Helping clients manage their technology for over 30 years.

Six ways cybersecurity breaches can bring down your business

 Forging a path to IT resilience

These days, the consequences of inadequate cybersecurity have profound impacts on companies’ reputations, bottom lines, and leadership jobs. Equifax’s 2017 breach, for instance, cost $439 million, tanked its share price by 27%, and forced its CISO, CIO, and CEO to resign. Continue reading

Two steps to getting the IT talent you need

IT Integration

Despite occasional arguments that the U.S. IT talent gap is a myth, plenty of evidence (see my last post) points to what appears, in fact, to be a rather significant IT talent gap that’s particularly wide in cybersecurity, cloud computing, big data, analytics, and information management.
Continue reading

Minding the IT talent gap

IT Integration

For a while now, organizations large and small have struggled to find and retain the IT skillsets they need. Two years have passed since Gartner noted, “Talent has now been recognized globally as the single biggest issue standing in the way of CIOs achieving their objectives.”

If your experience suggests the IT talent gap has intensified since 2016, you’re not alone. Among North American IT decision-makers, 75% say they face a skills shortage, and few expect it to ease over the next two years. Continue reading

Achieving business continuity:
7 strategic best practices

IT Integration

When it comes to risk management, best practices begin with best strategies:

1 Take the time to realistically assess your enterprise’s vulnerabilities
In one recent survey, increased reliance on technology itself and increasing business complexity ranked second and fourth as drivers of increased risk. Continue reading

Risky Business: What’s lurking in your risk landscape?

Risky Business: What’s lurking in your risk landscape?

Businesses have always faced risks. In the 1920s, shopkeepers in small Midwestern towns were issued surplus World War I rifles so they could run into the street and shoot skedaddling bank robbers.

But risks evolve, as do the ways any given risk may impact your business. Continue reading

Cybersecurity best practices:
Paying attention to these 10 basics helps prevent ransomware attacks

7 security best practices: Preventing ransomware attacks — with...  by Quest

A commitment to the seven people-focused cybersecurity best practices I reviewed in my last post will thwart many attacks. But don’t forget these 10 key cybersecurity best practices basics:
Continue reading

Conquering Cybersecurity Problems: Managed IT Services Can Help

Managed Security Service Provider - Quest

In my last post, I described some of the key ways Managed IT Services help monitor networks and applications, conduct real-time analysis of security alerts, and streamline management of security reporting and policy compliance.

Important as these Managed IT Services are, however, the IT-centric capabilities they provide are just part of a larger IT security picture. Unquestionably, these capabilities are necessary, but they are by no means sufficient – especially if your goal is (as it should be) to create and sustain multiple security layers that are proactive and preventive. Continue reading

The IT Security Arms Race: How Well Are You Keeping Up?

Hands typing quickly on a keyboard

Today’s digitization of just about everything – especially a whole lot of business data – means the technologies your organization depends on may be changing more quickly than you think.

Of course, this has been true for some time. But for a while it wasn’t the case – software patches and antivirus updates were less frequent, and the sense of urgency was by similar degree, less as well.

Alas, that was then. Now if you let your IT environment – especially your security stance – fall behind, you could be left exposed to some pretty insidious threats.
Continue reading