Helping clients manage their technology for over 30 years.

Staying secure in a dangerous age:
Overcoming cybersecurity complexity – with cloud and managed security services

Cybersecurity Complexity by Quest

The last time I posted, I described several cybersecurity solutions which are moving beyond the reactive, siloed offerings that continue to be necessary, but are no longer sufficient to protect our enterprises.

These solutions can seem daunting. The complexity of it all often overwhelms.

This is partly due to what’s happening to our information infrastructures, which are also becoming more complex as they go hybrid. They are, essentially, boundless as they accommodate internet communication. Meanwhile, today’s in–house data centers are increasingly virtualized and typically combine a variety of cloud and managed services.
Continue reading

Staying secure in a dangerous age:
Beyond reactive cybersecurity solutions

Face-down Ransomware by Quest

In my recent posts, I’ve focused on some of the top security threats faced by anyone trying to keep their business data and systems safe.

Besides app attacks, web attacks, social engineering exploits, and ransomware, there’s plenty more to be concerned about – the challenges of trusting devices and sensors that are part of the Internet of Things (IoT), breaches that steal huge swaths of “big data,” and the frightening vulnerabilities of industrial control systems.
Continue reading

Staying secure in a dangerous age:
How to face down ransomware

Face-down Ransomware by Quest

In my last post, I focused on several key types of cyber threat most likely to challenge your business right now. This time, I’m drilling down — to ransomware and what you can do to protect your enterprise from it.

Why ransomware prevention? Because security experts regard ransomware as today’s most serious cyber threat, having increased 35% in just a year to an average of nearly 1,000 per day in 2015.
Continue reading

Staying secure in a dangerous age:
Know the threats you face

Know the threats you face by Quest

Fasten your seatbelt. I’m driving into the realm of digital security, which can turn into a rather hairy ride.

Despite its challenges, digital security deployment is what stops the hackers, malicious actors, and spies from stealing everything. So let me begin by telling you to stay vigilant, because as the use of digital technologies becomes more pervasive, so do the attempts to exploit it for nefarious purposes.
Continue reading

Where technology consulting services can help

Technology Consulting Services by Quest

In my last post, I advised that a technology consulting services provider should offer a range of capabilities that encompasses integrated managed services, cloud services, and assessments as well as an extensive professional services portfolio emphasizing technology customization and solid technical staffing.

Such technology consulting depth means your provider can help you in many ways, including:
Continue reading

Are you lingering too long in your IT legacy?

Technology Ecosystem by Quest

For a long time, the most effective way for an organization to benefit from the power of IT required committing to a single vendor’s technology ecosystem.

You bought or leased the designated hardware on which you ran the designated software and, perhaps, a compatible service or two. But when you inevitably bumped into the limits of your chosen technology ecosystem, you faced a stark choice:

Either give up on that capability you were hoping to implement in the manner that would serve your business best — or alter the way your business operated in order to “sort of” get at least some of what you needed from the technology ecosystem in which you’d already invested plenty.

Typically, technology customization stayed out of reach and businesses were cornered into the second option, forced to adapt to the technology tools available rather than the other way around. Certainly, the ecosystem vendors didn’t mind, as customer lock-in proved extremely profitable.
Continue reading

Planning a digital strategy for a volatile future

Digital Strategy for a Volatile Future by Quest

As I noted in my last post, new information technologies are likely to impact your business sooner than you’d like, so remaining reactive and focused on only the short-term has never been more dangerous.

You need to generate a forward-looking digital strategy to keep your enterprise competitive. If you find this easier said than done, you’re not alone — only about a quarter of businesses have a coherent digital strategy.

Yet without the IT planning that produces an effective digital strategy, you face a real possibility of surprise technological disruption in your industry and to your enterprise.
Continue reading

3 Steps to Closing the BYOD Gap

BYOD Policy – BYOD Gap

In my last post, I discussed the gap between business units that enthusiastically embrace BYOD and IT departments, where BYOD is regarded with more hesitation.

Yet it’s clear: BYOD is not only here to stay, it is quickly becoming a dominant force that IT departments must deal with. And in most circumstances “just say no” isn’t an option; BYOD offers employees too many rich opportunities to boost productivity, innovation, and collaboration.

So what’s an IT department — your IT department — to do? Continue reading

The BYOD Gap

Navigation concept

What’s the state of Bring Your Own Device (BYOD) in your organization?

When I ask this of our customers I get replies aligning with industry research and other anecdotal evidence pointing to what I call the BYOD gap.

Business units are adopting BYOD – along with mobile apps and consumer-grade cloud services – pretty much as fast as they can, but too often such adoption is unsanctioned by their IT departments; there is no BYOD policy.

In the shadows

It’s a sizable gap, too: by some reports, almost 90% of employees use their own devices at work – but only about 40% of enterprises have committed to implementing BYOD policies, procedures, and infrastructure.

This is classic Shadow IT, and it’s on a scale unlike anything since the 1980s when corporate business units defied their IT departments to acquire PCs. It took mainframe-obsessed IT staff a good long time to grasp that forbidding PCs was a supreme waste of time, because whenever business unit managers find tools enabling them to boost productivity and achieve better results, they are enthusiastically embraced whether IT likes it or not.  Continue reading

5 Capabilities That Your Wireless Network Needs Now

wireless network management

We can’t afford to ignore the myriad of mobile devices and apps currently saturating our attention and wireless connections.

In my last post, I laid out some of the industry’s eye-popping numbers. This time, I’m offering up just one graphic (from Cisco’s recent Global Mobile Data Traffic Forecast Update) showing why you must upgrade your network infrastructure. Pronto. Continue reading