logo
Hurricane Florence  Disaster Recovery at Ground Zero

Practice Management

Hurricane Florence Disaster Recovery at Ground Zero
By the time you read this, Hurricane Florence will be a distant memory for most of you.  However, for those of us who live at Ground Zero, part of which is Wilmington, NC, the memory of Hurricane Florence will last for a long time. 

As I write this, the sound of chainsaws cutting up fallen trees, and trucks carrying away debris in my neighborhood, are loud and clear and will remain so for days to come.  There are many homes here that were flooded, had trees fall on them, or both.  These homes are damaged beyond repair, which means their owners will be on a first name basis with an insurance adjuster and the mortgage rep at the bank for the foreseeable future.  Even now, I can’t leave Wilmington, because all of the roads are washed out.  Yes, it is really that bad. 

At the time of writing, it is exactly seven days after the hurricane, and businesses are trying to get back up on their feet.  Some are having far more success than others.  For some businesses that were not flooded and didn’t have a 3-ton Oak or Pine fall through the ceiling, getting up and going again is just a matter of getting back power and Internet (more on the Internet part in a bit).  For others, it means calling IT Providers and asking for offsite backups.  And this is where things get dicey.  

Here is what I learned about Disaster Recovery at Ground Zero of a Hurricane: 

Not everyone had their servers, workstations, firewalls, cables, printers, etc. insured with their property insurance. Many had the building insured, along with the furniture, but their $8,000 Dell Server, and their twelve $900 Dell workstations, and their $800 SonicWall Firewall, and $120 NetGear switch were not insured.  So, the first step these businesses must take is to order new equipment and pay for it all out of pocket.  And don’t forget the labor for IT to put it all back together. 

Not everyone had tested their backup by doing a test restore previously, nor had they kept the backup software/device updated.  This disaster is the first time they are restoring from a backup many had in place for years.  You can smell the fear as they pray it works because they are attempting something they have never done before.  Still many more had backup software that was three or four versions behind which means it is no longer supported by the vendor.  Again, you can smell the fear. 

Not everyone has a line of credit to keep the business going while rebuilding.  Getting new equipment shipped in from Dell, HP, etc. is going to take a couple of weeks or longer.  The roads are washed out so there is no way in or out of town.  Offsite backups must be copied to a USB drive, and then shipped out because no Internet means they can’t be downloaded, but just getting backups in may take days.  Again, the roads are washed out.  Even after all that arrives, the building must be repaired and made ready and all the construction crews are already tied up on other jobs.  Once all of that is done, it will take IT two or more days to put everything back together depending on the size of the business.  Some businesses will be down a month or more while bills are stacking up in the mailbox, with no option other than to call creditors and beg for mercy. 

Not everyone can find installation media and license keys for line-of-business software.  For some, once the equipment arrives and is set up, they are still stuck.  They can’t re-install line-of-business applications, because they have lost installation media, don’t remember the password to log in to the vendor portal, or can’t find the license key.  Vendors are often happy to help, but this still means more time waiting on hold on the phone or waiting for replacement media to be shipped out.  Furthermore, some vendors are happy to help, but for an additional fee. 

For some that must reinstall their line-of-business application and can’t find the installation media or license keys, they must also upgrade at the same time.  Some small businesses have a line-of-business application, yet it’s several versions behind.  The vendor no longer supports the old version they are on.  Therefore, not only does the business have to contact the vendor to get a new copy of the software, they also must perform an on-the-fly upgrade at the same time.  This adds unwelcome layers of complexity and takes more time to get things going again.  Not to mention costing way more money as the upgrade must be paid for.  Oh, and the best part, the new software has a new user interface that users aren’t familiar with.

The Cloud may not save you.  You have all your stuff in the cloud, which means you don’t have to back up anything.  You have nothing to worry about-until you’re told it will be another week before you get Internet back at your location.  There is nothing you can do but wait.  And all that is assuming your building and other assets are undamaged.  Even with no flooding and minimal damage, you still have no choice but to wait through the countless days until Internet service is restored.  Your neighbors who have all their stuff on-premises and suffered only minimal damage as you did are already back up and running and seeing customers.

For some, they discover not everything was being backed up.  The business has new servers and new workstations in and backups restored.  Yet, things are still missing.  For example, the Excel spreadsheet of clients who are behind on invoices, the PDF files from the attorney regarding an existing case, and other such documents that were being stored on a workstation-rather than the server-are gone.  The workstations weren’t being backed up like the servers were.   

These are the things I discovered/observed during Hurricane Florence here in Wilmington, North Carolina.  While no disaster recovery plan will be perfect against something as powerful as a hurricane, many, if not all, of the situations described above can be avoided.  And most of it is just common-sense and thinking ahead.  Yes, you should have property insurance on your IT equipment.  Yes, you should be able to put your hands on license keys and installation media.  Keep that material in a lock box or brief case instead of scattered about the office.  Keep line-of-business software updated.   Depending on the vendor, you may not need to update every single time a new version is released, but at least stay on a version that is supported.  Talk to your bank about having a line of credit for emergencies and make sure it’s enough to handle replacing all IT equipment and keeping the bills paid for at least 30 days.  Also, keep documents you need backed up on a file share on the server instead of on the local computer.  Or, have your IT set up folder redirection so your My Documents, Desktop, etc. are redirected to the server behind the scenes for backup even though you are saving files to your My Documents. 

And last, but far from least, test your backups.  If you haven’t taken a backup and restored it to a test server, then verified that backup by logging on to that test server to make sure it is an exact replica of what you have in production, then you have zero proof your backup works.  Zero proof.  Don’t let the day you need your backup be the day you test it.  And keep your backup software/devices up-to-date. 

Many businesses here in Wilmington will survive to see the sun rise.   

Some will not. 


James Summerlin


The End of Windows 7 Approaches

Compliance

The End of Windows 7 Approaches:Many company owners and managers cried foul as they saw themselves as being forced to upgrade
The End of an Era

Practice Management

The End of an Era:On April 8, 2014, Windows XP was declared End of Life by Microsoft.  On July 14, 2015, Windows Server 2003 was also declared End of Life by Microsoft. 
Business Continuity: Practice Management (PM) software and Electronic Medical Record (EMR) software vendors

Practice Management

Business Continuity: Practice Management (PM) software and Electronic Medical Record (EMR) software vendors:So you have your disaster recovery program in place, you have a way to replace your servers if they get melted into slag because the Earth for some reason drifts too close to the Sun or whatever, and you have a nice fat insurance policy to pay for it all when disaster day does strike. So you're good to go, right?
A Second Look at DISASTER RECOVERY

Practice Management

A Second Look at DISASTER RECOVERY:By: James Summerlin
I've read several articles on Disaster Recovery over the years, one or two in this very magazine. I've even written a paper on it myself. What I want to do is discuss things such as what data really is, where it is located, what common mistakes people make regarding disaster recovery, and some conclusions. Before I get into all the details, let me define what a disaster is: A disaster is any event that renders the medium in which you store your data useless. That medium, of course, is going to be a computer. Note that the disaster doesn't have to take out your entire office. If you think about it, just trashing your network is enough.
Finding Good IT Support

Practice Management

Finding Good IT Support:There are a lot of "IT guys" out there and everyone of them will tell you their way is the RIGHT WAY (which we all know isnt true because they all can't be right and none of them are me). So how do we sort through this mess and find decent IT help? Well, I obviously cant promise that any IT guy you find will be as awesome as I am, but we can certainly look at some tips and tricks to help make things better.
Becoming Your Own IT

Practice Management

Becoming Your Own IT:About two or three times a year I run across someone who is starting up a new business, such as medical billing or a new practice, and that person has made the Big Decision to do their own IT. I usually see these people on the support forums I frequent asking questions to get help.
Why You Are Not Getting PAID

Billing

Why You Are Not Getting PAID:We are going to take a break from all this technical stuff to talk about . . . more technical stuff. But this time, we aren't going to focus on security, we are going to focus on why your claims reject, deny, or just don't get paid in general. If you are a doctor who does your billing in-house or a billing center wondering why you are collecting less than 90% of everything that goes out the door, then read on as this article is for you.
Security at Your Fingertips - Part 5 of 5

Compliance

Security at Your Fingertips - Part 5 of 5:Today's feature isn't going to focus on tools, but rather where you can get security information. Keeping up-to-date is a must in today's world and it's very easy to get lost in the sea of knowledge. Where do you go to find out about the latest threats? How do you mitigate the latest threats? Those are some of the questions we will answer here.
Security at Your Fingertips Part 4 of 5

Compliance

Security at Your Fingertips Part 4 of 5:Today, we're going to talk about how you can retrieve a history of events, particularly security events, which have happened to your computer. Introducing today's article:
Using Bitlocker to Encrypt Your Entire Hard drive

Practice Management

Using Bitlocker to Encrypt Your Entire Hard drive:Bitlocker is a built-in feature of Windows but only for certain editions of Windows. In order to use Bitlocker, you have to be running one of the following Editions of Windows:
They Say They Are HIPAA Compliant, But...

Compliance

They Say They Are HIPAA Compliant, But...:We are going to take a quick break from our five part series, Security At Your Fingertips, so I can get something off my chest. I've been dealing with this problem for a long time now and, quite frankly, I'm getting tired of it. This problem is in most of the Billing and EMR softwares I've seen on the market (along with a lot of other software out there) and it doesn't seem to be getting that much better after all this time. Before I continue, we need a disclaimer:
Security at Your Fingertips Part 2 of 5

Compliance

Security at Your Fingertips Part 2 of 5:Our focus was on preventing the installation of those nefarious thumb drives that everyone seems to have these days. However, the technique works for other hardware as well. Keep in mind that you must have Windows Vista to use that feature - it is not available on Windows XP or below. Also, keep in mind that when I speak of Windows XP, I specifically mean Windows XP Professional. With Vista, I specifically mean Windows Vista Business or Windows Vista Ultimate. I cannot guarantee that any of these features are available in the home editions of Windows as I do not support those editions.
Security at Your Fingertips - Part 1 of 5

Compliance

Security at Your Fingertips - Part 1 of 5:That's right, everyone. Here we are in yet another multipart series - as if the 10 Laws of computer security weren't enough. One of the biggest issues many people face when implementing security is cost. For some odd reason, so many people think that in order to have a secure environment they have to go out and purchase expensive third-party tools to do all kinds of whacky things. This isn't to say there aren't some nice third-party security tools out there, some of them really are nice, but before we break out the company credit card I think we need to take a look at what's already on our computer to see if it will do the job we need. Many of you will be very surprised at what Windows can do all on its own. Let's get started with today's article:
Immutable Security Law 10

Compliance

Immutable Security Law 10:At long last, here we are. Welcome, everyone, to number ten in our ten part series "The 10 Immutable Laws of Computer Security." It's been a very long ride, however, based on the feedback I have received it appears many of us have gotten something from all of the articles I've written about computer security and that was the whole idea from the start. Is some of this stuff a pain in the butt? Yes, it is. Is this stuff impossible to do or too expensive? No, it's not as long as you do some planning and use some good ol' fashioned common sense (and maybe kick your IT person around a little bit).
Computer Security: The 9th Law

Compliance

Computer Security: The 9th Law:Welcome to article number 9 in our 10 part security series. It's been a long ride, but I hope you've had some fun in our journey in trying to understand and get more comfortable with all this security stuff. I'm hoping by now many of us are realizing it isn't so bad after all.
Computer Security - The 8th Law

Compliance

Computer Security - The 8th Law:Welcome to article number 8 in our 10 part security series. It seems like yesterday we were at article number 2, doesn't it?
The 10 Immutable Laws of Computer Security - The Sixth Law

Compliance

The 10 Immutable Laws of Computer Security - The Sixth Law:Today, we begin the downhill journey with law number six, and we also get back on track with the more technical aspects of security. I now introduce you to the Sixth Law: The difficulty of defending a network is directly proportional to its complexity
The 10 Immutable Laws of Computer Security - The Fifth Law

Compliance

The 10 Immutable Laws of Computer Security - The Fifth Law:Last time we spoke of the fourth law of computer security: If you don't keep up with security fixes, your network won't be yours for long.
The 10 Immutable Laws of Computer Security - The Fourth Law

Compliance

The 10 Immutable Laws of Computer Security - The Fourth Law:Today, we are going to discuss the fourth immutable law: Keeping up with security fixes! If you don't keep up with security fixes, your network won't be yours for long. Patch Management is the industry buzzwords for the process of keeping up with security and other fixes that vendors release for their software.
Computer Security: The Third Law - Weak passwords trump strong security

Compliance

Computer Security: The Third Law - Weak passwords trump strong security:Oh, yes, the dreaded password. Everyone hates dealing with passwords. You have a password/passcode for your ATM card, your house alarm (assuming you have one), your home computer, your work computer, the list just goes on and on. But therein is where the problem lies.
Computer Security: The Second Law

Compliance

Computer Security: The Second Law:Today, we are going to discuss the second immutable law which again should be pretty straight forward: If a bad guy has unrestricted physical access to your computer, then it's not your computer anymore.
The 10 Immutable Laws of Computer Security - The First Law

Compliance

The 10 Immutable Laws of Computer Security - The First Law:All medical office works should read
Several years ago, Microsoft published what it called "The 10 Immutable Laws of Security." In this, the first installment of 10 articles, I will discuss each one and give examples of what you can do to protect yourself.
Two IT Situations to Avoid

Compliance

Two IT Situations to Avoid:As an IT consultant, one of the primary areas I see most business owners make poor decisions is Information Technology. What I find most amazing is that when I ask any given business owner a question such as how important good IT is to his or her business, I overwhelmingly get responses along the lines of, "yes, it is super important. We couldn't live without good IT!"

James Summerlin

James Summerlin


at

 

Total articles published on BC Advantage 24

Editorial Ad

Ad pdf ad here