Helping clients manage their technology for over 30 years.

The BYOD Gap

Navigation concept

What’s the state of Bring Your Own Device (BYOD) in your organization?

When I ask this of our customers I get replies aligning with industry research and other anecdotal evidence pointing to what I call the BYOD gap.

Business units are adopting BYOD – along with mobile apps and consumer-grade cloud services – pretty much as fast as they can, but too often such adoption is unsanctioned by their IT departments; there is no BYOD policy.

In the shadows

It’s a sizable gap, too: by some reports, almost 90% of employees use their own devices at work – but only about 40% of enterprises have committed to implementing BYOD policies, procedures, and infrastructure.

This is classic Shadow IT, and it’s on a scale unlike anything since the 1980s when corporate business units defied their IT departments to acquire PCs. It took mainframe-obsessed IT staff a good long time to grasp that forbidding PCs was a supreme waste of time, because whenever business unit managers find tools enabling them to boost productivity and achieve better results, they are enthusiastically embraced whether IT likes it or not.  Continue reading

Your Wireless Network: Signs That the Tail has Begun to Wag the Dog

network management - wireless networks have become the primary network

In many companies, the wireless capability added on to their enterprise network a few years ago has become some employees’ primary network.

It’s a development that signals just how quickly mobile devices are proliferating the workplace. The so-called “consumerization of business” changes the way we work — and our data networks have to keep up.

This transformation has been in the works for a while. In 2011, market analyst firm Gartner predicted 80% of corporate wireless network technologies would be obsolete by 2015. Gartner may well be right, given the findings of more recent research. Continue reading

Getting the IT Staff You Need May Not be as Easy as You Think

Man contemplating a decision

According to Computer Economics’ 2014/2015 IT Spending & Staffing Benchmarks report, hiring of IT professionals is finally on the upswing — yet another indication that our long-declining economy continues to improve.

Even so, you may not have an easy time finding the right IT expertise when you need it. That’s because there’s something of a squeeze going on (you know, the one that puts you between a rock and a hard place):

Continue reading

Planning Your Hybrid Cloud: 6 Key Steps (part 2)

Architecture blueprint as a model for cloud planning

In my last post I focused on the first two steps in planning for a hybrid cloud: Making sure your IT infrastructure is “cloudified” and assessing your current environment and workloads. In this post, I’ll lay out the final four steps:  Continue reading

Planning Your Hybrid Cloud: 6 Key Steps (in 2 parts)

Information Cloud

By some accounts, better than 50% of organizations are now deploying hybrid clouds — and for some very good reasons:

  • Improved security, because sensitive data can remain behind your private cloud firewall while less sensitive data can be permitted onto a public cloud.
  • Ability to specify where and under what terms and conditions your data is stored.
  • Effective workload balancing without breaking the bank, since using a public cloud to, say, handle peak loads can be far cheaper than keeping everything in-house or moving everything to a public cloud.

To get a hybrid cloud up and running, you need to begin with planning — specifically, a six-step planning process that, fortunately, you do not have to undertake alone. In this post, I’ll focus on the first two steps: Continue reading

IT Security in 2014: How You Can Protect Your Business

Virtual locks representing security

Most security experts — including ours at Quest — will tell you that it’s no longer a question of if attempts to compromise your data, apps, and/or technology infrastructure will happen, it’s now only a question of when.

So what can you do to protect your business in this age when it’s so tough to distinguish between trusted and threatening network traffic, when there’s no longer such a thing as a secure perimeter around your data, when the “attack surface” has never been greater? Continue reading

IT Security in 2014: Challenges and More Challenges

Glass chess pieces

Information technology has become a business essential. We’ve reached the point where our ability to thrive and succeed depends on key software apps and the technology (wherever it may be) that runs them, our access-from-anywhere to the Internet, and our ability to gather and analyze troves of digitized data.

The easiest targets
So important are these capabilities that we often put them into use before we’ve figured out the myriad of ways they’re vulnerable to those with malicious intent. And while smaller enterprises used to be able to escape the worst of these vulnerabilities simply by slipping beneath cybercriminals’ radar, those days are gone.  Continue reading

What Secure, Enterprise-Grade File Sharing/Syncing Looks Like

Small glimpse of Secure VPN diagram

As I detailed in my last post, file sharing/syncing is quickly transforming how, where and when we work by making our apps and data available and usable on any Internet-connected device. Even if your organization doesn’t have an enterprise-grade file sharing/syncing capability in place, odds are your employees have attempted to make their lives easier by implementing their own consumer-grade alternatives. Continue reading

How Big is The BYOD File-Sharing Target on Your Corporate Back?

Colored files with arrows to and from the Cloud.

If yours is like most businesses these days, many of your employees use their own smartphones, tablets and/or laptops to do their jobs — and the numbers are climbing fast as more people go mobile. Pew Research Center reports that as of May 2013, 56% of American adults have a smartphone and as of September 2013, 35% own a tablet.

Continue reading

10 Information Security Best Practices You Can be Thankful For

If you’ve gotten this far through 2013 without an information security breach, count yourself fortunate. According to a recent survey by PwC, CIO magazine, and CSO magazine, security incidents have increased 25% over the last year. The financial costs of these incidents have climbed, too — by 18%.

The PwC/CIO/CSO survey points to three culprits: new hacker strategies, the bring-your-own-device (BYOD) trend and cloud computing. And it warns that too many organizations have not changed their security stances, leaving themselves dangerously vulnerable to new kinds of threats.

Continue reading