Quest Technology Management

Helping clients manage their technology for over 30 years.

Cybersecurity best practices:
Remember the basics + 3 strategies

technological complexity by Quest

In my last post, I described people-focused cybersecurity best practices to share with your clients. This time, I’m adding some key cybersecurity best practices basics as well as three essential cybersecurity strategies.

Continue reading

When downtime strikes

Proactive about cybersecurity by Quest

Lurking behind many downtime incidents are mundane causes – a failed UPS, human error, a malfunctioning component.

But increasingly, your clients will discover downtime causes stemming from a class of culprits best characterized as IT complexity.

Continue reading

On Security

Security spelled out underneath a padlock

I was visiting with a friend recently when the topic of Target’s security breach came up. We both had been part of the massive data breach and lost some of our banking information. We both had replaced our credit cards and that is where the similarities ended.

Although alarming as this latest breach was, it did not really impact my consciousness or my day-to-day consumer habits.  We live in a world where data is our identity and I have taken certain steps to secure myself and those I care about. Continue reading

Optimizing Clients Backup and Recovery Strategies

How many of your customers can reliably backup their data, then reliably recover it?   Data backup has moved beyond traditional tape, which is notoriously unreliable. Fortunately, with Quest’s help you can offer your customers alternatives that provide a range of reliable and affordable data availability options.
Continue reading