Helping clients manage their technology for over 30 years.

Employee smartphones and tablets getting to be a huge administrative hassle?

If so, I’ve got good news: Now it’s easy to optimize mobile communications functionality and security while minimizing downtime.

Quest’s new Mobile Device Management Service will secure, monitor, manage, and support 50 to 5,000 mobile devices, regardless of whether these devices are company-owned or BYOD (bring your own device). The Service is available for virtually all smartphones and tablets, including: iPhone® / iPad®, BlackBerry®, Windows® Mobile, Palm™, and Google Android™ / Android™ Tablet.

Continue reading

Protecting the value of your business

I can’t emphasize this enough: All of the technology products and services an organization devotes to securing its data, applications, systems, and networks have but one aim — to protect the value of the business.

Conversely, every data breach reduces the value of the business — and there are more data breaches every year.
Continue reading

Beware the malware pandemic

About a year ago, a routine enterprise security analysis turned up 75 gigabytes of stolen data. Thus began the discovery of the ‘Kneber botnet’, which had hijacked 74,000 computers at more than 2,500 organizations around the world.

Operating undetected for a year, the Kneber botnet’s 74,000 ‘zombies’ stole 68,000 corporate logins to e-mail accounts, online banking accounts, and a variety of public email and social networking sites. It also grabbed nearly 2,000 SSL certificate files used to secure the likes of online banking transactions.

Continue reading

Infrastructure security and coping with cloud and social media: 9 key questions to ask

Our chief technical officer, Mike Dillon, estimates that the number of infected sites is growing by 20% to 25% a year. “If your company is shifting more toward cloud services and hasn’t addressed security, you will be attacked,” he says.

So here are the (non-technical) questions you need to ask and get answered to protect your business:
Continue reading

6 security questions to ask about your data and who gets access to it

It’s easy to tumble backwards into information security, to let yourself get sidetracked into arcane, hard-to-follow discussions about the innards of technologies and products when in fact you need to be thinking through higher-level strategy and policy.

If, for instance, you don’t actually know yet whether your business would benefit from using encryption, listening to the sales pitches of competing encryption product vendors is a waste of time.

Continue reading

Security that works starts with the right business decisions

Effective information security is gravity-fed: It starts at the top and works its way down, always beginning with a strategy explicitly designed to protect business value. That strategy then gets implemented via an over-arching security policy or plan.

Developing information security strategy and policy centers on making the right business decisions. Once you do that, what seems the most daunting part of information security — choosing the appropriate technologies — becomes much more transparent.

Continue reading

Three ways you know you’re caught in the IT Product Trap

The Product Trap. That’s where your IT guys and their product vendor buddies come to you with a neat little story about how this here latest-and-greatest gizmo should be deployed company-wide because it’ll save a gazillion dollars. Except that…

  1. They don’t have meaningful data or metrics to back up the claim.
  2. They neglect to mention that making it actually work in the real world requires significant changes to a raft of related processes and organizational structures.
  3. Continue reading

Three decisions you shouldn’t leave to your IT staff

Many people who run organizations often completely defer decisions about technology to their IT people. So what decisions do the people in charge of the business need to keep for themselves when it comes to IT? In my experience, there are three that matter most:

  1. Which business and infrastructure processes should IT focus on?

    Some projects will be business-critical but technically mundane; others will be breathtakingly state-of-the-art but merely nice to have. This decision is bet-the-business strategic and it should always be decided by the person(s) responsible for the whole enterprise, not just IT.
  2. Continue reading

One must-ask question when dealing with the Tower of Techno-babble

Often, technology is inherently confounding to the business mind, in much the same way that most of us don’t comprehend what our doctors tell us about our health — unless it’s translated.

Most of us demand a decent translation of medical jargon and concepts when we face a risk to our health. And if the first attempt at translation fails, we insist on further attempts until we ‘get it.’

Continue reading