4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hurricane Preparation for Information Technology Departments Checklist

Man in Storm

With the uncertainty of Hurricane Irma looming over our heads, it is important to remain calm and ensure that our families, and businesses, are thoroughly protected. The team at 4IT has created a Hurricane Preparation checklist for your IT Department to make sure that your business stays afloat during and after a hurricane.

Before the Storm:

  1. Designate a person at the facility to coordinate IT preparation.
  2. Once a hurricane watch has been issued, have all users backup any important data on their workstations to the network file server, or to removable media.  They should make 2 separate backups: 
    • One to be taken offsite by the end user,
    • One to be given to the IT coordinator.
  3. Once a decision has been made for final preparations, an email should be sent to vendors/customers indicating that email will be unavailable after the systems have been shut down.
  4. All workstations, printers, and workstation hardware should be shut down, disconnected from the wall power outlets and the network jack, and should be moved off of the floor and placed on top of desks.  If the workstations are attached to a UPS, shut the UPS off, and disconnect it from the wall power, and place it on top of the desks as well.  All the workstation hardware should be covered with plastic to prevent water damage in the event of a roof leak.  Large plastic garbage bags work very nicely for this purpose.
  5. A final disaster recovery backup should be run on all the file servers.  Once that backup is completed, it should be given to the IT coordination, and the previous night’s backup should be taken offsite by someone else.
  6. Once the final backup is completed, the file servers should be shut down and disconnected exactly like a workstation.  Once the servers are all shut down, the network switches, DSL modems, and any other communications gear, including phone systems should also be shut down and disconnected from the power outlets.  Again, all this equipment should be up off the floor and covered with plastic to prevent water damage in the event of a roof leak.
  7. The IT Coordinator should place all of the backup media into a waterproof container, and take it offsite.

Once the Storm Passes:

  1. Examine the entire facility to see if there was any damage that may have leaked water into the facility.
  2. If the facility is operating on a generator, it will be important to use a UPS for any equipment that you wish to use.
  3. If the facility has sustained damage, the entire electrical system should be inspected before IT equipment is reconnected.
  4. Once electrical power is working correctly, remove the plastic covering from all of the computer equipment.
  5. Connect and power up the network switches and communications gear.
  6. Connect and power up the servers.
  7. Connect and power up the workstations and peripherals

We hope that your friends, family, and businesses stay safe throughout the storm.

 - Ray, Alex, and the rest of the 4IT Team

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows IT Support Disaster Recovery Innovation Hardware Business Continuity Workplace Tips VoIP Computer User Tips Saving Money Miscellaneous Virtualization Windows 10 Upgrade Mobile Devices Mobile Device Management Data Network Security Server Mobile Computing Email Alert Communication Network Save Money Microsoft Office Small Business communications Quick Tips Smartphone Information Technology Social Media Smartphones BYOD Going Green Mobile Office Apps Health Android Office Browser Gadgets Operating System Chrome Managed IT Services Outsourced IT Application Ransomware Mobility Tablet WiFi Holiday Productivity Firewall Managed IT Avoiding Downtime Disaster Risk Management BDR Search Best Practice Data Management Cybercrime The Internet of Things Passwords Remote Computing Telephone Systems Cybersecurity Unified Threat Management IT Solutions Spam Saving Time History Remote Monitoring Hacking VPN Apple Facebook Vendor Management Employer-Employee Relationship Budget Hard Drives Automation Proactive IT iPhone Office Tips Customer Relationship Management User Error Money Data Backup Collaboration Phishing Wireless Technology Password Hosted Solution Computers Marketing Big Data Law Enforcement Content Filtering Recovery Phone System Data Recovery Gmail Router Humor Administration Government Wearable Technology Maintenance PowerPoint Antivirus Lithium-ion battery Virus Shortcut Social Current Events Bring Your Own Device Telephony Printer Work/Life Balance USB Vulnerability Analytics Encryption Office 365 Computer Repair App Politics SaaS Personal Information Cost Management Audit Intranet HaaS Bandwidth Printer Server Wireless Business Intelligence Unsupported Software Users Laptop Data Security Cloud Computing OneNote Google Drive Windows 8 Save Time Trending Social Engineering Education Net Neutrality Data Protection Tech Support Private Cloud Point of Sale Outlook IT COnsultant Applications Streaming Media Two-factor Authentication Uninterrupted Power Supply hacker Managing Stress online currency Data Storage Excel Transportation Computer Care Social Networking Battery Robot Travel Automobile End of Support Efficency Update Customer Service Biometrics Retail Virtual Reality Internet Exlporer Meetings Internet of Things Identity Theft Solid State Drive Display Flexibility Instant Messaging Sports Emails Augmented Reality IT Support HIPAA Network Congestion Entertainment Windows 10 Paperless Office Benefits Help Desk DDoS Computer Accessories Samsung Fax Server Wi-Fi Emergency Artificial Intelligence Mouse Compliance Workplace Colocation iOS WIndows 7 Consultant Data Loss The Blindside Of eWaste Managed IT Service Storage Inbound Marketing Company Culture Black Market Adobe Access Managed IT Services Regulations Computer Fan Touchscreen Google Docs IT Security Twitter Value Cameras Cleaning Licensing Microsoft Excel Surge Protector Dark Web User Experience Keyboard Television Avoid Downtime Screen Mirroring Science Presentation 3D Printing Virtual Desktop File Sharing Hard Drive Bluetooth Best Available Music Hiring/Firing IT Technicians Cast Windows 10s Data storage systems Images SharePoint Nanotechnology ISP Uograde Books Smart Technology Video Games Hard Disk Drive Document Management Tablets hack Teamwork Advertising Root Cause Analysis Programming Blogging Data Breach Legal HBO Busines Continuity best practices Near Field Communication Mobile Device NFL Networking Touchpad Managed Security Cortana CrashOverride Website Scam IT Management data breach IT consulting Word Wiring Human Resources Legislation Running Cable Settings OneDrive Information Amazon Employer Employee Relationship WIndows Server 2008 Operating Sysytem risk management Reliable Computing Debate Co-managed IT Worker Commute Windows Ink PDF Scalability Patch Management Bloatware Files Google Maps Lifestyle Safety Text Messaging Commerce Ebay Computing How To Regulation Chromecast Upgrades Software as a Service Branding Distributed Denial of Service Nokia Training Sync Administrator Tutorial IT service Shadow IT Webinar Domains Relocation IT solutions Mobile Microblogging Professional Services Youtube Gift Giving Sales Buisness Managed Service Provder Webinar Taxes Supercomputer Electronic Medical Records Comparison IT Budget Specifications Reputation