Helping clients manage their technology for over 30 years.

Six ways cybersecurity breaches can bring down your business

 Forging a path to IT resilience

These days, the consequences of inadequate cybersecurity have profound impacts on companies’ reputations, bottom lines, and leadership jobs. Equifax’s 2017 breach, for instance, cost $439 million, tanked its share price by 27%, and forced its CISO, CIO, and CEO to resign. Continue reading

Minding the IT talent gap

IT Integration

For a while now, organizations large and small have struggled to find and retain the IT skillsets they need. Two years have passed since Gartner noted, “Talent has now been recognized globally as the single biggest issue standing in the way of CIOs achieving their objectives.”

If your experience suggests the IT talent gap has intensified since 2016, you’re not alone. Among North American IT decision-makers, 75% say they face a skills shortage, and few expect it to ease over the next two years. Continue reading

Risky Business: What’s lurking in your risk landscape?

Risky Business: What’s lurking in your risk landscape?

Businesses have always faced risks. In the 1920s, shopkeepers in small Midwestern towns were issued surplus World War I rifles so they could run into the street and shoot skedaddling bank robbers.

But risks evolve, as do the ways any given risk may impact your business. Continue reading

Facing down cybercriminality:
3 strategies for protecting your business

7 security best practices: Preventing ransomware attacks — with...  by Quest

Those of us devoted to securing enterprises can tell you that cybercriminality will grow significantly as it continues to exploit current information technology trends – widespread adoption of mobile devices and apps, increasing realization of the vast potential of IoT (Internet of Things), and the intensifying digital interconnectedness of nearly everything.
Continue reading

Cybersecurity best practices:
Paying attention to these 10 basics helps prevent ransomware attacks

7 security best practices: Preventing ransomware attacks — with...  by Quest

A commitment to the seven people-focused cybersecurity best practices I reviewed in my last post will thwart many attacks. But don’t forget these 10 key cybersecurity best practices basics:
Continue reading

Learning from WannaCry

Learning from WannaCry by Quest

If your business has been taken hostage by WannaCry ransomware, get expert help now. If you’ve been spared, please pay attention anyway – because WannaCry broke new and dangerous ground.
Continue reading

The cloud in 2017: 3 trends to watch out for

The cloud in 2017: 3 trends by Quest

In this age of the restless customer – not merely digital-centric but also “adventurous, experimental, and downright fickle” – I notice three crucial cloud-shaping trends:

1   The shadow IT underground

Business units everywhere buy cloud services without IT department approval in a mass decentralization of IT “authority.”

Why? Because these cloud services help business units stay competitive, responsive, and innovative at a time when 40% of consumers have expressed “a high willingness and ability to shift spend,” and another 25% are leaning that way.
Continue reading

Uh oh, downtime!

Downtime by Quest

The impacts of downtime on a business can be devastating, as this cringe–inducing chart reveals:


Downtime impacts
Downtime impacts by Quest
Source: 3 Steps to IT Resilience, Forrester

Continue reading

Staying secure in a dangerous age:
Overcoming cybersecurity complexity – with cloud and managed security services

Cybersecurity Complexity by Quest

The last time I posted, I described several cybersecurity solutions which are moving beyond the reactive, siloed offerings that continue to be necessary, but are no longer sufficient to protect our enterprises.

These solutions can seem daunting. The complexity of it all often overwhelms.

This is partly due to what’s happening to our information infrastructures, which are also becoming more complex as they go hybrid. They are, essentially, boundless as they accommodate internet communication. Meanwhile, today’s in–house data centers are increasingly virtualized and typically combine a variety of cloud and managed services.
Continue reading