Helping clients manage their technology for over 30 years.

Why your IT infrastructure needs technical on-call support services

 Forging a path to IT resilience

Those inevitable evolutions in technology that your business must embrace to stay competitive tend to involve integrations of old and new systems, software, functions, and processes.

These integrations often turn out to be arcane and complex, which means you require long-term as well as short-term technical expertise that your staff can access anytime — technical expertise from people familiar with your IT setup and who are, essentially, on call. Continue reading

Six ways cybersecurity breaches can bring down your business

 Forging a path to IT resilience

These days, the consequences of inadequate cybersecurity have profound impacts on companies’ reputations, bottom lines, and leadership jobs. Equifax’s 2017 breach, for instance, cost $439 million, tanked its share price by 27%, and forced its CISO, CIO, and CEO to resign. Continue reading

Minding the IT talent gap

IT Integration

For a while now, organizations large and small have struggled to find and retain the IT skillsets they need. Two years have passed since Gartner noted, “Talent has now been recognized globally as the single biggest issue standing in the way of CIOs achieving their objectives.”

If your experience suggests the IT talent gap has intensified since 2016, you’re not alone. Among North American IT decision-makers, 75% say they face a skills shortage, and few expect it to ease over the next two years. Continue reading

6 ways Europe’s new data protection rules can impact US businesses — Part 2

G, D, P, R, keys from keyboard sitting on top of CPU.In my last post, I listed two of the six ways the European Union’s General Data Protection Regulation (GDPR) can affect even non-EU enterprises—by …

  1. Reaching beyond the EU; and
  2. Redefining personal and sensitive data.Here are four more reasons you can’t afford to ignore GDPR:
  3. Continue reading

Beyond the Co-lo Checklist: Tech Services — or Landlord?

Thinking about renting space in a co-location facility?

I suggest you visit any site you’re considering with the usual due-diligence checklist that addresses matters of security, compliance, environmental risks, power redundancy, and networking capabilities.

This checklist will get you only so far, however. You’ll need to keep a couple of other co-location considerations front-of-mind, too.

First, who owns the co-lo site you’re considering? If it’s a real estate investment trust (REIT), this may impact how the co-lo site operates.

After all, REIT profits come from real estate — in this case, renting rack space — rather than providing technology services. At minimum, you’ll need to know the parties represented in your contract. A co-lo outfit operating on the REIT’s property? The REIT itself? What happens if, say, the REIT’s facility rather than the co-lo provider is responsible for a costly power outage?

By contrast, co-lo data centers owned and operated by experienced technology services providers act as much more than landlords, since they’re committed to fielding cutting-edge data center environments supported by a deep technical and business expertise that enables them to take full responsibility for what they provide.

So here’s the second co-lo consideration to keep front-of-mind: even if you don’t currently anticipate needing anything more than rented rack space, you may someday be glad for a tech-savvy co-lo provider able to also offer round-the-clock monitoring, remote hands, and the ability to deliver cloud integration or managed services whenever you need them.

The Biggest Threat Facing Your Data in 2018

IT Integration

The intangibility of cloud storage makes it easy to leave the proverbial front door unlocked. This is exactly what happened when a developer at Uber inadvertently included the startup’s Amazon Web Services login credentials in code shared to the open source site GitHub – exposing the private data of 50 million of the platform’s customers.
Continue reading

Is your business prepared for unplanned downtime?

7 security best practices: Preventing ransomware attacks — with...  by Quest

Your answer may depend on your job title. In one recent survey, 70% of C-level executives declared their firms “very prepared” – but fewer than half of the IT people at those same companies agreed.

Uh oh.
Continue reading

Facing down cybercriminality:
3 strategies for protecting your business

7 security best practices: Preventing ransomware attacks — with...  by Quest

Those of us devoted to securing enterprises can tell you that cybercriminality will grow significantly as it continues to exploit current information technology trends – widespread adoption of mobile devices and apps, increasing realization of the vast potential of IoT (Internet of Things), and the intensifying digital interconnectedness of nearly everything.
Continue reading

Cybersecurity best practices:
Paying attention to these 10 basics helps prevent ransomware attacks

7 security best practices: Preventing ransomware attacks — with...  by Quest

A commitment to the seven people-focused cybersecurity best practices I reviewed in my last post will thwart many attacks. But don’t forget these 10 key cybersecurity best practices basics:
Continue reading