Helping clients manage their technology for over 30 years.

Beyond the Co-lo Checklist: Tech Services — or Landlord?

Thinking about renting space in a co-location facility?

I suggest you visit any site you’re considering with the usual due-diligence checklist that addresses matters of security, compliance, environmental risks, power redundancy, and networking capabilities.

This checklist will get you only so far, however. You’ll need to keep a couple of other co-location considerations front-of-mind, too.

First, who owns the co-lo site you’re considering? If it’s a real estate investment trust (REIT), this may impact how the co-lo site operates.

After all, REIT profits come from real estate — in this case, renting rack space — rather than providing technology services. At minimum, you’ll need to know the parties represented in your contract. A co-lo outfit operating on the REIT’s property? The REIT itself? What happens if, say, the REIT’s facility rather than the co-lo provider is responsible for a costly power outage?

By contrast, co-lo data centers owned and operated by experienced technology services providers act as much more than landlords, since they’re committed to fielding cutting-edge data center environments supported by a deep technical and business expertise that enables them to take full responsibility for what they provide.

So here’s the second co-lo consideration to keep front-of-mind: even if you don’t currently anticipate needing anything more than rented rack space, you may someday be glad for a tech-savvy co-lo provider able to also offer round-the-clock monitoring, remote hands, and the ability to deliver cloud integration or managed services whenever you need them.

The Biggest Threat Facing Your Data in 2018

IT Integration

The intangibility of cloud storage makes it easy to leave the proverbial front door unlocked. This is exactly what happened when a developer at Uber inadvertently included the startup’s Amazon Web Services login credentials in code shared to the open source site GitHub – exposing the private data of 50 million of the platform’s customers.
Continue reading

Is your business prepared for unplanned downtime?

7 security best practices: Preventing ransomware attacks — with...  by Quest

Your answer may depend on your job title. In one recent survey, 70% of C-level executives declared their firms “very prepared” – but fewer than half of the IT people at those same companies agreed.

Uh oh.
Continue reading

Facing down cybercriminality:
3 strategies for protecting your business

7 security best practices: Preventing ransomware attacks — with...  by Quest

Those of us devoted to securing enterprises can tell you that cybercriminality will grow significantly as it continues to exploit current information technology trends – widespread adoption of mobile devices and apps, increasing realization of the vast potential of IoT (Internet of Things), and the intensifying digital interconnectedness of nearly everything.
Continue reading

Cybersecurity best practices:
Paying attention to these 10 basics helps prevent ransomware attacks

7 security best practices: Preventing ransomware attacks — with...  by Quest

A commitment to the seven people-focused cybersecurity best practices I reviewed in my last post will thwart many attacks. But don’t forget these 10 key cybersecurity best practices basics:
Continue reading

Learning from WannaCry

Learning from WannaCry by Quest

If your business has been taken hostage by WannaCry ransomware, get expert help now. If you’ve been spared, please pay attention anyway – because WannaCry broke new and dangerous ground.
Continue reading

The cloud in 2017: 3 trends to watch out for

The cloud in 2017: 3 trends by Quest

In this age of the restless customer – not merely digital-centric but also “adventurous, experimental, and downright fickle” – I notice three crucial cloud-shaping trends:

1   The shadow IT underground

Business units everywhere buy cloud services without IT department approval in a mass decentralization of IT “authority.”

Why? Because these cloud services help business units stay competitive, responsive, and innovative at a time when 40% of consumers have expressed “a high willingness and ability to shift spend,” and another 25% are leaning that way.
Continue reading

Staying secure in a dangerous age:
Overcoming cybersecurity complexity – with cloud and managed security services

Cybersecurity Complexity by Quest

The last time I posted, I described several cybersecurity solutions which are moving beyond the reactive, siloed offerings that continue to be necessary, but are no longer sufficient to protect our enterprises.

These solutions can seem daunting. The complexity of it all often overwhelms.

This is partly due to what’s happening to our information infrastructures, which are also becoming more complex as they go hybrid. They are, essentially, boundless as they accommodate internet communication. Meanwhile, today’s in–house data centers are increasingly virtualized and typically combine a variety of cloud and managed services.
Continue reading

Staying secure in a dangerous age:
Beyond reactive cybersecurity solutions

Face-down Ransomware by Quest

In my recent posts, I’ve focused on some of the top security threats faced by anyone trying to keep their business data and systems safe.

Besides app attacks, web attacks, social engineering exploits, and ransomware, there’s plenty more to be concerned about – the challenges of trusting devices and sensors that are part of the Internet of Things (IoT), breaches that steal huge swaths of “big data,” and the frightening vulnerabilities of industrial control systems.
Continue reading

Staying secure in a dangerous age:
How to face down ransomware

Face-down Ransomware by Quest

In my last post, I focused on several key types of cyber threat most likely to challenge your business right now. This time, I’m drilling down — to ransomware and what you can do to protect your enterprise from it.

Why ransomware prevention? Because security experts regard ransomware as today’s most serious cyber threat, having increased 35% in just a year to an average of nearly 1,000 per day in 2015.
Continue reading