Written by Rachel Dokter, Social Media Manager

Anita McBride recalls her memory of Sept. 11, 2001 while working at the White House. Upon hearing that a plane had struck the World Trade Center, the threat was made real to her when the Secret Service directed her to a different room.  Within minutes, the directive turned to an evacuation.  Her husband worked close by in the Daimler-Chrysler building and offered his space.  Anita and the other employees walked the two blocks to his office. What started off as a group of 20 people soon grew to 72 people.  They set up offices in this temporary White House work space.

Huh?  15 years ago the White House disaster recovery plan was to call a friend and set up business?  That’s disconcerting.

In this emergency, Anita’s White House department did transition smoothly into their makeshift office.  White House workers were lucky to have this makeshift office available to them but is this best practice technology planning?   What were they to do under true evacuation?  A smooth transition and lack of damage would certainly not be the case.

Your data is not secure. Any number of factors can arise, from malicious intent to ransomware to human error that can devastate your systems.  How will you respond when disaster strikes?  What emergency plans do you have to restore your systems and get your business running again? How long will it take to recover lost data?  Question:  if the Crypto-Wall ransomware encrypted all your files tonight and you couldn’t access them, what would you do?

Make sure your business has a disaster recovery plan in place – and one that’s better than the White House’s.  Contact i3 Business Solutions today with any questions or concerns you may have.

Our process excellence and managed services offerings make us ready and willing to help.

To read the full article by The Wall Street Journal, click here.


Get in touch with i3 Business Solutions today

At i3 Business Solutions, we use the best technology to partner with local businesses to transform IT departments and improve business productivity. Contact us here or fill out the form below:
  • Hidden
Published with permission from TechAdvisory.org. Source.