is ever stolen and you are using a cloud account you can simply revoke access and your data will remain secure.

Use data encryption

In 2012, a NASA employee’s laptop containing the details of 10,000 employees was stolen from their car. While the laptop did have password protection, it wasn’t encrypted, which meant the data was at risk. If it can happen to NASA, it can happen to you. Encrypting all devices is an essential step for mobile security but it is often overlooked as password protection is seen as sufficient.

Mobile security is an essential component of any company security plan if you want to keep your business your business. With more and more employees switching to mobile devices and working outside of the four walls of the business, it makes sense to put a mobile security plan in place to keep your data secure.

Cloud Computing Advantages for SMEs

The cloud offers flexibility, scalability and security. Which is convenient, because these are just some of the things small business owners are looking for. For those growing a business, there can be no better IT solution than one that grows with them. The world of business is fast changing, and the business owners leading the way are those switched on to cloud computing advantages.

While it might seem like a complex concept, anyone with an email account can grasp the idea of cloud computing and its advantages. For anyone who has ever logged into their email account from a computer that isn’t their own and found all of their emails and files accessible to them, the advantages of cloud computing are fairly easy to understand. The modern company isn’t confined to one location, and the rise of entrepreneurs starting businesses from their dining table means that cloud computing is the logical choice to enable collaboration without a traditional office environment.

Here are just some of the cloud computing advantages we can think of…

Increased Collaboration

One of the most obvious cloud computer advantages is the opportunity for collaboration. An office in a box solution allows the work from home entrepreneur to scale up their operations as an when required. This might mean collaborating with someone on the other side of the city, or the other side of the world. This solution travels with the business owner, meaning they are always ready for the next step in growing their enterprise. However, the only obstacle lies in company-wide adoption. Issues with compatibility can arise if one user is reluctant to adopt new technology. For cloud computing to work, everyone will have to be on board, which means educating all of the stakeholders and staff on how the cloud works.

Speed Up Processes

The cloud has no doubt streamlined many processes which we now take for granted. For businesses, the prospect of speeding up cumbersome processes can help to free up time for other tasks. Going paperless, for example, can free up time spent stuffing envelopes or scrambling through filing cabinets. Moving processes to the cloud also opens up the possibility of using big data to make better business decisions.

Improve Security

We couldn’t compile a list of cloud computing advantages without mentioning security. The threat of cyber attacks hasn’t been far from the headlines in the past couple of months, which is prompting some companies to review their security protocols. Unfortunately, SMEs often think they’re immune to such threats until it’s too late. With the right hosted cloud services provider, security can be greatly improved. Even steps as simple as keeping software up-to-date will help to improve IT security and reduce the risk of malware infection. And if something goes wrong, data recovery from the cloud can help to minimise disruption.