{"id":382,"date":"2016-04-13T21:25:30","date_gmt":"2016-04-14T02:25:30","guid":{"rendered":"http:\/\/johnbeauford.com\/?p=382"},"modified":"2016-05-27T23:15:15","modified_gmt":"2016-05-28T04:15:15","slug":"the-single-biggest-it-risk-a-small-business-has","status":"publish","type":"post","link":"https:\/\/johnbeauford.com\/wp\/the-single-biggest-it-risk-a-small-business-has\/","title":{"rendered":"The single biggest IT risk in small business and 9 ways to deal with it"},"content":{"rendered":"<p>The dependence of small business on IT systems and the people who run them increases continuously. Whether the accounting systems, corporate\u00a0web site, inventory system, the online shopping cart, marketing automation, email servers, the customer management system, internal database servers, manufacturing automation servers and the like. The list goes on and on. Without those IT systems, business grinds to a halt. And without the people that maintain them, you risk business grinding to a halt if something goes awry. IT systems have loads of risk vectors. Hackers, Malware, viruses, ransomware, hardware and software failures and the like.<\/p>\n<p>However those don&#8217;t create the biggest risk a small business owner has with respect to IT.<\/p>\n<p>The biggest IT risk a small business owner faces is being unprepared\u00a0for the loss of a (or the) key IT person or key software developer.<\/p>\n<p>Examples of the key person(s):<\/p>\n<ul>\n<li>The developer who wrote the code for the product.<\/li>\n<li>The sysadmin who knows all the configuration and passwords.<\/li>\n<li>The director who knows where all the vendor logins are including the payment processors.<\/li>\n<li>The development architect who knows how all the systems fit together and where the vulnerabilities are<\/li>\n<\/ul>\n<p>Losing any of these types can be hard on a small business. If your business has several of these people in one person then you are at a HUGE risk if that person walks.<\/p>\n<p>What can you do to mitigate the impact if that key person is gone?<\/p>\n<p>Here are 9 steps that can help when that happens.<\/p>\n<h2>System configurations\u00a0backed up<\/h2>\n<p>Make sure that the existing staff has backups of key system configurations saved in a known location. Firewalls, key routers, switches, IP addresses of networks and servers and other company configuration setup should be saved in a known and agreed to place that the owner knows about and understands how to access. This should be also documented.<\/p>\n<h2>Login\/Password locker<\/h2>\n<p>It is wise to use a corporate password locker such as <a href=\"https:\/\/agilebits.com\" target=\"_blank\">1Password<\/a> or <a href=\"https:\/\/lastpass.com\" target=\"_blank\">Lastpass<\/a>. Key system passwords should be stored here with the master password to the locker available to the owner.<\/p>\n<h2>System diagrams<\/h2>\n<p>Simple block diagrams should be in a known location that diagram key systems, how they are connected, where they are located etc. This will enable the owner to help locate systems in case an issue arises and will help them direct new personnel or vendors when repairs or service is needed.<\/p>\n<h2>Key 3rd party vendor information<\/h2>\n<p>A list of all 3rd party vendors that are used by the IT \/ Development teams should be kept in a known place. Contact information for the account representative, as well as services provided and key contract or agreement details.<\/p>\n<h2>Backup locations<\/h2>\n<p>The locations of on-site backups of systems should also be documented. Additionally off-site backup locations and \/ or vendors should be detailed in the 3rd party vendor section.<\/p>\n<h2>Process and procedures and site\/documents<\/h2>\n<p>The owner should know the processes used to get IT and development work done, including how to deploy system updates for key servers, web sites and online apps. If for no other reason than to train the replacement employee.<\/p>\n<h2>Monitoring Notifications<\/h2>\n<p>If your company uses automated monitoring such as\u00a0<a href=\"https:\/\/www.icinga.org\" target=\"_blank\">Icinga<\/a>\u00a0or similar, then the owner or replacement personnel need to be added to the notification list.<\/p>\n<h2>Job Descriptions<\/h2>\n<p>A documented set of job descriptions will help in the hiring process after the key person leaves. This will give the owner more detail on what the key person does, and the attributes and skills needed in a replacement employee.<\/p>\n<h2>System\/Content Deployment steps<\/h2>\n<p>The steps, logins and other necessaries required for making site or system updates to key systems need to accessible and understood so that another\u00a0employees or the owner could execute them or show them to a contractor in a pinch. You may think this is far fetched but if something happens you want to be able to update content and code if needed.<\/p>\n<h2>Final Thoughts<\/h2>\n<p>As part of your on-going training and planning it would also benefit the company to conduct a risk and vulnerability assessment so that key risks are known and can be planned for. Additionally, transitions can be planned for as well with\u00a0succession planning as part of leadership\/career development and key employees being\u00a0cross trained regularly. Finally, the owner should audit these areas periodically to validate readiness and expose weaknesses.<\/p>\n<p>The above 9 steps won&#8217;t eliminate the pain of losing a key employee but they will enable the business to move along and speed the on-boarding process of the replacement. The wise small business owner will do well to track and keep up with these areas.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The dependence of small business on IT systems and the people who run them increases continuously. Whether the accounting systems, corporate\u00a0web site, inventory system, the online shopping cart, marketing automation, email servers, the customer management system, internal database servers, manufacturing automation servers and the like. The list goes on and on. Without those IT systems, &hellip; <a href=\"https:\/\/johnbeauford.com\/wp\/the-single-biggest-it-risk-a-small-business-has\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">The single biggest IT risk in small business and 9 ways to deal with it<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":424,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[20,17,13,14],"tags":[],"class_list":["post-382","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-employees","category-general-it","category-leadership","category-teams"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/johnbeauford.com\/wp\/wp-content\/uploads\/2016\/04\/risk-ahead.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p47QCA-6a","_links":{"self":[{"href":"https:\/\/johnbeauford.com\/wp\/wp-json\/wp\/v2\/posts\/382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/johnbeauford.com\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/johnbeauford.com\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/johnbeauford.com\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/johnbeauford.com\/wp\/wp-json\/wp\/v2\/comments?post=382"}],"version-history":[{"count":12,"href":"https:\/\/johnbeauford.com\/wp\/wp-json\/wp\/v2\/posts\/382\/revisions"}],"predecessor-version":[{"id":426,"href":"https:\/\/johnbeauford.com\/wp\/wp-json\/wp\/v2\/posts\/382\/revisions\/426"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/johnbeauford.com\/wp\/wp-json\/wp\/v2\/media\/424"}],"wp:attachment":[{"href":"https:\/\/johnbeauford.com\/wp\/wp-json\/wp\/v2\/media?parent=382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/johnbeauford.com\/wp\/wp-json\/wp\/v2\/categories?post=382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/johnbeauford.com\/wp\/wp-json\/wp\/v2\/tags?post=382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}