4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hurricane Preparation for Information Technology Departments Checklist

Man in Storm

With the uncertainty of Hurricane Irma looming over our heads, it is important to remain calm and ensure that our families, and businesses, are thoroughly protected. The team at 4IT has created a Hurricane Preparation checklist for your IT Department to make sure that your business stays afloat during and after a hurricane.

Before the Storm:

  1. Designate a person at the facility to coordinate IT preparation.
  2. Once a hurricane watch has been issued, have all users backup any important data on their workstations to the network file server, or to removable media.  They should make 2 separate backups: 
    • One to be taken offsite by the end user,
    • One to be given to the IT coordinator.
  3. Once a decision has been made for final preparations, an email should be sent to vendors/customers indicating that email will be unavailable after the systems have been shut down.
  4. All workstations, printers, and workstation hardware should be shut down, disconnected from the wall power outlets and the network jack, and should be moved off of the floor and placed on top of desks.  If the workstations are attached to a UPS, shut the UPS off, and disconnect it from the wall power, and place it on top of the desks as well.  All the workstation hardware should be covered with plastic to prevent water damage in the event of a roof leak.  Large plastic garbage bags work very nicely for this purpose.
  5. A final disaster recovery backup should be run on all the file servers.  Once that backup is completed, it should be given to the IT coordination, and the previous night’s backup should be taken offsite by someone else.
  6. Once the final backup is completed, the file servers should be shut down and disconnected exactly like a workstation.  Once the servers are all shut down, the network switches, DSL modems, and any other communications gear, including phone systems should also be shut down and disconnected from the power outlets.  Again, all this equipment should be up off the floor and covered with plastic to prevent water damage in the event of a roof leak.
  7. The IT Coordinator should place all of the backup media into a waterproof container, and take it offsite.

Once the Storm Passes:

  1. Examine the entire facility to see if there was any damage that may have leaked water into the facility.
  2. If the facility is operating on a generator, it will be important to use a UPS for any equipment that you wish to use.
  3. If the facility has sustained damage, the entire electrical system should be inspected before IT equipment is reconnected.
  4. Once electrical power is working correctly, remove the plastic covering from all of the computer equipment.
  5. Connect and power up the network switches and communications gear.
  6. Connect and power up the servers.
  7. Connect and power up the workstations and peripherals

We hope that your friends, family, and businesses stay safe throughout the storm.

 - Ray, Alex, and the rest of the 4IT Team

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency IT Support Windows Disaster Recovery Innovation Business Continuity Hardware VoIP Workplace Tips Mobile Devices User Tips Saving Money Computer Virtualization Windows 10 Upgrade Miscellaneous Network Security Mobile Device Management Data Server Mobile Computing Email Alert communications Communication Save Money Microsoft Office Network Quick Tips Smartphone Small Business Social Media BYOD Information Technology Going Green Mobile Office Smartphones Health Office Managed IT Services Outsourced IT Apps Android Ransomware Operating System Chrome Browser Gadgets Application Productivity Disaster Holiday Firewall Managed IT The Internet of Things Tablet Avoiding Downtime Cybersecurity WiFi Mobility Passwords Telephone Systems Search Risk Management Remote Computing History Unified Threat Management Data Recovery IT Solutions Best Practice Data Management Spam BDR Cybercrime Data Backup Employer-Employee Relationship Budget Vendor Management Marketing Automation VPN Facebook Hacking Remote Monitoring Hard Drives Saving Time Apple User Error Money Collaboration Phone System Recovery Wireless Technology Office Tips iPhone Customer Relationship Management Law Enforcement Big Data Content Filtering Phishing Password Proactive IT Hosted Solution Computers Telephony Bring Your Own Device Lithium-ion battery Current Events Humor Administration Wearable Technology Printer Work/Life Balance Vulnerability Antivirus Maintenance PowerPoint Shortcut USB Virus Social Office 365 Encryption Analytics Gmail Router Government Intranet Wireless Unsupported Software Data Security Private Cloud Bandwidth Printer Server Laptop Cloud Computing Google Drive Point of Sale OneNote IT COnsultant Save Time Computer Repair Trending Education Net Neutrality Data Protection SaaS Audit HaaS Tech Support Business Intelligence Outlook Users Windows 8 Politics Personal Information Social Engineering App Cost Management Emails Computer Care Battery Robot Instant Messaging HIPAA Entertainment Automobile End of Support Benefits Network Congestion DDoS Computer Accessories Efficency Help Desk Internet Exlporer Mouse Compliance Internet of Things Identity Theft Two-factor Authentication Solid State Drive Managing Stress Flexibility IT Support Sports Excel Display Windows 10 Augmented Reality Travel Social Networking Samsung Paperless Office Wi-Fi Artificial Intelligence Emergency Update Customer Service Fax Server Biometrics Applications Workplace Retail Redundancy Data Storage Virtual Reality Streaming Media hacker Meetings Uninterrupted Power Supply Transportation online currency Surge Protector Wiring Cast Reliable Computing Information Television Music Windows 10s Hiring/Firing systems Nanotechnology 3D Printing Debate Data storage Bloatware Hard Disk Drive Books Tablets Smart Technology hack Video Games Root Cause Analysis Document Management HBO ISP Advertising best practices Branding Data Breach NFL Cortana Legal CrashOverride Distributed Denial of Service Blogging Mobile Device IT Management Touchpad Programming data breach WIndows 7 Nokia Managed Security Word Scam Legislation Settings eWaste Storage Inbound Marketing Website Regulations WIndows Server 2008 risk management Windows Ink Employer Employee Relationship Value Cameras Worker Commute Patch Management Operating Sysytem OneDrive PDF Amazon User Google Maps Scalability Commerce Files Science Co-managed IT Virtual Desktop Presentation Regulation Text Messaging Bluetooth Best Available Safety Software as a Service Lifestyle How To IT Technicians Chromecast Ebay Upgrades Hard Drive Sync iOS SharePoint Computing Data Loss Training Managed IT Service Administrator Uograde Consultant Images Adobe Colocation Managed IT Services Computer Fan Teamwork The Blindside Of Google Docs Busines Continuity Company Culture Black Market Access Networking Near Field Communication Touchscreen Licensing Dark Web IT Security Microsoft Excel Cleaning Screen Mirroring Human Resources IT consulting Twitter Experience Avoid Downtime Running Cable Keyboard File Sharing FAQ Professional Services Charger Wireless Charging Gift Giving WannaCry Taxes Evernote IT service Comparison Supercomputer Workers Domains Electronic Medical Records Specifications IT Budget Updates Conferencing Microsoft Word Reputation Microblogging Gifts Youtube Buisness Device Security Sales Devices Tutorial Webinar Managed Service Provder Webinar Credit Cards Shadow IT Spyware Mobile Relocation IT solutions