Skip to content

Archived CEO Blogs

Staying secure in a dangerous age: Overcoming cybersecurity complexity – with cloud and managed security services

The last time I posted, I described several cybersecurity solutions which are moving beyond the reactive, siloed offerings that continue to be necessary, but are no longer sufficient to protect our enterprises.

These solutions can seem daunting. The complexity of it all often overwhelms.

This is partly due to what’s happening to our information infrastructures, which are also becoming more complex as they go hybrid. They are, essentially, boundless as they accommodate internet communication. Meanwhile, today’s in–house data centers are increasingly virtualized and typically combine a variety of cloud and managed services.

Tim Burke

Staying secure in a dangerous age:Beyond reactive cybersecurity solutions

In my recent posts, I’ve focused on some of the top security threats faced by anyone trying to keep their business data and systems safe.

Besides app attacks, web attacks, social engineering exploits, and ransomware, there’s plenty more to be concerned about – the challenges of trusting devices and sensors that are part of the Internet of Things (IoT), breaches that steal huge swaths of “big data,” and the frightening vulnerabilities of industrial control systems .

Tim Burke

Staying secure in a dangerous age: How to face down ransomware

In my last post, I focused on several key types of cyber threat most likely to challenge your business right now. This time, I’m drilling down — to ransomware and what you can do to protect your enterprise from it.

Why ransomware prevention? Because security experts regard ransomware as today’s most serious cyber threat , having increased 35% in just a year to an average of nearly 1,000 per day in 2015 .

Tim Burke

Staying secure in a dangerous age: Know the threats you face

Fasten your seatbelt. I’m driving into the realm of digital security, which can turn into a rather hairy ride.

Despite its challenges, digital security deployment is what stops the hackers, malicious actors, and spies from stealing everything. So let me begin by telling you to stay vigilant, because as the use of digital technologies becomes more pervasive, so do the attempts to exploit it for nefarious purposes.

Tim Burke

8 best practices for going hybrid cloud

Public cloud apps and services are great for shifting your non-differentiated business functions and infrastructure from expensive on-premise environments to low-cost off-site facilities managed by specialists you have no hope of keeping on staff.

Yet, if you’re facing shadow IT issues, demands to improve security and compliance, or the realization that you must prepare for a future in which success depends on your ability to differentiate your business , then you need something more than public cloud subscriptions.

Tim Burke

Looking Under the DRaaS Hood

Too often when you’re in the market for a new or upgraded IT capability, it’s by necessity, because your operations have been thrown into crisis by some sort of failure and you need a solution now. In resolving disaster recovery and business continuity crises, you’ll likely end up with an ‘as a service’ solution, since you can get it up and running quickly with little or no CapEx. And, especially if you’re in crisis, you may think all DRaaS solutions

Tim Burke

Contact Quest Today  ˄
close slider