Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Disasters Come in All Sizes

Disasters Come in All Sizes

Each organization has a different definition for how they define a disaster. One business might feel that they can get away with losing a few files here and there, while another might need every file to be secure and protected against data loss. Regardless, the importance of being able to define the severity of a disaster cannot be underestimated, as you will need to properly gauge just how much hot water your business has landed in before it can pull itself up by the bootstraps and push forward.

Two factors are typically used to define just how bad a disaster is. The first is how much it costs to resolve the issue. This can include all sorts of costs associated with data loss, including hardware replacement costs and infrastructure damages. The second factor is the overall loss of productivity. This second factor ties into how much downtime your business experiences due to a data loss incident.

Determining the total cost of a disaster incident is critical, and it’s the only way that you can know for sure just how much work you’ll have on your hands just to get back into a bearable position. Depending on the type of disaster experienced, you could have a considerable amount of damage that needs to be repaired. For example, a hardware failure is perhaps the least costly incident. Of course, a hardware failure shouldn’t be underestimated, because it still means that you have to replace a server unit or workstation, as well as pay the employee working with that technology (or your whole organization, for that matter) for the time wasted while waiting to get back in business.

Other disasters can have far-reaching repercussions that drastically affect your organization’s ability to recover. A flood or similar natural disaster could destroy both your data infrastructure and physical infrastructure, including your office space. How much would it cost you to relocate an entire workforce? What about repairs to the building and/or renting a new one? All of these expenses hitting you at once is enough to crush even the most conservative budget--at least, if you’re unprepared for them, anyway.

If data security enters into the picture, you can bet that the costs of resolving the incident can increase exponentially. Depending on the type of information stolen, you could either have stolen credit card numbers, identities, and even health records. In the fallout of a data breach, you might be subject to fines due to regulations like HIPAA that could add insult to injury. Furthermore, you have your reputation to worry about. Will anyone be willing to work with your organization again if you’re negligent with important information? That’s a question that you never want to ask.

Downtime is another major factor for determining how bad a disaster is. Downtime can be defined as anytime your business doesn’t operate as intended. It can be something as simple as an employee not being able to access a critical account, or it could be something as sudden and impossible to avoid as one of the aforementioned disaster scenarios. What it boils down to is that your business loses money when it’s not being productive, so you should do everything in your power to keep this from happening.

Decatur Computers Inc. can equip your business with an enterprise-level data backup and disaster recovery solution, as well as a business continuity plan that can help your business survive even the most disastrous scenarios. To learn more, reach out to us at 217-475-0226.

Email Malware is the New Schrӧdinger’s Cat
Have You Implemented Email Encryption?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 17 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Privacy Best Practices Business Computing Hackers Network Security Cybersecurity IT Support Malware User Tips Ransomware Google Software Backup Technology Email Small Business Managed IT Services Android Business Management Internet Windows 10 IT Management Phishing Communications Cloud Efficiency Productivity Smartphone Data Business Outsourced IT Cost Management Data Recovery Hard Drive Data Security Update Hardware Innovation Artificial Intelligence Antivirus Cybercrime Mobile Device Management Gadgets Network Touchscreen Save Money Computer Microsoft Hacking Business Continuity Law Enforcement Passwords Project Management Start Menu Access Control Browser Office 365 Windows Data Management VPN Encryption Disaster Recovery Saving Money Server Internet of Things App Facebook BDR Bitcoin Data Protection Maintenance Alert Remote Monitoring Social Engineering Blockchain Microsoft Office Apps Data Backup Gmail IT Services Business Technology Vulnerabilities Word Digital Collaboration SaaS Patch Management Scam Holiday Websites Money Laptop Search Knowledge Cortana HTML Printing Business Cards Software as a Service Tablet Analytics Smartphones Identity Theft News Tech Terms Virtual Assistant Upgrades Government How to Comparison Desktop Fake News Mobile Device Google Drive Legal Downtime Virus Running Cable Big Data WiFi Data Breach Managed Service Provider Solid State Drive Google Maps Hard Drive Disposal Telephony Telephone Systems Downloads Piracy Specifications Cabling YouTube IT Support Wireless Applications Emergency Microsoft Excel email scam VoIP Consultant VoIp Software License Television Settings Managed IT Services Mobile Security Vulnerability Cryptocurrency Uninterrupted Power Supply Audit Mobile Devices Mobility Operating System Mouse Worker Administration Two-factor Authentication DDoS eWaste Time Management Corporate Profile Information Technology Managed IT Cloud Computing Samsung History Password Unified Threat Management Multi-factor Authentication Computer Care Robot Automation Google Calendar Mobile Technology Excel IBM Spam Device security Unified Threat Management Hosted Solutions Automobile Document Management Augmented Reality Outlook SharePoint Disaster Tip of the week Vendor Mangement Best Practice Website Computing Infrastructure Employer-Employee Relationship Access Google Docs Virtual Reality Distributed Denial of Service Business Mangement Unsupported Software Tech Term Unified Communications Networking Spyware Social Media Budget Company Culture Redundancy Freedom of Information Data loss Windows 10 Devices Marketing Compliance Regulations CrashOverride Office Users Office Tips

Latest Blog

If you’ve ever felt as though someone was watching what you were doing while you were working remotely, either at home or in public, there’s a chance that you were right. Without a private Internet connection, it is a simple matter for others to watch your processes and stea...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.