10 Tips to Help Small Businesses Get Ready for the Unexpected

Tanya Wetson-Catt • 10 July 2023

What would you do if your business suffered a ransomware attack tomorrow? Do you have a contingency plan in case of a fire, flood or power outage? The unexpected can happen anytime, and small businesses can get hit particularly hard.


Small businesses are the backbone of many economies. They are critical for job creation, innovation, and community development. But running a small business comes with significant risks. This includes financial uncertainty, market volatility, and natural disasters.


60% of small businesses fail within 6 months of falling victim to a cyber-attack.


Thus, small business owners must prepare for the unexpected. This is to ensure their longevity and success. In this article, we will discuss some tips to help small businesses get ready for anything.


1. Create a Contingency Plan


One of the most critical steps in preparing for the unexpected is to create a contingency plan. A contingency plan is a set of procedures that help a business respond to unforeseen events. Such as natural disasters, supply chain disruptions, or unexpected financial setbacks.


The plan should outline the steps the business will take in the event of an emergency. Including who will be responsible for what tasks. As well as how to communicate with employees, customers, and suppliers.


2. Maintain Adequate Insurance Coverage


Small businesses should always maintain adequate insurance coverage. This protects them from unexpected events. Insurance policies should include things like:


·        Liability coverage

·        Property damage coverage

·        Business interruption coverage

·        Data breach costs


Business interruption coverage is particularly important. It can help cover lost income and expenses during a disruption. Such as a natural disaster or supply chain disruption.


One of the newer types of policies is cybersecurity liability insurance. In today’s threat landscape, it has become an important consideration. Cybersecurity insurance covers things like costs to remediate a breach and legal expenses.


3. Diversify Your Revenue Streams


Small businesses that rely on a single product or service are at greater risk. Unexpected events can cause them significant harm. Something like a raw material shortage could cripple an organization without alternatives.


Diversifying your revenue streams can help reduce this risk. It ensures that your business has several sources of income. For example, a restaurant can offer catering services. A clothing store can sell merchandise online as well as its physical location.


4. Build Strong Relationships with Suppliers


Small businesses should build strong relationships with their suppliers. This ensures that they have a reliable supply chain. This is particularly important for businesses relying on one supplier for their products.


In the event of a disruption, having strong relationships matters. It mitigates the risk of a supplier bankruptcy or supply chain issue. Having supplier options can help reduce the impact on your business.


5. Keep Cash Reserves


Small businesses should keep cash reserves to help them weather unexpected events. Cash reserves can help cover unexpected expenses. Such as repairs, legal fees, or loss of income. As a general rule of thumb, businesses should keep at least six months' worth of expenses in cash reserves.


6. Build Strong Outsourcing Relationships


If business owners try to do everything in house, they’re at higher risk. For example, if a key IT team member quits. In this case, the company could face major security issues.

Build strong outsourcing relationships with an IT provider and other critical support services. If something happens to a company’s staff or systems, they have a safety net.


7. Check Your Financials Regularly


Small business owners should check their finances regularly. This is to ensure that they are on track to meet their goals and to identify any potential issues early on.

This includes:


  • Tracking income and expenses
  • Creating and reviewing financial statements
  • Regularly meeting with a financial advisor


8. Invest in Technology


Investing in technology can help small businesses prepare for unexpected events. For example, cloud-based software can help businesses store their data off-site. This ensures that it is safe in the event of a natural disaster or cyber-attack. Technology can also help businesses automate processes. Automation reduces the risk of errors and improves efficiency.


9. Train Employees for Emergencies


Small businesses should train their employees for emergencies. This helps ensure that everyone knows what to do in the event of an unexpected event.

This includes training for natural disasters, cyber-attacks, and other emergencies. Businesses should also have a plan for communicating with employees during an emergency. As well as ensure that everyone has access to the plan.


10. Stay Up to Date on Regulatory Requirements


Small businesses should stay up to date on regulatory requirements. This helps ensure that they are compliant with all laws and regulations. This includes tax laws, labor laws, and industry-specific regulations. Non-compliance can result in fines, legal fees, and damage to your business's reputation.


In conclusion, small businesses face many risks. But by following these tips, they can prepare themselves for the unexpected. 


Improve Business Continuity & Disaster Preparedness


Get started on a path to resilience and protect your business interests. We can help you prepare for the unexpected.


Give us a call today to schedule a chat.

Let's Talk Tech

More from our blog

by Tanya Wetson-Catt 2 February 2026
Artificial Intelligence (AI) has taken the business world by storm, pushing organisations of all sizes to adopt new tools that boost efficiency and sharpen their competitive edge. Among these tools, Microsoft 365 Copilot rises to the top, offering powerful productivity support through its seamless integration with the familiar Office 365 environment. In the push to adopt new technologies and boost productivity, many businesses buy licenses for every employee without much consideration. That enthusiasm often leads to “shelfware”, AI tools and software that go unused while the company continues to pay for them. Given the high cost of these solutions, it’s essential to invest in a way that actually delivers a return on investment. Because you can’t improve what you don’t measure, a Microsoft 365 Copilot audit is essential for assessing and quantifying your adoption rates. A thorough review shows who is truly benefiting from and actively using the technology. It also guides smarter licensing decisions that reduce costs and improve overall efficiency. The Reality of AI Licensing Waste Implementing automated access revocation for contractors is not just about better security; it's a critical component of financial risk management and regulatory compliance. The biggest risk in contractor management is relying on human memory to manually delete accounts and revoke permissions after a project ends. Forgotten accounts with lingering access, often referred to as “dormant” or “ghost” accounts, are a prime target for cyber-attackers. If an attacker compromises a dormant account, they can operate inside your network without detection, as no one is monitoring an "inactive" user. For example, many security reports cite the Target data breach in 2013 as a stark illustration. Attackers gained initial entry into Target's network by compromising the credentials of a third-party HVAC contractor that had legitimate, yet overly permissive, access to the network for billing purposes. If Target had enforced the principle of least privilege, limiting the vendor's access only to the necessary billing system, the lateral movement that compromised millions of customer records could have been contained or prevented entirely. By leveraging Microsoft Entra Conditional Access to set a sign-in frequency and instantly revoke access when a contractor is removed from the security group, you eliminate the chance of lingering permissions. This automation ensures that you are consistently applying the principle of least privilege, significantly reducing your attack surface and demonstrating due diligence for auditors under regulations like GDPR or HIPAA. It turns a high-risk, manual task into a reliable, self-managing syAt first, buying licenses in bulk may seem like a convenient strategy since it simplifies the procurement process for your IT department. However, this collective approach often ignores actual user behaviour, since not every role needs the advanced features offered by Copilot. AI licensing waste occurs when tools sit unused on employee dashboards. For example, a receptionist may have no need for advanced data-analysis capabilities, while a field technician might never open the desktop application at all. Paying for unused licenses drains your budget, so identifying and closing these gaps is essential to protecting your bottom line. The savings can then be redirected to higher-value initiatives where they’ll make the greatest impact. Analysing User Activity Reports Fortunately, Microsoft includes built-in tools that make it easy to view your AI usage data. The Microsoft 365 admin centre is the best place to start. From there, you can generate reports that track active usage over specific time periods and give you a clear view of engagement. From this dashboard, you can track various metrics such as enabled users, active users, adoption rates, trends, and so on. This makes it easy to identify employees who have never used AI features, or those whose limited usage may not justify the licensing cost. This kind of software usage tracking allows you to make data-driven decisions and distinguish between power users and those who ignore the tool. This clarity not only allows for making efficient license purchases, but also sets the stage for having conversations with department heads to determine why certain teams do not engage with AI tools. Strategies for IT Budget Optimisation Once you identify the waste, the next step is taking action. Start by reclaiming licenses from inactive users and reallocating them to employees who actually need them. This simple shift, making sure licenses go to those who use them, can significantly reduce your subscription costs. Establish a formal request process for Copilot licenses. This ensures employees must justify their need for the tool, granting access only to those who truly require it and adding accountability to your spending. IT budget optimisation isn’t a one-time task; it’s an ongoing process that requires continuous refinement. Regularly reviewing these metrics, whether monthly or quarterly, helps keep your software spending efficient and under control. Boosting Adoption Through Training Low AI tool usage isn’t always about lack of interest. Sometimes, employees simply don’t need the tool, while other times they avoid it because they don’t know how to use it, insufficient training can lead to frustration and poor adoption. This means that cutting licenses alone isn’t enough; investing in user training is equally important. The most effective approach is to survey staff and assess their comfort level with Copilot. For employees who find it confusing, provide self-paced tutorials or conduct training workshops that demonstrate practical use cases relevant to their daily tasks. When employees see clear value and convenience, they are much more likely to adopt the tool. Consider the following steps to improve adoption: Host lunch-and-learn sessions to demonstrate key features Share success stories from power users within the company Create a library of quick tip videos for common tasks Appoint “Copilot Champions” in each department to help others Investing in training often transforms low usage into high value, turning what was once a wasted expense into a productivity-enhancing asset. Establishing a Governance Policy Another way to minimise Copilot license waste involves setting rules for how your company handles AI tools. A governance policy effectively brings order to your software management by outlining who qualifies for a license and setting expectations for usage and review cycles. The policy should also define criteria based on job roles and responsibilities. For instance, content creators and data analysts get automatic access, while other roles might require manager approval, thus preventing the “free-for-all” mentality that leads to waste. The policy should be clearly communicated to all employees to ensure transparency regarding how decisions are being made. This way, a culture of responsibility regarding company resources is established. Preparing for Renewal Season The worst time to check your Copilot AI usage is the day before renewal. Instead, schedule audits at least 90 days in advance to allow ample time to adjust your contract and license counts. This also gives you leverage during negotiations with vendors. By presenting data showing your actual needs, you put yourself in a strong position to right-size your contract and avoid getting locked into another year of paying for shelfware. Smart Management Matters Managing modern software costs demands both vigilance and data, particularly as most vendors move to subscription-based models for AI and software tools. With recurring expenses, letting subscriptions run unchecked is no longer an option. Regular Microsoft 365 Copilot audits safeguard your budget and ensure efficiency by aligning technology purchases with actual usage. Take control of your licensing strategy today. Look at the numbers, ask the hard questions, and ensure every dollar you spend contributes to your business’ growth. Smart management leads to a leaner and more productive organisation. Are you ready to get a handle on your AI tool spending? Reach out to our team for help with comprehensive Microsoft 365 Copilot audits, and eliminate waste from your IT budget. Contact us today to schedule your consultation.
by Tanya Wetson-Catt 30 January 2026
Your business runs on a SaaS (software-as-a-service) application stack, and you learn about a new SaaS tool that promises to boost productivity and streamline one of your most tedious processes. The temptation is to sign up for the service, click “install,” and figure out the rest later. This approach sounds convenient, but it also exposes you to significant risk. Each new integration acts as a bridge between different systems, or between your data and third-party systems. This bridging raises data security and privacy concerns, meaning you need to learn how to vet new SaaS integrations with the seriousness they require. Protecting Your Business from Third-Party Risk A weak link can lead to compliance failures or, even worse, catastrophic data breaches. Adopting a rigorous, repeatable vetting process transforms potential liability into secure guarantees. If you’re not convinced, just look at the T-Mobile data breach of 2023 . While the initial vector was a zero-day vulnerability in their environment, a key challenge in the fallout was the sheer number of third-party vendors and systems T-Mobile relied upon. In highly interconnected systems, a vulnerability in one area can be exploited to gain access to other systems, including those managed by third parties. The incident highlighted how a sprawling digital ecosystem multiplies the attack surface. By contrast, a structured vetting process, which maps the tool’s data flow, enforces the principle of least privilege , and ensures vendors provide a SOC 2 Type II report, drastically minimises this attack surface. A proactive vetting strategy ensures you are not just securing your systems, but you are also fulfilling your legal and regulatory obligations, thereby safeguarding your company’s reputation and financial health. 5 Steps for Vetting Your SaaS Integrations To prevent these weak links, let’s look at some smart and systematic SaaS vendor/product evaluation processes that protect your business from third-party risk. 1. Scrutinise the SaaS Vendor’s Security Posture After being enticed by the SaaS product features, it is important to investigate the people behind the service. A nice interface means nothing without having a solid security foundation. Your first steps should be examining the vendor’s certifications and, in particular, asking them about the SOC 2 Type II report . This is an independent audit report that verifies the effectiveness of a retail SaaS vendor’s controls over the confidentiality, integrity, availability, security, and privacy of their systems. Additionally, do a background check on the founders, the vendor’s breach history, how long they have been around, and their transparency policies. A reputable company will be open about its security practices and will also reveal how it handles vulnerability or breach disclosures. This initial background check is the most important step in your vetting since it separates serious vendors from risky ones. 2. Chart the Tool’s Data Access and Flow You need to understand exactly what data the SaaS integration will touch, and you can achieve this by asking a simple, direct question: What access permissions does this app require? Be wary of any tool that requests global “read and write” access to your entire environment. Use the principle of least privilege: grant applications only the access necessary to complete their tasks, and nothing more. Have your IT team chart the information flow in a diagram to track where your data goes, where it is stored, and how it is transmitted. You must know its journey from start to finish. A reputable vendor will encrypt data both at rest and in transit and provide transparency on where your data is stored, including the geographical location. This exercise in third-party risk management reveals the full scope of the SaaS integration’s reach into your systems. 3. Examine Their Compliance and Legal Agreements If your company must comply with regulations such as GDPR , then your vendors must also be compliant. Carefully review their terms of service and privacy policies for language that specifies their role as a data processor versus a data controller, and confirm that they will sign a Data Processing Addendum (DPA) if required. Pay particular attention to where your vendor stores your data at rest, i.e., the location of their data centres, since your data may be subject to data sovereignty regulations that you are unaware of. Ensure that your vendor does not store your data in countries or regions with lax privacy laws. While reviewing legal fine print may seem tedious, it is critical, as it determines liability and responsibility if something goes wrong. 4. Analyse the SaaS Integration’s Authentication Techniques How the service connects with your system is also a key factor. Choose integrations that use modern and secure authentication protocols such as OAuth 2.0 , which allow services to connect without directly sharing usernames and passwords. The provider should also offer administrator dashboards that enable IT teams to grant or revoke access instantly. Avoid services that require you to share login credentials, and instead prioritise strong, standards-based authentication. 5. Plan for the End of the Partnership Every technology integration follows a lifecycle and will eventually be deprecated, upgraded, or replaced. Before installing, know how to uninstall it cleanly by asking questions such as: What is the data export process after the contract ends? Will the data be available in a standard format for future use? How does the vendor ensure permanent deletion of all your information from their servers? A responsible vendor will have clear, well-documented offboarding procedures. This forward-thinking strategy prevents data orphanage, ensuring you retain control over your data long after the partnership ends. Planning for the exit demonstrates strategic IT management and a mature vendor assessment process. Build a Fortified Digital Ecosystem Modern businesses run on complex systems comprising webs of interconnected services where data moves from in-house systems, through the Internet, and into third-party systems and servers for processing, and vice versa. Since you cannot operate in isolation, vetting is essential to avoid connecting blindly. Your best bet for safe integration and minimising the attack surface is to develop a rigorous, repeatable process for vetting SaaS integrations. The five tips above provide a solid baseline, transforming potential liability into secure guarantees.  Protect your business and gain confidence in every SaaS integration, contact us today to secure your technology stack.
by Tanya Wetson-Catt 26 January 2026
Even the most powerful IT hardware today will eventually become outdated or faulty and will need to be retired. However, these retired servers, laptops, and storage devices hold a secret: they contain highly sensitive data. Simply throwing them in the recycling bin or donating them without preparation is a compliance disaster and an open invitation for data breaches. This process is called IT Asset Disposition (ITAD). Simply put, ITAD is the secure, ethical, and fully documented way to retire your IT hardware. Below are five practical strategies to help you integrate ITAD into your technology lifecycle and protect your business. 1. Develop a Formal ITAD Policy You can’t protect what you don’t plan for. Start with a straightforward ITAD policy that clearly outlines the steps and responsibilities, no need for pages of technical jargon. At a minimum, it should cover: The process for retiring company-owned IT assets. Who does what; who initiates, approves, and handles each device. Standards for data destruction and final reporting. A clear policy keeps every ITAD process consistent and accountable through a defined chain of custody. It turns what could be a one-off task into a structured, secure routine, helping your business maintain a strong security posture all the way to the end of the technology lifecycle. 2. Integrate ITAD Into Your Employee Offboarding Process Many data leaks stem from unreturned company devices. When an employee leaves, it’s critical to recover every piece of issued equipment, laptops, smartphones, tablets, and storage drives included. Embedding ITAD into your offboarding checklist ensures this step is never overlooked. With this process in place, your IT team is automatically notified as soon as an employee resigns or is terminated, allowing you to protect company data before it leaves your organisation. Once a device is collected, it should be securely wiped using approved data sanitisation methods before being reassigned or retired. Devices that are still in good condition can be reissued to another employee, while outdated hardware should enter your ITAD process for proper disposal. This disciplined approach eliminates a common security gap and ensures sensitive company data never leaves your control. 3. Maintain a Strict Chain of Custody Every device follows a journey once it leaves an employee’s hands, but can you trace every step of that journey? To maintain full accountability, implement a clear chain of custody that records exactly who handled each asset and where it was stored at every stage. This eliminates blind spots where devices could be misplaced, tampered with, or lost. Your chain of custody can be as simple as a paper log or as advanced as a digital asset tracking system. Whichever method you choose, it should at minimum document key details such as dates, asset handlers, status updates, and storage locations. Maintaining this record not only secures your ITAD process but also creates a verifiable audit trail that demonstrates compliance and due diligence. 4. Prioritise Data Sanitisation Over Physical Destruction Many people think physical destruction, like shredding hard drives, is the only fool proof way to destroy data. In reality, that approach is often unnecessary for small businesses and can be damaging to the environment. A better option is data sanitisation, which uses specialised software to overwrite storage drives with random data, making the original information completely unrecoverable. This method not only protects your data but also allows devices and components to be safely refurbished and reused. Reusing and refurbishing your IT assets extends their lifespan and supports the principles of a circular economy, where products and materials stay in use for as long as possible to reduce waste and preserve natural resources. With this approach, you’re not just disposing of equipment securely; you’re also shrinking your environmental footprint and potentially earning extra revenue from refurbished hardware. 5. Partner With a Certified ITAD Provider Many small businesses don’t have the specialised tools or software required for secure data destruction and sanitisation. That’s why partnering with a certified ITAD provider is often the smartest move. When evaluating potential partners, look for verifiable credentials and industry certifications that demonstrate their expertise and commitment to compliance. Some of the common globally accepted certifications to look for in ITAD vendors include e-Stewards and the R2v3 Standard for electronics reuse and recycling, and NAID AAA for data destruction processes. These certifications confirm that the vendor adheres to strict environmental, security, and data destruction standards, while taking on full liability for your retired assets. After the ITAD process is complete, the provider should issue a certificate of disposal, whether for recycling, destruction, or reuse, which you can keep on file to demonstrate compliance during audits. Turn Old Tech into a Security Advantage Your retired IT assets aren’t just clutter; they’re a hidden liability until you manage their disposal properly. A structured IT Asset Disposition program turns that risk into proof of your company’s integrity and commitment to data security, sustainability, and compliance. Take the first step toward secure, responsible IT asset management, contact us today.