Helping clients manage their technology for over 30 years.

7 security best practices: Preventing ransomware attacks — with people

7 security best practices: Preventing ransomware attacks — with...  by Quest

If you have taken note of enterprise network security over the years, you’re aware of security best practices basics, which are also applicable to ransomware: layer your security defenses, back up your data, keep your software patched…
Continue reading

What to look for in a cloud-aware managed/hosted services provider

The cloud in 2017: 3 trends by Quest

Choosing the right managed/hosted services provider for your organization can be tough because what such providers offer – and how they deliver – can vary greatly.
Continue reading

Cloud security in 2017: stronger than ever

The cloud in 2017: 3 trends by Quest

If you’ve concluded that the public cloud services you use are as secure, or even more secure, than your traditional on-premises environment, you’re in good company – nearly two-thirds of IT leaders surveyed last year agree with you.

Why cloud security tops on-premises security

As they bring in yet another cloud service (and mention it only after the fact, if at all), most of the managers of your lines of business probably don’t think much about cybersecurity – but cloud services providers certainly do. Their reputations depend on it, which is why they’re investing in a two-pronged approach to cloud security:
Continue reading

Of IT resilience and business recovery:
From days to hours to minutes to seconds with 6 capabilities

IT resilience and business recovery by Quest

As I’ve noted, IT resilience requires designing for the continuous availability of all business processes, workflows, technologies, and policies needed for always-on operations.

To do this, you need outwardly-focused, cloud-conscious backup and business recovery solutions able to provide continuous data protection and end-to-end recovery automation regardless of what’s in your IT environment or how/where it changes.
Continue reading

Uh oh, downtime!

Downtime by Quest

The impacts of downtime on a business can be devastating, as this cringe–inducing chart reveals:


Downtime impacts
Downtime impacts by Quest
Source: 3 Steps to IT Resilience, Forrester

Continue reading

Staying secure in a dangerous age:
How to face down ransomware

Face-down Ransomware by Quest

In my last post, I focused on several key types of cyber threat most likely to challenge your business right now. This time, I’m drilling down — to ransomware and what you can do to protect your enterprise from it.

Why ransomware prevention? Because security experts regard ransomware as today’s most serious cyber threat, having increased 35% in just a year to an average of nearly 1,000 per day in 2015.
Continue reading

Screening now: The great technology talent show

Technology Talent Show by Quest

By some reports, hiring (and keeping) competent information technology talent has never been so difficult.

To an extent, technology talent struggles vary in degree according to industry subsector and location. Cybersecurity, for instance, faces particularly intense shortages of much-needed experts. Some expect one million cybersecurity job openings this year, and even demand for entry-level cybersecurity slots, like information security analysts, is projected to climb by 37% over the next six years.
Continue reading

Getting Information Technology to Work for Your Business

Information Technology for your Business by Quest

More than ever, the key to a company’s success centers on its effective use of information technology, so choosing the right providers is essential for today’s technology decision maker.

Yet the complexities of today’s technologies, the unending hype, and the ever-changing mix of vendors make it tough to navigate your way to the right partner.

So where to begin?

As readers of this blog know, I encourage clients to first examine their needs and goals. This is something you should always do before you ever purchase any technology product or service.

It’s also a good time to get solid, reliable advice from independent, vendor-neutral experts. Such experts can take a look at your current technology stance, listen to what you have to say about what your enterprise seeks to accomplish, and offer multiple solution scenarios to achieve those goals.

You’ll learn what technology capabilities are available to your business as well as what technology configurations can save you money — and what technologies your business may not even need.

It can be tough to get reliable answers to questions like “Will this service deliver the capability I require?” or “Will that solution scale with my business needs?”

An experienced technology advisor can help you get those answers and help you use information technology to stay competitive in these fast-changing times.

Desktop Virtualization Services: More Options Than You May Realize

As we watch dreams of mobility coming true around us every day, the appeal of desktop virtualization is obvious. Pile on seemingly perpetual Windows end-of-life concerns, and that appeal only grows.

VDI — virtual desktop infrastructure — enables enterprises to optimize costs by continuing use of legacy systems, while also running the latest applications and remotely publishing them to any device. Managing VDI is complex, however – the acquisition, care, and feeding of its infrastructure is costly and demands expertise many do not have.

Enter desktop virtualization services, which take VDI either wholly or partly into the cloud. Continue reading

The evolving benefits of DaaS

Advantages & Benefits of Cloud Services & DaaS

The traditional benefits of DaaS — an OpEx advantage trading upfront costs and endless management and maintenance hassles for predictable pay-as-you-go dynamic scalability — are gaining even more clout as DaaS solutions mature.

It’s been shown that desktops in the cloud pay off – and this trend promises to continue:
Continue reading