Quest Technology Management

Helping clients manage their technology for over 30 years.

Application Security Scanning Can Save Your Business

Magnifying glass photograph

Web and mobile applications are everywhere, often working 24×7. They handle login pages, shopping carts, webmail, support and product request forms, content management systems, and much more.

These apps perform in numerous client-side browser and operating system environments, and can be deployed quickly, just about anywhere, and at little or no cost. Although they may be developed in-house, many are acquired from third parties. More than 90% of enterprises use third-party offerings in their mobile BYOD efforts, according to Gartner. Continue reading

Conquering Cybersecurity Problems: Managed IT Services Can Help

Blue security button

In my last post, I described some of the key ways Managed IT Services help monitor networks and applications, conduct real-time analysis of security alerts, and streamline management of security reporting and policy compliance.

Important as these Managed IT Services are, however, the IT-centric capabilities they provide are just part of a larger IT security picture. Unquestionably, these capabilities are necessary, but they are by no means sufficient – especially if your goal is (as it should be) to create and sustain multiple security layers that are proactive and preventive. Continue reading

The IT Security Arms Race: How Well Are You Keeping Up?

Hands typing quickly on a keyboard

Today’s digitization of just about everything – especially a whole lot of business data – means the technologies your organization depends on may be changing more quickly than you think.

Of course, this has been true for some time. But for a while it wasn’t the case – software patches and antivirus updates were less frequent, and the sense of urgency was by similar degree, less as well.

Alas, that was then. Now if you let your IT environment – especially your security stance – fall behind, you could be left exposed to some pretty insidious threats.
Continue reading

2 Steps to Choosing a Cloud-Based Disaster Recovery (DR) Provider

Businessmen faced with a decision

Disaster Recovery is one of those best practices you can’t imagine needing – until your business gets hit by a power failure, bad weather, or a single-point-of-system failure you didn’t realize was there.

Suddenly, you need help. You need the right provider with the right solution, right now. In my last post, I reviewed the reasons why a cloud-based Disaster Recovery solution may be the best proactive measure for sustained resilience and outright prevention.

It remains sound advice – but how do you choose the right provider of cloud-based DR services? Continue reading

5 Reasons Why Disaster Recovery as a Service Is a Smart Idea

100 dollar bill in a light bulb

If you check out the numbers, it’s clear that businesses with solid Disaster Recovery plans will be back on their feet within hours or days following an event, while the majority of those without DR plans — too often smaller businesses — won’t recover at all.

But it doesn’t have to be that way. Continue reading

8 Best Practices to Develop a Business Resilience Strategy

Resilience concept illustrated by a blue arrow made of balls

According to Gartner, by 2020 60% of businesses will suffer major service failures due to mismanagement of risk in new technology and use cases. This is why, in my last post, I suggested that the best way to deal with these risks is to commit to a strategy of resilience — “the capacity of an organization to plan for and adapt to change or disruption through anticipation, protection, responsive capacity, and recoverability.”

To get a sense of a resilient business in 2015, let’s start with where you want to end up.

Continue reading

To Deal With Technology Risk, Focus on Resilience

Green and white Rubik's cube

Have you noticed how people are talking more about risk these days? Not surprising, given the spectacular nature of recent hacks. Even reinsurers express worry: in a poll last fall, 40% ranked cyberattacks as the most threatening emerging risk of 2015.

Yet, cyberattacks threatening your systems’ security and your data’s privacy are only part of a much larger risk problem. This greater scope of risk is more about effect than cause – if you contain your risk strategy solely to cyberattacks, you’ll leave yourself exposed on other fronts.

Continue reading

A Forward Look: Riding the Digital Waves of 2015

Concept of divergence with branching arrows

At year’s end, I always find myself looking back over the previous 12 months and then, inevitably, I can’t help but look forward to the coming year. Since I’m in the information technology business, this exercise can be pretty interesting.

Technology trends translate into products and services that matter, but when you hear about technologies like web-scale IT, cloud bursting, advanced analytics, self-aware apps, context-rich systems, software-defined networks, etc. – well, it’s hard to keep your eyes from glazing over. So I’ll narrow it down to two waves coming at all of us: Continue reading

Keep Your Guard Up During the Holidays

Yellow sign with exclamation point

The holiday season is upon us – which means it’s also cyberattack season. Though, arguably, 2014 has turned into an entire year of the cyberattack: one study estimates 2014 will rack up an incredible 42.8 million cyberattacks worldwide. That’s more than 117,000 attacks every day!

Which leads me to the topic of firewalls. It’s been 20 years since the first firewalls were deployed to make a perimeter gateway barrier blocking unwanted IP traffic.

Since then, firewalls have evolved to keep pace with new technologies, the ever-increasing complexities of network infrastructures and applications, and new business models that have spawned things like cloud computing and mobile apps. These days, companies deploying firewalls and advanced perimeter controls see a 15% return-on-investment. Continue reading