Ignorance is a voluntary misfortune.True for SMEs, as if they are sitting on adormant volcano, irruption could devastate the business.

Indeed, let’s discover the dormant volcano beneath. I have identified 5 important and serious possibilities in times to come, SMEs are likely to face while adopting Information Technology.

1. Continuity

Documents, Spreadsheets, Designs, Drawings, Cost Sheets, Tender Bids, Email Communications, ERP Data are the digital assets of enterprise. Its loss or manipulation will not allow your business to continue. One needs proper preservation strategy for digital assets.

  • Make sure to have all computers, servers backed up at multiple places everyday.
  • Keep one backup copy outside of your office or factory.
  • Maintain backups in different versions to nullify data manipulation possibilities.D. Keep one copy on secured cloud vault.

If you are not doing it, there is a dormant volcano underneath which could crash the continuity of your business.

2. Portability

Digital assets are scattered on computers, laptops, servers and tablets. What if, there is a disaster and you need to rescue all your digital assets in 3 flat minutes. Well you can’t move all computers and servers. One needs to keep the digital assets portable.

  • Make sure that all your digital assets are stored centrally at any point of time by computers and laptops. Central storage could be portable and easy to move from the spot.
  • Make sure that users don’t have liberty to scatter and litter data all around on devices.

If you are not doing it, there is a dormant volcano underneath which could crash the continuity of your business, in times of disaster.

3. Competitiveness

Business Information is derived out of digital assets. Technology, Formula, Quotations, Product Pricing, Customer Information, Transactions Data, Sourcing Data, Marketing Data, Sales Data, Financial Data, Employees Data, define your competitiveness. Theft or unauthorized access of such business information will weaken your competitiveness. One needs to secure this information.

  • Make sure that Information can’t be leaked from computers, laptops, tablets by pen drives, USB Storage, smartphones.
  • Make sure to control email system such that Information can’t be leaked over email attachment or BCC (Blind Carbon Copy)
  • Make sure to control internet access that Information can’t be leaked over online venues.

If you are not doing it, there is a dormant volcano underneath which could blow your competitiveness and make you permanent looser.

4. Productivity

Your employees are also netizens. They are also tempted to spend hours to find a good deal on online shopping, to play on stock market, to get hooked up to chat messengers, or to get entertained on online videos. This causes serious loss of efficiencies. One needs to balance between professional and personal use of Internet resource.

  • Give restricted internet access to employees as their job demands
  • Avail reports of their online activities.
  • Have a system on which they can spend 30 odd minutes to use internet for personal use. Make sure to isolate your business data while it is happening.

If you are not doing it, there is a dormant volcano underneath which could make your business un-viably inefficient.

5. Cyberfrauds

Cyber-fraud is going to be the most serious threat in times to come. Email Frauds, Phishing Frauds, Misuse of Net Banking to siphon money. Our legal system is not so prepared to take on such crime and mostly, criminals are unscathed and unpunished. One needs to armor the IT against such potential crimes.

  • Educate users against phishing
  • Monitor outgoing emails to sense any fraudulent activity
  • Implement Evidence Creation Systems of computer usage

If you are not doing it, there is a dormant volcano underneath which could launder you to the extent you can’t afford.

I believe, SME-IT will have to transform from unorganized n haphazard to organized n standard. SMEs will have to change their mindset about IT spending and IT performance criteria