Helping clients manage their technology for over 30 years.

Staying secure in a dangerous age:
Beyond reactive cybersecurity solutions

Face-down Ransomware by Quest

In my recent posts, I’ve focused on some of the top security threats faced by anyone trying to keep their business data and systems safe.

Besides app attacks, web attacks, social engineering exploits, and ransomware, there’s plenty more to be concerned about – the challenges of trusting devices and sensors that are part of the Internet of Things (IoT), breaches that steal huge swaths of “big data,” and the frightening vulnerabilities of industrial control systems.
Continue reading

Staying secure in a dangerous age:
Know the threats you face

Know the threats you face by Quest

Fasten your seatbelt. I’m driving into the realm of digital security, which can turn into a rather hairy ride.

Despite its challenges, digital security deployment is what stops the hackers, malicious actors, and spies from stealing everything. So let me begin by telling you to stay vigilant, because as the use of digital technologies becomes more pervasive, so do the attempts to exploit it for nefarious purposes.
Continue reading

Application Security Scanning Can Save Your Business

Magnifying glass photograph

Web and mobile applications are everywhere, often working 24×7. They handle login pages, shopping carts, webmail, support and product request forms, content management systems, and much more.

These apps perform in numerous client-side browser and operating system environments, and can be deployed quickly, just about anywhere, and at little or no cost. Although they may be developed in-house, many are acquired from third parties. More than 90% of enterprises use third-party offerings in their mobile BYOD efforts, according to Gartner. Continue reading

The IT Security Arms Race: How Well Are You Keeping Up?

Hands typing quickly on a keyboard

Today’s digitization of just about everything – especially a whole lot of business data – means the technologies your organization depends on may be changing more quickly than you think.

Of course, this has been true for some time. But for a while it wasn’t the case – software patches and antivirus updates were less frequent, and the sense of urgency was by similar degree, less as well.

Alas, that was then. Now if you let your IT environment – especially your security stance – fall behind, you could be left exposed to some pretty insidious threats.
Continue reading

3 Steps to Closing the BYOD Gap

BYOD Policy – BYOD Gap

In my last post, I discussed the gap between business units that enthusiastically embrace BYOD and IT departments, where BYOD is regarded with more hesitation.

Yet it’s clear: BYOD is not only here to stay, it is quickly becoming a dominant force that IT departments must deal with. And in most circumstances “just say no” isn’t an option; BYOD offers employees too many rich opportunities to boost productivity, innovation, and collaboration.

So what’s an IT department — your IT department — to do? Continue reading

Is server virtualization messing up your network’s performance?

Impact of Server Virtualization on Network Performance

Thanks to virtualization, network dynamics are changing — fast.

Server virtualization consolidates resources on fewer physical servers in ways that require distributed workloads to communicate with each other. This boosts utilization of servers, but it also increases — and changes the nature of — network traffic.

Continue reading

Curing Those Security Blues

Are you suffering from security fatigue? Find yourself getting irritated when your IT folks bring up yet another security issue? You’re not alone. Lately I’ve been witnessing a good deal of security fatigue in the executive suite, and I’m not surprised.

Truth is, security remains a never-ending process. The easier we make it to move data, the more vulnerable it is to loss or theft. In fact, our Page 1 story this issue on Data Loss Prevention is all about how easy it is for too many employees to make off with sensitive, proprietary information.

Continue reading

6 signs of network performance problems

In my experience, poor network performance can cause outages that cascade unpredictably through the business and cost you plenty. Are you experiencing any of these signs of trouble?

  1. Network-dependent applications have become sluggish — and your employees, customers, and suppliers are letting you know how unhappy they are.
  2. Network administrators struggle to isolate the cause of poor network performance.
  3. Continue reading

Essential SLA Elements #5: Protecting your data from the goblins

A service-level agreement works best when it’s the result of a collaborative effort between you and a service provider you can trust. This kind of trusted collaboration will uncover the most cost-effective ways your provider’s IT capabilities can be put to work for your business.

Part of that trust involves the fifth and last Essential SLA Element on my list: Procedures for the safe and prompt return of your data upon service termination.

Continue reading

Essential SLA Elements #3 and #4: Monitoring, enforcement, and change mechanisms

A good service-level agreement looks simple — but that’s because it’s been conscientiously negotiated to meet the buyer’s needs. Of the five essential SLA elements that every managed and cloud services customer should focus on, I’ve described two — specifying service functionality and describing the infrastructure and standards to be maintained by the provider.

Essential SLA Elements #3 concerns SLA changes. Your SLA should include a mechanism by which you can regularly tune it in response to changing business conditions or new technologies. You’ll benefit from building in a formal review of your SLA (at least annually) in order to use experience and new information to revise it.

Continue reading