So your IT person knows all of your systems like the back of their hand. You’ve had them take over every aspect of the network and day-to-day operations and things are finally moving forward. They have become the sole keeper of the kingdom. So what happens if they win the lottery?
Worse yet, what if they find another job or get hit by the proverbial bus? Who knows the administrator password? When was the last backup? Where are the backups? Who knows how to reset the email server when that one particular problem occurs? Where are the instructions on changing a user’s permission or locking out a terminated user? How do you get that critical report to that important customer?
How will your business survive and move forward? This is “The Risk of 1.”
Now don’t get me wrong… I think hiring the right networking person is a good move. I’d be happy for them if they won the lottery and would never want them to even SEE the proverbial bus. But, the reality of the situation is that the people in your business and their families are counting on you to pay their mortgages, send their kids to college, plan for weddings and even to buy gas to get to work tomorrow. You need to plan ahead so that “The Risk of 1” is never a factor.
“The Risk of 1”
“The Risk of 1” refers to any single person or system that could either inadvertently or purposefully stop your business dead in its tracks. The solution is to build redundancy into every aspect of your network infrastructure and software and the person that runs both.
If you have one person that knows everything about the network, bring in someone to share the knowledge with AND help you through transitionary periods. If you have one server, implement a second one. If you rely heavily on the web, implement a second internet connection. If you rely heavily on a SQL server, implement a mirror. If you rely heavily on a software package, have a disaster recovery (DR) plan for when something goes wrong.
This line of thinking should be applied to all of your critical IT systems, hardware, software, processes and people. Start with the most critical item (most likely your IT person) and make a list of failure points in your process. It doesn’t take long. Work your way through a list of servers, firewalls, switches, software, data roll-up processes, etc. Add a time frame to the list, like once every 2 months or once a quarter. In a year, you’ll have built redundancy into most of your IT systems.
It may take a little while to get to full redundancy, but you WILL sleep better at night knowing that your IT person and your systems can’t hold your business hostage.
The Bottom Line…
Don’t get yourself into a situation where everything hangs on one someone or something. Add redundancy into your resources so that when something does come up, you can move forward with business as usual, guaranteeing your success.
Tom Swip has been developing and streamlining business processes for over 20 years. Tom’s expertise lies in business process automation, software and application design and network infrastructure. In his spare time, Tom likes kayaking, mountain biking and other outdoor activities.