Smart Tips – How to Protect Your Restaurant Against Power Surges

Power surges due to local area load shedding or lightning strikes are a reality for most people. The rush of a power surge that takes place when the electricity rushes through the electrical circuit can cause devastating results for businesses and restaurants.

Restaurants rely on electricity constantly as it affects the amount of customers they get. If a restaurant is shut down due to a power surge that electrocuted all the kitchen equipment, it means that income is lost for that period. As a restaurant owner, you need to plan what you would do in such an event and how to prevent it.

The first thing you could do is to install a power surge protector. This power surge protector can minimise the impact of a power surge when lightning strikes. So the electrical catering equipment will not get that quick rush of electricity which can lead to electrical failure. The consequences of a sudden electrical rush can be devastating as the electricity can burn or destroy an electrical appliance’s circuit board.

You could consider using gas powered catering equipment such as a gas stove and oven. For restaurants there are 6 burner stove options available that allow you to cook more food at one time. A gas stove and oven is not connected to an electrical outlet but rather to a gas cylinder. Therefore during a power surge, this commercial catering equipment will be safe.

It is advisable to unplug your catering equipment while it’s not in use during a storm. In this manner you can minimise the devastating effects of a storm. You can still continue with the restaurant duties by using the minimal catering equipment required. Anything that your staff is not using, unplug it while the storm ensues.

Check that your insurance covers the replacement of your kitchen equipment when it is struck by lightning. Most insurance companies do cover this but with others it is an optional cover. In the event that your catering equipment is damaged due to lightning, they should be able to replace it. However, take the precautions anyway, because the time between the insurance pays out and the electrical surge could be days or weeks apart and your restaurant still has to keep on going.

The last thing you want is for all your electrical catering equipment to be damaged due to lightning. Rather take the precautions before it happens and save yourself the burden and cost of having to replace the catering equipment.

You Should Know This – The Risk Management of Wrist Management

One of the huge costs of running a grocery store is healthcare. Workmen’s (workperson’s) compensation is also a challenge due to all the grocery clerks who have wrist problems or Carpal Tunnel. Those repetitive motions of picking up items and moving them across the scanner take their toll on the frail human skeletal bones of the wrist. You can see why large grocery store chains with risk management departments take “wrist management” seriously. Let’s talk, but first let me tell you a little personal story.

The other day, I purchased 8 two-liter bottles, and I noted the cashier line I got into was one with an older lady who normally wears a Carpal Tunnel wrist support brace. I put one bottle up and said; “8 of those” and told her I was saving her from Carpal Tunnel, and she thanked me and said she had forgotten her wrist brace today and was happy not to have to do any heavy lifting. I was then pleased with myself for thinking ahead and on-the-fly and bypassing the heavy bottles to the young bagging gal who asked the same-old same-old; “Paper or Plastic?”

If this older checker is not careful, she’ll be on disability before she knows it, and I bet the risk management department knows that too, even if their in-house specialists and in-house contracted chiropractors are trying to keep her on as long as possible to avoid another Carpal Tunnel union case and addition to their already challenging disability numbers.

In considering all this, it occurred to me that the grocery store risk management department should consider a couple of new strategies:

1.) Have Carpal Tunnel Syndrome suffering employees work one-day on the check stand and then the next day monitoring the self-check aisles.
2.) Divide half the checkout stands in the store facing the other way, thus forcing the employees to use their other hand, and rotate the employees every other day to a different facing checkout stand.
3.) Increase the number of self-checkout stands.
4.) Rotate checkers with Carpal Tunnel Syndrome to other parts of the store, deli section, produce section, etc.
5.) Invest in R&D to come up with a viable exo-skeleton wearable solution through the grocery store industry association.
6.) Put out a research grant to university bio-mimicry engineering students to solve the problem.

Well, there you have my advice for today, this of course comes from my entrepreneurial brain as a problem solver. The money spent to find a solution or change-up the routines of employees should be welcomed by all; unions, shareholders, employees, and the good old risk management specialists of the largest grocery store chains. Please consider all this and think on it.

The Question – What Is a Cyber Security Risk Assessment and Why Do One?

Modern day companies face serious dangers from the cyber domain. The FBI recently reported that cybercrime increased 24% last year. The time has come for businesses to become proactive and conduct a cyber security risk assessment. It focuses on identifying the threats and vulnerabilities that confront an organization’s information assets.

Threats are forces that can harm organizations and destroy mission critical data. Vulnerabilities are the pathways that threats can follow to damage, steal, destroy or deny the use of information assets. Risks are realized when threats converge with vulnerabilities. Devastating losses can occur in a variety of ways.

A cyber risk assessment produces an understanding of the consequences associated with unauthorized disclosure of an organization’s confidential or mission critical information. A business owner or governing authority, with the results of a cyber risk assessment in hand, can decide to accept the risk, develop and use deploy countermeasures or transfer the risk.

The world is immersed in an enormous asymmetric threat environment that is enabled by an incalculable number of vulnerabilities. Cybercrime is growth industry has a low-risk with a high-pay off. The financial losses, due to data breaches, now exceed the dollar amount of the illegal global drug trade. Law enforcement, sadly, is unable to prevent cyber criminals from attacking your company. Organizations are largely on their own.

One of the few ways that a company can thwart cyber risks is to realistically assess its exposure and to implement controls that lower the chance of risks from being realized. Cyber security must be regarded as a business process that requires precise managerial controls similar to those found in accounting and finance.

How can an organization accomplish the cyber risk assessment?

Information assets must first be identified. Internal and external threats and vulnerabilities need to be realistically and objectively measured. The consequences of failing to offset risk needs to be understood. Existing policies, procedures and controls should be aligned with security
best practices. Risk mitigation strategies, based upon organizational priorities, can be adopted.

Organizations would then be able to focus on increasing their information security efforts.

Failing to take extra information security steps can result in irreparable harm to the organization, violations of regulations, statutes, fines, lawsuits and damage to the value of the company and customer base.

The directors of publicly owned corporations and privately owned companies must comply with multiple laws, regulations and take all prudent steps to prevent information security breaches. Doing otherwise is irresponsible and stands as evidence of a lack of due diligence.

The findings of a cyber risk assessment can point the way for an organization to develop and follow through upon an information security plan that assures mission critical information.

Avoiding the steps to correct any weaknesses that are discovered very well be considered to be a lack of due diligence.