Skip to content

Archived CEO Blogs

Service level agreements: painful but necessary

It’s true: information technology service level agreements (SLAs) are boring to read and may make your eyes cross as you try to drill into their miniscule details. They are also a crucial part of the contracts you have with your technology service providers.

Tim Burke

Why it’s worth getting help for your help desk

As your IT infrastructure becomes increasingly complex, the help desk team you need to ensure your employees get timely, efficient technical support grows more critical — and tougher than ever to maintain as an in-house effort.

You’re not alone. Many enterprises now turn to third-party help desk providers.

Four help desk service provider payoffs

With the right help desk services provider, you’ll reduce both your IT operations costs and your hassle quotient. Here’s why

Tim Burke

The wicked complexity of technical IT support

If life — or your IT infrastructure and the people who use it — were perfect, you’d never need to worry about technical support.

Of course, life and IT infrastructures are far from perfect. But life goes on, and you have to make sure your infrastructure does, too.

Tim Burke

Automating cybersecurity incident response

Let’s face it: cybersecurity incident response needs all the help it can get.

One study found that 44% of those queried suffered at least twice at the hands of the same attacker, and 77% of those sufferers noted that the attacker had returned with the same or similar tactics, techniques, and procedures.

Tim Burke

How you can learn from a cyberattack: Post-incident checklist

Tempting as it might be to forget all about the cyberattack nightmare you’ve just survived — don’t.

Not only are there several post-incident tasks you’ll need to be conscientious about, there is a great deal you and your employees can learn from the experience so that you don’t have to endure anything like it again.

Tim Burke

Why you need incident response playbooks

Cybersecurity experts have a saying, which I’ll paraphrase: There are two types of organizations — those that have been hacked and those that will be hacked.

Once you’re facing a cybersecurity incident, it’s too late to start considering what you require for a successful response.

Tim Burke

Contact Quest Today  ˄
close slider