We’ve been working all week to get our clients up & running, and we’ve been reminded of a few critically important tips that everyone needs to keep front & center while restoring their businesses.

Check out these 4 Critical IT Recovery Tips After Hurricane Ida

1. If there was water damage, inspect your servers and I.T. equipment very carefully before plugging them in or turning them on. ANY water damage to electronics, even after it’s dried, can cause them to fail catastrophically when powered up, damaging your data or building, or worse yet, cause physical harm to nearby people.

2. Don’t drop your guard! If you’re restoring internet connectivity with cellular hotspots or other new internet feeds, be sure to keep your computers protected by your best firewalls and endpoint protection software. Hackers are extremely aware of this terrible situation, and they will try to take advantage of it by “kicking you when you’re down.”

3. Be wary of phishing attacks – again hackers know we’re stressed and going through tough times. If you get an email or a call that you didn’t request from your bank, the government, utility companies, or anyone offering help, watch out. Fake “outage maps” and “FEMA assistance offers” are on their way, trust me. If you click the links in these fake emails, hackers can get access to your bank accounts, take over your computer and spy on you, steal your passwords, and worse. Unfortunately, we’ve seen the results of this too many times.

4. Review your company’s disaster recovery plan – as soon as you possibly can is the absolute best time to review your plan, see where it worked or didn’t work, and make it better. Future bad days and environmental disasters are inevitable, so take the opportunity to prepare now! (And if you don’t have a written D.R. plan, now’s the time to write it out while all the recent lessons learned are fresh in your memory!) In the days ahead, don’t forget this incredibly important step!

Additional Resources: Click Here to watch our latest webinar on Disaster Prep and Recovery!

As always, we have a lot more tips and suggestions available on our website – www.Turnkeysol.com, and if you need help or ideas with anything, we’re here and ready to help, 24×7.

Related Posts - TKS Blog

TKS Newsletter - 2024 December
Here's our December 2024 Newsletter Read the full PDF version here: The TKS Sentinel - December Issue In this month's edition, we discuss: Ransomware Threats PDF Hijacking ...
Read more
pitfalls of cyber attack
Avoid These Data Breach Damage Control Pitfalls
Data breaches are an unfortunate reality for businesses of all sizes. When a breach occurs, the immediate response is critical. How a company manages the...
Read more
zero trust protections
Zero Trust Cybersecurity: Essential for Keeping Your Data Secure
As cyber threats become increasingly sophisticated, businesses can no longer rely solely on traditional methods to protect their data. Hackers are no longer trying to...
Read more
email security tips
Enhance Your Email Security in 6 Simple Steps
6 Simple Steps to Enhance Your Small Business Email Security Email is one of the most commonly used tools in business today—but it’s also a prime...
Read more