Helping clients manage their technology for over 30 years.

Giving Thanks During the Season of Patching

Abstract concept of patching

As the nights grow longer and colder, giving thanks for all that’s warm and light-filled makes wonderful sense. We are, in effect, expressing appreciation for feeling secure and safe.

In fact, this is a time of year when it’s a good idea to pay particular attention to security — especially data security. With the season of holiday gift-buying underway, opportunities for data thieves, hackers, and malware abound.

This isn’t only a concern for retailers and credit card firms. We’re all vulnerable and we all have to continually tend to the security of our businesses.  Continue reading

Planning for 4 Key 2015 Technology Challenges

Colleagues making a plan

Four technologies will very likely impact your business in 2015 — whether or not you explicitly consider them in your planning. Which is to say, ignore them at your peril:  Continue reading

3 Steps to Closing the BYOD Gap

BYOD Policy – BYOD Gap

In my last post, I discussed the gap between business units that enthusiastically embrace BYOD and IT departments, where BYOD is regarded with more hesitation.

Yet it’s clear: BYOD is not only here to stay, it is quickly becoming a dominant force that IT departments must deal with. And in most circumstances “just say no” isn’t an option; BYOD offers employees too many rich opportunities to boost productivity, innovation, and collaboration.

So what’s an IT department — your IT department — to do? Continue reading

What Secure, Enterprise-Grade File Sharing/Syncing Looks Like

Small glimpse of Secure VPN diagram

As I detailed in my last post, file sharing/syncing is quickly transforming how, where and when we work by making our apps and data available and usable on any Internet-connected device. Even if your organization doesn’t have an enterprise-grade file sharing/syncing capability in place, odds are your employees have attempted to make their lives easier by implementing their own consumer-grade alternatives. Continue reading

10 Information Security Best Practices You Can be Thankful For

Shield in front of folder. Illustrated the idea of Information Security provided by Quest

If you’ve gotten this far through 2013 without an information security breach, count yourself fortunate. According to a recent survey by PwC, CIO magazine, and CSO magazine, security incidents have increased 25% over the last year. The financial costs of these incidents have climbed, too — by 18%.

The PwC/CIO/CSO survey points to three culprits: new hacker strategies, the bring-your-own-device (BYOD) trend and cloud computing. And it warns that too many organizations have not changed their security stances, leaving themselves dangerously vulnerable to new kinds of threats.

Continue reading

Cloud Computing best practice: Backup your data!

Diagram drawn on chalkboard showing the connection of Cloud Computing to laptops, tablets, desktops, etc.

If you’ve ever suffered a data loss, you know how critically important data backup and retrieval capabilities are.

I’m here to remind you that this importance does not diminish when your data (or apps) reside in a Cloud. Nor should you simply assume your Cloud provider automatically backs up your data and apps.

Continue reading

Details, details: A look at the hybrid Cloud SLA

Hybrid Cloud Computing

Reading a service-level agreement (SLA) may be as exciting as watching paint dry — but when it comes to creating a hybrid that fits your organization and truly meets its needs, bringing your full attention to your SLA can make all the difference.

So here’s my version of Hybrid Cloud101:

Expect to customize your hybrid cloud SLA. The whole point of a private cloud is to design and customize cloud capabilities to address your unique needs, and you need a Cloud services provider willing and able to do that in ways that precisely reflect your business requirements so you can achieve the flexibility, scalability, cost reductions, efficiencies, redundancy, and disaster recovery protections you need — without overspending on overcapacity.

Continue reading