Helping clients manage their technology for over 30 years.

6 ways Europe’s new data protection rules can impact US businesses — Part 2

G, D, P, R, keys from keyboard sitting on top of CPU.In my last post, I listed two of the six ways the European Union’s General Data Protection Regulation (GDPR) can affect even non-EU enterprises—by …

  1. Reaching beyond the EU; and
  2. Redefining personal and sensitive data.Here are four more reasons you can’t afford to ignore GDPR:
  3. Continue reading

Beyond the Co-lo Checklist: Tech Services — or Landlord?

Thinking about renting space in a co-location facility?

I suggest you visit any site you’re considering with the usual due-diligence checklist that addresses matters of security, compliance, environmental risks, power redundancy, and networking capabilities.

This checklist will get you only so far, however. You’ll need to keep a couple of other co-location considerations front-of-mind, too.

First, who owns the co-lo site you’re considering? If it’s a real estate investment trust (REIT), this may impact how the co-lo site operates.

After all, REIT profits come from real estate — in this case, renting rack space — rather than providing technology services. At minimum, you’ll need to know the parties represented in your contract. A co-lo outfit operating on the REIT’s property? The REIT itself? What happens if, say, the REIT’s facility rather than the co-lo provider is responsible for a costly power outage?

By contrast, co-lo data centers owned and operated by experienced technology services providers act as much more than landlords, since they’re committed to fielding cutting-edge data center environments supported by a deep technical and business expertise that enables them to take full responsibility for what they provide.

So here’s the second co-lo consideration to keep front-of-mind: even if you don’t currently anticipate needing anything more than rented rack space, you may someday be glad for a tech-savvy co-lo provider able to also offer round-the-clock monitoring, remote hands, and the ability to deliver cloud integration or managed services whenever you need them.

6 best practices for structuring a SMART SLA

IT Integration

Yes, you can negotiate the customized service level agreement you need to ensure solid IT services performance and availability – even for your hyperscale public cloud services.

Developing the SMART SLA your business needs – a service level agreement that’s specific, measurable, achievable, relevant, and timely – begins with these 6 best practices:
Continue reading

7 security best practices: Preventing ransomware attacks — with people

7 security best practices: Preventing ransomware attacks — with...  by Quest

If you have taken note of enterprise network security over the years, you’re aware of security best practices basics, which are also applicable to ransomware: layer your security defenses, back up your data, keep your software patched…
Continue reading

What to look for in a cloud-aware managed/hosted services provider

The cloud in 2017: 3 trends by Quest

Choosing the right managed/hosted services provider for your organization can be tough because what such providers offer – and how they deliver – can vary greatly.
Continue reading

Cloud security in 2017: stronger than ever

The cloud in 2017: 3 trends by Quest

If you’ve concluded that the public cloud services you use are as secure, or even more secure, than your traditional on-premises environment, you’re in good company – nearly two-thirds of IT leaders surveyed last year agree with you.

Why cloud security tops on-premises security

As they bring in yet another cloud service (and mention it only after the fact, if at all), most of the managers of your lines of business probably don’t think much about cybersecurity – but cloud services providers certainly do. Their reputations depend on it, which is why they’re investing in a two-pronged approach to cloud security:
Continue reading

Of IT resilience and business recovery:
From days to hours to minutes to seconds with 6 capabilities

IT resilience and business recovery by Quest

As I’ve noted, IT resilience requires designing for the continuous availability of all business processes, workflows, technologies, and policies needed for always-on operations.

To do this, you need outwardly-focused, cloud-conscious backup and business recovery solutions able to provide continuous data protection and end-to-end recovery automation regardless of what’s in your IT environment or how/where it changes.
Continue reading

Uh oh, downtime!

Downtime by Quest

The impacts of downtime on a business can be devastating, as this cringe–inducing chart reveals:


Downtime impacts
Downtime impacts by Quest
Source: 3 Steps to IT Resilience, Forrester

Continue reading

Staying secure in a dangerous age:
How to face down ransomware

Face-down Ransomware by Quest

In my last post, I focused on several key types of cyber threat most likely to challenge your business right now. This time, I’m drilling down — to ransomware and what you can do to protect your enterprise from it.

Why ransomware prevention? Because security experts regard ransomware as today’s most serious cyber threat, having increased 35% in just a year to an average of nearly 1,000 per day in 2015.
Continue reading

Screening now: The great technology talent show

Technology Talent Show by Quest

By some reports, hiring (and keeping) competent information technology talent has never been so difficult.

To an extent, technology talent struggles vary in degree according to industry subsector and location. Cybersecurity, for instance, faces particularly intense shortages of much-needed experts. Some expect one million cybersecurity job openings this year, and even demand for entry-level cybersecurity slots, like information security analysts, is projected to climb by 37% over the next six years.
Continue reading