Helping clients manage their technology for over 30 years.

Corporate data loss: How bad is it? (Part 1 of 2)

Loss of Sensitive Corporate Data

In the wrong hands, the sensitive data your business depends on becomes a weapon wielded against it. And it’s happening more often every day.

Reports of intellectual property theft and hacktivism abound, and 2011 has been widely described as “the year of the data breach.”

It’s not hard to see why.

In 2011 alone, according to the nonprofit Online Trust Alliance, 126 million data records were compromised in the United States.

Continue reading

6 signs of network performance problems

In my experience, poor network performance can cause outages that cascade unpredictably through the business and cost you plenty. Are you experiencing any of these signs of trouble?

  1. Network-dependent applications have become sluggish — and your employees, customers, and suppliers are letting you know how unhappy they are.
  2. Network administrators struggle to isolate the cause of poor network performance.
  3. Continue reading

Data backup/recovery best practice #10

This last of my backup/recovery best practices is far from the least of them:

#10 Conduct regular testing and reviews of your data recovery capabilities

Backups can be corrupted (especially if they’re tape-based) and too often backups are performed incorrectly. Key files, directories, or components may have been excluded, especially if your infrastructure has undergone adds or deletes.

Continue reading

Data backup/recovery best practices #6, #7, #8, and #9

Continuing with my views of backup/recovery best practices, I offer up # 6 through #9:

#6 Back up your data locally as well as remotely.

Data restores usually are faster from a local backup source than a remote one, especially for data that you recover frequently.

Continue reading

Data backup/recovery best practices #3, #4, and #5

Last time, I described the first two backup/recovery best practices. Here are the next three:

#3 Make sure your backup/recovery strategy adheres to all governance and compliance rules that apply to your organization.

Rules abound about data privacy, security, retention — and vary by industry and region. Look for a reputable advisor who has the experience needed to understand your compliance environment and who successfully completes SAS-70 Type II audits.

Continue reading

Backup/recovery best practices #1 and #2

As I see it, there are 10 best practices that can make the difference between backups that really do keep you in business and backups that seem to work okay — until you actually try to use them. Here are the first two:

#1 Understand your data so you can decide what needs to be backed up and how often.

Base your decisions on the cost of loss, which you can get a sense of by noting the types of data your business relies on — emails, spreadsheets, databases, line-of-business apps, etc. — and determining the impact of losing that information for good and having to recreate it (if you can). Add in the cost of unhappy customers and potential regulatory/compliance violations — and do the math.

Continue reading

Being thankful for backups

Thanksgiving is a time for giving thanks, eating turkey, and enjoying the fellowship of family and friends. And no one wants the holiday ruined by a call like this…

“All our customer files have evaporated. As have everyone’s email messages, all pending customer orders, and the accounts receivables database.”

Would you be able to reconstruct that data from scratch? Or, worse, try to move on without it?

Continue reading

Quest CTO Mike Dillon to speak at Global Conference on Disaster Management

Our Chief Technology Officer, Mike Dillon, will be part of the all-day Global Conference on Disaster Management on November 10 at the Marriott Union Square Hotel in San Francisco.

Mike will discuss how cloud/managed services providers can make all the difference when it comes to protecting and preserving the information and digital applications on which your business depends.

Continue reading

Essential SLA Element #2: The devil’s in the details

I’ve already blogged about the importance of negotiating a service-level agreement that specifies the functionality of the managed and cloud services you engage.

Now I’m going to focus on Essential SLA Element #2: Including details about the system, network, and security infrastructure and standards to be maintained for your services by the provider.

Continue reading