Helping clients manage their technology for over 30 years.

Quest’s 10 ways to boost business IT security in 2012: #9 and #10

Ways to boost Business IT Security

For quite some time, small and midsized businesses dared to feel safe from most malicious attacks — thanks to their relative smallness. Over the last couple of years, that’s been changing, because larger firms are tightening defenses and, as I’ve said before, the bad guys exploit opportunity.

Which is why shoddy IT security is a wide open opportunity for hackers to rip you off.

So I’m finishing our list with two elements easily overlooked as you face the hassles of keeping up with criminal creativity.

#9 Educate your employees about security

Continue reading

Prosperity in 2012: Best-performing organizations use cloud computing

I recently came across a cloud computing benefit/risk study conducted in the first half of 2011 by the IT Policy Compliance Group (ITPCG). It shows that best-performing organizations (which see higher profits and suffer fewer business disruptions and less data loss) use cloud computing significantly more than poor-performing organizations.

More than two-thirds of best performers use cloud computing — about half opting for private clouds, while 25% use hybrid clouds and another 25% use public clouds. By contrast, only 9% of worst performers use cloud computing.

Continue reading

All they want for Christmas is … Web 3.0?

Just when you were getting used to the idea of Web 2.0, along comes Web 3.0, which, according to a recent Booz & Co. report, “will offer an entirely new level of connectivity, communications, and information on customers.”

Search engines will be smarter, recommendation engines will know more about users’ habits and preferences, social media will continue to flower, and new kinds of services will make it all easy to manage. Booz calls this “the Transcendent Web” and notes it has four key elements:
Continue reading

6 signs of network performance problems

In my experience, poor network performance can cause outages that cascade unpredictably through the business and cost you plenty. Are you experiencing any of these signs of trouble?

  1. Network-dependent applications have become sluggish — and your employees, customers, and suppliers are letting you know how unhappy they are.
  2. Network administrators struggle to isolate the cause of poor network performance.
  3. Continue reading

Data backup/recovery best practice #10

This last of my backup/recovery best practices is far from the least of them:

#10 Conduct regular testing and reviews of your data recovery capabilities

Backups can be corrupted (especially if they’re tape-based) and too often backups are performed incorrectly. Key files, directories, or components may have been excluded, especially if your infrastructure has undergone adds or deletes.

Continue reading

Data backup/recovery best practices #6, #7, #8, and #9

Continuing with my views of backup/recovery best practices, I offer up # 6 through #9:

#6 Back up your data locally as well as remotely.

Data restores usually are faster from a local backup source than a remote one, especially for data that you recover frequently.

Continue reading

Data backup/recovery best practices #3, #4, and #5

Last time, I described the first two backup/recovery best practices. Here are the next three:

#3 Make sure your backup/recovery strategy adheres to all governance and compliance rules that apply to your organization.

Rules abound about data privacy, security, retention — and vary by industry and region. Look for a reputable advisor who has the experience needed to understand your compliance environment and who successfully completes SAS-70 Type II audits.

Continue reading

Backup/recovery best practices #1 and #2

As I see it, there are 10 best practices that can make the difference between backups that really do keep you in business and backups that seem to work okay — until you actually try to use them. Here are the first two:

#1 Understand your data so you can decide what needs to be backed up and how often.

Base your decisions on the cost of loss, which you can get a sense of by noting the types of data your business relies on — emails, spreadsheets, databases, line-of-business apps, etc. — and determining the impact of losing that information for good and having to recreate it (if you can). Add in the cost of unhappy customers and potential regulatory/compliance violations — and do the math.

Continue reading

Being thankful for backups

Thanksgiving is a time for giving thanks, eating turkey, and enjoying the fellowship of family and friends. And no one wants the holiday ruined by a call like this…

“All our customer files have evaporated. As have everyone’s email messages, all pending customer orders, and the accounts receivables database.”

Would you be able to reconstruct that data from scratch? Or, worse, try to move on without it?

Continue reading

Quest CTO Mike Dillon to speak at Global Conference on Disaster Management

Our Chief Technology Officer, Mike Dillon, will be part of the all-day Global Conference on Disaster Management on November 10 at the Marriott Union Square Hotel in San Francisco.

Mike will discuss how cloud/managed services providers can make all the difference when it comes to protecting and preserving the information and digital applications on which your business depends.

Continue reading