Helping clients manage their technology for over 30 years.

Leverage the power of data gravity with a network services assist

Network Services Assist by Quest

As you migrate more and more of your data to cloud environments, you’ve probably noticed a couple of things:

1 Data gravity

It’s not your imagination: as you’ve embraced cloud computing, the data still outside your cloud(s) really does get pulled toward applications running in your cloud(s).
Continue reading

The IT Security Arms Race: How Well Are You Keeping Up?

Hands typing quickly on a keyboard

Today’s digitization of just about everything – especially a whole lot of business data – means the technologies your organization depends on may be changing more quickly than you think.

Of course, this has been true for some time. But for a while it wasn’t the case – software patches and antivirus updates were less frequent, and the sense of urgency was by similar degree, less as well.

Alas, that was then. Now if you let your IT environment – especially your security stance – fall behind, you could be left exposed to some pretty insidious threats.
Continue reading

When It Comes to Security, Know Thyself

Data Security & Data Loss Prevention (DLP)

“If you don’t understand the risks, you don’t understand the costs,” security guru Bruce Schneier advised during a TED talk.

He was discussing security in the abstract — but it got me thinking about IT security in particular and the difficulty many executives face trying to determine if their organizations are safe from cyberattack.

The problem is that these conversations nearly always turn technical. Soon, a flurry of technology acronyms — confounding but apparently reassuring — begin flying around the room.

And, reports Schneier, it works. People, he says, will “respond to the feeling of security and not the reality.”

So what can a CEO do to understand the reality of security risk and grasp what the actual cost of security failure might do to the organization?  Continue reading

Look What’s Really Causing IT Disasters

graphSmall032012

According to one expert, U.S. enterprises lose $1.2 trillion each year from IT failures. Although this figure gets debated, everyone agrees it’s a whole lot of money.

These losses — and the downtime that triggers them — tend to be caused by the mundane rather than the spectacular, as recent Forrester/Disaster Recovery Journal research shows: Continue reading

CEOs in the Crosshairs

Writing hand in crosshairs

When it comes to security breaches, CEOs stand in the crosshairs. More than their IT staffs, it’s a CEO who’ll take heat for a breach that exposes customer data or endangers relationships with business partners.

So, unlike plenty of other IT issues that don’t require C-level attention, information security ranks right up there alongside financial issues as something with which CEOs need to be familiar. Yes, information security can be daunting, but so are financial statements — and CEOs have to sign off on those.

Where to start? Here are three questions every CEO should be able to answer: Do you know who your security expert is? Do you have a security policy? Do you understand how it’s implemented, managed, enforced, monitored?

Continue reading

It’s Easy to Avoid Data Room Disaster

Data center services

I heard a story recently about the theft of servers from a data room.

The company had locks on all outside doors, but had neglected to install a lock on the server room door.

The thieves would probably have broken that lock, too. Yet the story reminds me how often data rooms get overlooked. The chief reason? Budget … more specifically, lack of budget.

Continue reading

The Dangers Confronting Data in Motion

visual depiction of data files flowing through a desktop computer

Last time, I looked at some of the security issues related to employee mobility, which focused mainly on devices like smartphones and tablets and how people use them.

But smartphones and tablets aren’t the only mobile devices business leaders need to worry about. Consider:

  • USB malware is gaining momentum — so flash drives and other USB-connected devices can become malware vectors.
  • Hackable RFID and radio frequency channels create voicemail vulnerabilities and enable call interception.
  • RAM scraping exploits moments when sensitive encrypted data is unencrypted in browsers, smartphones, point-of-sale system memory, etc.

Continue reading

What’s Happening to the IT Department?

Where once IT departments were the sole source when it came to technology implementation, today technology is finding its way into corporate America through nearly every department.

Marketing folks may have been among the first to leave the IT department fold when they ditched cumbersome CRM systems for easy-to-use Salesforce.com, but they were just the tip of what has grown into a pretty big iceberg.

Virtually every day sees a new app available to help workers be more productive — and those workers aren’t hesitating to download those apps and get on with business.

Continue reading

The importance of IT security vigilance

Importance of Managed IT Security

Last September 18th, Germany’s Federal Office for Information Security warned that nation’s population not to use Internet Explorer because of an IE security flaw “is already being used for targeted attacks” designed to lure users to an infected website which, when visited, allows hackers to take control of the user’s computer. Soon after, the Swedish government issued a similar warning.

Even worse, Microsoft was not immediately able to fix the problem. First came a temporary patch, said to be less that complete.

Continue reading