Quest Technology Management

Helping clients manage their technology for over 30 years.

Cybersecurity best practices:
Remember the basics + 3 strategies

technological complexity by Quest

In my last post, I described people-focused cybersecurity best practices to share with your clients. This time, I’m adding some key cybersecurity best practices basics as well as three essential cybersecurity strategies.

Continue reading

7 employee-focused ways your clients can defend against ransomware

technological complexity by Quest

As ransomware goes, WannaCry spread spectacularly far and fast, aiming at enterprises more than consumers – but with meager effect on many, thanks to data backups.

Kudos for all those IT people who take their data backup duties seriously!

Continue reading

Cloud best practices that strengthen security and performance

Strengthen Security and Performance by Quest

As I mentioned in my last post, organizations increasingly use multiple cloud services and hybrid clouds.

Boosting cloud security with infrastructure and standards

Cloud services providers are also deploying new cloud technologies like automation, microservices, containers, and so on, that boost cloud performance and make public cloud services as secure, or even more secure, than traditional on-premises environments.
Continue reading

Help your clients get proactive about cybersecurity

Proactive about cybersecurity by Quest

In my previous post, I pointed to several top security threats your clients face in attempting to protect their data and systems.

Cyberthreats like app attacks, web attacks, social engineering exploits, and ransomware are only a few of your customers’ concerns. They must also (or will soon) contend with breaches that steal or corrupt huge swaths of “big data,” the risks of trusting IoT (Internet of Things) devices and sensors, and the dangerous vulnerabilities of industrial control systems.
Continue reading

4 security vulnerabilities your clients should look out for

Security Vulnerabilities by Quest

Security vulnerabilities tend to stick around. SQL injection, for instance, has been a popular means of exploiting databases for years and remains a significant cyber threat.

As we respond by adapting and fortifying our security defenses, however, cyberattack targets tend to shift — so it’s essential to understand the ever-changing nature of your clients’ risk landscape.

These days, your clients need to be aware of several ways that cybercriminals are likely to threaten their operations:

Continue reading

8 IT Tips for Better Customer Resilience

8 IT Tips for Better Customer Resilience

Have you noticed how customers are talking more about risk these days? Not surprising, given the spectacular nature of recent hacks and immobilizing disasters. Yet, all forms of risk that threaten your customers’ environments and reputation are only part of a much larger problem which you can help resolve. Begin by strategizing with your customers using these key tips:

Continue reading