We’ve been working all week to get our clients up & running, and we’ve been reminded of a few critically important tips that everyone needs to keep front & center while restoring their businesses.

Check out these 4 Critical IT Recovery Tips After Hurricane Ida

1. If there was water damage, inspect your servers and I.T. equipment very carefully before plugging them in or turning them on. ANY water damage to electronics, even after it’s dried, can cause them to fail catastrophically when powered up, damaging your data or building, or worse yet, cause physical harm to nearby people.

2. Don’t drop your guard! If you’re restoring internet connectivity with cellular hotspots or other new internet feeds, be sure to keep your computers protected by your best firewalls and endpoint protection software. Hackers are extremely aware of this terrible situation, and they will try to take advantage of it by “kicking you when you’re down.”

3. Be wary of phishing attacks – again hackers know we’re stressed and going through tough times. If you get an email or a call that you didn’t request from your bank, the government, utility companies, or anyone offering help, watch out. Fake “outage maps” and “FEMA assistance offers” are on their way, trust me. If you click the links in these fake emails, hackers can get access to your bank accounts, take over your computer and spy on you, steal your passwords, and worse. Unfortunately, we’ve seen the results of this too many times.

4. Review your company’s disaster recovery plan – as soon as you possibly can is the absolute best time to review your plan, see where it worked or didn’t work, and make it better. Future bad days and environmental disasters are inevitable, so take the opportunity to prepare now! (And if you don’t have a written D.R. plan, now’s the time to write it out while all the recent lessons learned are fresh in your memory!) In the days ahead, don’t forget this incredibly important step!

Additional Resources: Click Here to watch our latest webinar on Disaster Prep and Recovery!

As always, we have a lot more tips and suggestions available on our website – www.Turnkeysol.com, and if you need help or ideas with anything, we’re here and ready to help, 24×7.

Related Posts - TKS Blog

TKS Newsletter - 2025 February
Here's our February 2025 Newsletter Read the full PDF version here: The TKS Sentinel - February Issue In this month's edition, we discuss: Work-Specific Tools Windows 11...
Read more
password managers for business
How Password Managers Strengthen Your Cybersecurity Posture
The Growing Threat of Password Vulnerabilities Protecting your sensitive business information has never been more critical than it is today. Passwords remain one of the weakest...
Read more
tech news updates jan 2025
TKS Newsletter - 2025 January
Here's our January 2025 Newsletter Read the full PDF version here: The TKS Sentinel - January Issue In this month's edition, we discuss: New Tech Tools Malicious...
Read more
data backups and recovery
Essential Data Security and Backup Strategies For Business
Businesses produce and rely on vast amounts of information every day. From intellectual property to customer details and financial records, your data is the lifeblood...
Read more