10 Crucial Steps for Hurricane
Proofing Your IT Systems
1. Back Up Your Data to the Cloud
Ensure all critical data is backed up to an offsite or cloud location to prevent data loss.
Offsite & Cloud Backups: Ensure all critical data is backed up to an offsite or cloud-based storage system,
like AWS, Azure, One Drive, Dropbox, or another cloud provider.
2. Test Your Backup Systems
Before departing, make sure to test your backups to ensure you can restore them quickly if needed.
What good is it to have backups if you have never tried to restore them.
3. Secure Physical Hardware
Move servers, PCs and critical hardware to safe locations within the building. If feasible, elevate them to reduce
flood damage risks. Uninterruptible Power Supplies (UPS): Ensure all critical systems are connected to UPS
devices to allow graceful shutdowns in case of power loss. Power Surge Protection: Use surge protectors for
all IT equipment to guard against power spikes.
4. Set Up Remote Access
Remote Access Setup: Configure remote access for employees using VPNs and cloud services to ensure work
can continue if office premises are closed or damaged.
5. Create an IT Communication Plan
Share emergency contacts and communication tools with your IT team to stay connected.
Prepare and distribute a list of key IT staff, vendors (e.g., internet providers, cloud service providers), and emergency service numbers.
Set up multiple communication methods (SMS, email, Slack, etc.) for key personnel to stay in touch.
6. Perform a Graceful System Shutdown
Plan and execute a shutdown of non-essential systems before the storm hits to avoid damage.
7. During the Hurricane Monitor Your IT Systems Remotely
Detect if your office has lost power by using monitoring tools to track your systems and servers during the hurricane to maintain visibility.
8. Cybersecurity during the Storm: Secure Your Network with VPNs and MFA
Ensure that all remote work is secure with VPNs and multi-factor authentication to protect sensitive data. A lot of times during last
minute changes we forget to secure our network. Criminals don't care if you are in a emergency, actual it's the complete opposite
they try to take advantage.
9. Evaluate Hardware Post-Storm
Once it's safe, check for any damage to hardware and restore essential systems first.
10. Update Your Disaster Recovery Plan
Review your process after the storm and make improvements for the future.