Skip to content

Quest Blogs—Views on business, industry and technology.

The wicked complexity of technical IT support

If life — or your IT infrastructure and the people who use it — were perfect, you’d never need to worry about technical support.

Of course, life and IT infrastructures are far from perfect. But life goes on, and you have to make sure your infrastructure does, too.

Read More

Tim Burke

Tim Burke

Automating cybersecurity incident response

Let’s face it: cybersecurity incident response needs all the help it can get.

One study found that 44% of those queried suffered at least twice at the hands of the same attacker, and 77% of those sufferers noted that the attacker had returned with the same or similar tactics, techniques, and procedures.

Read More

Tim Burke

Tim Burke

How you can learn from a cyberattack: Post-incident checklist

Tempting as it might be to forget all about the cyberattack nightmare you’ve just survived — don’t.

Not only are there several post-incident tasks you’ll need to be conscientious about, there is a great deal you and your employees can learn from the experience so that you don’t have to endure anything like it again.

Read More

Tim Burke

Tim Burke

Why you need incident response playbooks

Cybersecurity experts have a saying, which I’ll paraphrase: There are two types of organizations — those that have been hacked and those that will be hacked.

Once you’re facing a cybersecurity incident, it’s too late to start considering what you require for a successful response.

Read More

Tim Burke

Tim Burke