Get Started Today!  732-747-9373   

Fotolia 68929807 M new

DeckerWright Corporation Blog

1 minute reading time (289 words)


Having a business at the Jersey Shore during hurricane season you become addicted to the weather channel. Where is the latest hurricane, and is it going to impact us? After making it through Super Storm Sandy, here are some pointers to relieve your stress about the inevitable storm: 

  1. If you are in a flood prone area, make sure you have a plan for getting your computer equipment to higher ground.
  2. Keep equipment in inner rooms away from windows. 
  3. Make sure your backups are functioning and that there is a cloud copy of your data.
  4. Have a paper copy of key business information, bank accounts, key clients, employees and vendors with you.  This should be part of your Business Continuity Plan.
  5. If a storm impact is imminent, gracefully shutdown all of your computing resources.
  6. Distribute your systems and have some systems cloud based. Data redundancy between local and cloud systems will provide for business continuity in the event you lose power for an extended period.
  7. Establish a cell phone account with a data plan that allows you to use your phone as a mobile hot-spot. 
  8. Have a location with backup power available. Use your phone as a hot spot to get Internet connectivity.
  9. Have spare batteries and fuel for at least three days to keep your phones and computers charged. 
  10. Establish communications protocols with your staff on how to communicate in the storm’s aftermath.  
  11. Maintain access to your data remotely. If not used daily, test periodically to make sure the remote access to your data works. 
If you follow these steps and are able to get at least some of your key data cloud hosted, your business should be able to weather the storm with no problem.

Click here for FEMA's recommendations for small businesses

Latest Blog

“Spoofing” is one of our industry’s more technical terms. In a broad sense, spoofing in technology means taking on an appearance or identity of something trusted. Some of the more common types of technology spoofing include MAC address, phone caller ID, email address, e...

Account Login