Quest Technology Management

Helping clients manage their technology for over 30 years.

The Recovery Gap — Part 2: A Short List of 5 Best Recovery Practices

360-degree arrow concept

In my last post, I shared some sobering numbers from a recent study by the DRP Council on how well — and not well — organizations recover from disruptions. Many of the problems revealed in the study can, I believe, be attributed to four causes:

  • Inadequate recovery plans that don’t anticipate the types of events that actually occur
  • Insufficient plan documentation and lack of compliance reporting
  • Not nearly enough recovery plan testing
  • Failing the recovery tests that do occur

All of this is eminently understandable — it’s hard to focus budget and time on what we prefer to regard as unlikely possibilities.

So here’s my first recovery best practice: think of your recovery plan as the best way to keep those possibilities unlikely, because when they do happen, they cost plenty. Continue reading

The Recovery Gap — Part 1: Online Presence and Prudent Preparation

Bridging the gap concept

Online presence has never been more important to your business — but behind it lurks immense technical complexity. The sort of complexity that produces things like software, network and power failures, and human error.

So, of course, it’s prudent to prepare ways to recover from such failures, mistakes and vagaries of nature, which is why so many organizations — a majority, according to a recent study by the DRP Council — deploy some sort of secondary recovery site. Though, less than 10% use cloud-based Disaster Recovery as a Service (DRaaS). Continue reading

5 Capabilities That Your Wireless Network Needs Now

Network concept with chrome balls as network nodes

We can’t afford to ignore the myriad of mobile devices and apps currently saturating our attention and wireless connections.

In my last post, I laid out some of the industry’s eye-popping numbers. This time, I’m offering up just one graphic (from Cisco’s recent Global Mobile Data Traffic Forecast Update) showing why you must upgrade your network infrastructure. Pronto. Continue reading

Building Better Wireless By Mapping Your Goals

Compass "direction" concept

Wireless chatter really is everywhere: I recently saw an ad from a major pain relief company touting the benefits of its latest product, a “wireless” pain patch

But wireless implementations can be plenty painful, and there’s no magic patch to ease the strain.

When clients ask us the best way to ensure that a wireless service performs as desired, we advise them to begin by asking — in non-technical terms — what they’re trying to accomplish. Continue reading

Your Wireless Network: Signs That the Tail has Begun to Wag the Dog

A red "help" button on the keyboard

In many companies, the wireless capability added on to their enterprise network a few years ago has become some employees’ primary network.

It’s a development that signals just how quickly mobile devices are proliferating the workplace. The so-called “consumerization of business” changes the way we work — and our data networks have to keep up.

This transformation has been in the works for a while. In 2011, market analyst firm Gartner predicted 80% of corporate wireless network technologies would be obsolete by 2015. Gartner may well be right, given the findings of more recent research. Continue reading

4 Capabilities to Look For in an IT Staffing Company

Two hands joining together two oversized jigsaw pieces

When it comes to choosing a firm to help with your IT staffing efforts, it’s important to remember that some IT staffing firms do a better job than others. Here’s what you have a right to expect:

1. An IT staffing company should be able to help you strategically plan your IT hiring
This involves a thorough examination of budget priorities, workloads, the skillsets of current team members, and future projects — all with an eye on flexibly meeting both your short- and long-term goals. Look for an IT staffing company that helps you determine what types of special skills you need for your IT projects, the best mix of permanent IT staff and contractors, when you’ll see workload spikes, etc.

Continue reading

Getting the IT Staff You Need May Not be as Easy as You Think

Man contemplating a decision

According to Computer Economics’ 2014/2015 IT Spending & Staffing Benchmarks report, hiring of IT professionals is finally on the upswing — yet another indication that our long-declining economy continues to improve.

Even so, you may not have an easy time finding the right IT expertise when you need it. That’s because there’s something of a squeeze going on (you know, the one that puts you between a rock and a hard place):

Continue reading

Planning Your Hybrid Cloud: 6 Key Steps (part 2)

Architecture blueprint as a model for cloud planning

In my last post I focused on the first two steps in planning for a hybrid cloud: Making sure your IT infrastructure is “cloudified” and assessing your current environment and workloads. In this post, I’ll lay out the final four steps:  Continue reading

Planning Your Hybrid Cloud: 6 Key Steps (in 2 parts)

Information Cloud

By some accounts, better than 50% of organizations are now deploying hybrid clouds — and for some very good reasons:

  • Improved security, because sensitive data can remain behind your private cloud firewall while less sensitive data can be permitted onto a public cloud.
  • Ability to specify where and under what terms and conditions your data is stored.
  • Effective workload balancing without breaking the bank, since using a public cloud to, say, handle peak loads can be far cheaper than keeping everything in-house or moving everything to a public cloud.

To get a hybrid cloud up and running, you need to begin with planning — specifically, a six-step planning process that, fortunately, you do not have to undertake alone. In this post, I’ll focus on the first two steps: Continue reading

IT Security in 2014: How You Can Protect Your Business

Virtual locks representing security

Most security experts — including ours at Quest — will tell you that it’s no longer a question of if attempts to compromise your data, apps, and/or technology infrastructure will happen, it’s now only a question of when.

So what can you do to protect your business in this age when it’s so tough to distinguish between trusted and threatening network traffic, when there’s no longer such a thing as a secure perimeter around your data, when the “attack surface” has never been greater? Continue reading