Helping clients manage their technology for over 30 years.

What Secure, Enterprise-Grade File Sharing/Syncing Looks Like

Small glimpse of Secure VPN diagram

As I detailed in my last post, file sharing/syncing is quickly transforming how, where and when we work by making our apps and data available and usable on any Internet-connected device. Even if your organization doesn’t have an enterprise-grade file sharing/syncing capability in place, odds are your employees have attempted to make their lives easier by implementing their own consumer-grade alternatives. Continue reading

A Glimpse of What’s on the 2014 Tech Horizon …

Four dice showing 2013. Last die is rotating from 3 to 4 for 2014

As 2013 comes to a close, it’s time to look ahead, and a good place to start is Gartner’s top ten strategic technology trends for 2014, which point to an accelerating velocity of change that we ignore at our peril:

Continue reading

How Big is The BYOD File-Sharing Target on Your Corporate Back?

Colored files with arrows to and from the Cloud.

If yours is like most businesses these days, many of your employees use their own smartphones, tablets and/or laptops to do their jobs — and the numbers are climbing fast as more people go mobile. Pew Research Center reports that as of May 2013, 56% of American adults have a smartphone and as of September 2013, 35% own a tablet.

Continue reading

10 Information Security Best Practices You Can be Thankful For

Shield in front of folder. Illustrated the idea of Information Security provided by Quest

If you’ve gotten this far through 2013 without an information security breach, count yourself fortunate. According to a recent survey by PwC, CIO magazine, and CSO magazine, security incidents have increased 25% over the last year. The financial costs of these incidents have climbed, too — by 18%.

The PwC/CIO/CSO survey points to three culprits: new hacker strategies, the bring-your-own-device (BYOD) trend and cloud computing. And it warns that too many organizations have not changed their security stances, leaving themselves dangerously vulnerable to new kinds of threats.

Continue reading

8 cloud disaster recovery best practices

Checklist leading to cloud illustration

As the virtues of cloud-based data backup and disaster recovery/business continuity become increasingly apparent, it’s important to remember that moving some or all of your backup and DR functionality to cloud services involves more than a quick signup.

Here are eight cloud disaster recovery best practices that can make the difference between success and failure:
Continue reading

The cloud comes to DR and data backup — and the numbers show why

cloud, laptop and database icon. Used to symbolize how the Cloud is used for backup and Disaster Recovery.

If you’re turning to cloud services to handle your data backup and disaster recovery needs, you’re not alone.

According to one survey conducted a few months ago by TechTarget and Computer Weekly, the adoption of cloud services for DR and business continuity will jump from just under 18% of enterprises to more than 28% in a mere six months.

Continue reading

When was the last time you reviewed your DR plan?

chart of data availability solutions

Last year, disasters in the United States caused more than $60 billion in damage. And the future promises plenty more of the same, says a recent report from Swiss reinsurer Munich Re — especially in North America, where weather-related loss events have quintupled in the last 30 years.

Now add in concerns about inadequate backup of the data on employees’ smartphones and tablets, wayward virtual machines, cyberattacks and other security incidents …

Continue reading

Why DaaS delivers simplification — and safety

globe computers and clouds

As the end of Windows XP support looms ever closer, I’m getting more questions about DaaS — desktops as a service.

And for good reason: With cloud-based desktops as a service, you can tick several boxes at once and save money in the process — as much as 20%-to-30% over five years when you move from a physical desktop infrastructure to DaaS.

Of course, since DaaS is a hosted service, you avoid the upfront CapEx of a homegrown virtual desktop infrastructure. But three other major benefits may be even more important to some organizations:

Continue reading

How Hosted IP PBX Solutions Can Keep Your Communications Competitive

Hosted IP PBX chart

The way you do business is changing fast.

It’s not just that you’re replacing your face-to-face interactions with a range of digital modes like email, instant messaging, and videoconferencing—now you need to insist that those modes be available anytime, anywhere on devices that are familiar, mobile and allow us to access and communicate any and all of your data at will.

Problem: How to keep up — affordably

You need communications capabilities that can stay apace of all this, which the plain old telephone system (POTS) cannot. The alternative has been IP PBXs that replace bundles of physical wires with a session initiation protocol (SIP) service called trunking.

Continue reading

Application vulnerabilities: Closer than you think

graph showing application vulnerabilities. small version has no labels.

Consider: Last year, according to Verizon, 54% of data breaches began as attacks on web applications, and for years one type of attack — SQL injection — has been the means by which 83% of stolen records were extracted. Meanwhile, says Gartner, 25% of all DDOS attacks this year will be application-based, and an increasing portion of these attacks may actually be diversions in which the bad guys use remotely accessible malware to target user accounts (for personal data or, in the case of financial institutions, for money).
Continue reading