Skip to content

Archived CEO Blogs

8 Best Practices to Develop a Business Resilience Strategy

According to Gartner , by 2020 60% of businesses will suffer major service failures due to mismanagement of risk in new technology and use cases. This is why, in my last post, I suggested that the best way to deal with these risks is to commit to a strategy of resilience — “ the capacity of an organization to plan for and adapt to change or disruption through anticipation, protection, responsive capacity, and recoverability .”

To get a sense of a resilient business in 2015, let’s start with where you want to end up.

Tim Burke

To Deal With Technology Risk, Focus on Resilience

Have you noticed how people are talking more about risk these days? Not surprising, given the spectacular nature of recent hacks. Even reinsurers express worry: in a poll last fall , 40% ranked cyberattacks as the most threatening emerging risk of 2015.

Yet, cyberattacks threatening your systems’ security and your data’s privacy are only part of a much larger risk problem. This greater scope of risk is more about effect than cause – if you contain your risk strategy solely to cyberattacks, you’ll leave yourself exposed on other fronts.

Tim Burke

A Forward Look: Riding the Digital Waves of 2015

At year’s end, I always find myself looking back over the previous 12 months and then, inevitably, I can’t help but look forward to the coming year. Since I’m in the information technology business, this exercise can be pretty interesting.

Technology trends translate into products and services that matter, but when you hear about technologies like web-scale IT, cloud bursting, advanced analytics, self-aware apps, context-rich systems, software-defined networks, etc. – well, it’s hard to keep your eyes from glazing over. So I’ll narrow it down to two waves coming at all of us:

Tim Burke

Keep Your Guard Up During the Holidays

The holiday season is upon us – which means it’s also cyberattack season. Though, arguably, 2014 has turned into an entire year of the cyberattack: one study estimates 2014 will rack up an incredible 42.8 million cyberattacks worldwide. That’s more than 117,000 attacks every day!

Which leads me to the topic of firewalls. It’s been 20 years since the first firewalls were deployed to make a perimeter gateway barrier blocking unwanted IP traffic.

Since then, firewalls have evolved to keep pace with new technologies, the ever-increasing complexities of network infrastructures and applications, and new business models that have spawned things like cloud computing and mobile apps. These days, companies deploying firewalls and advanced perimeter controls see a 15% return-on-investment .

Tim Burke

Are You Ready for Your Own Bleeding Edge?

Manufacturers love buzz words. And, it’s true, most of us are susceptible to catchy phrases. One that’s caught my attention is ‘bleeding edge’ — used to describe the very, very latest technology product or service. It’s a heady feeling, being at the forefront of technology, and the urge to acquire the newest and best can be downright irresistible, as evidenced by sales of the iPhone 6. Yet there are times when you should resist. Being on the bleeding edge can

Tim Burke

Giving Thanks During the Season of Patching

As the nights grow longer and colder, giving thanks for all that’s warm and light-filled makes wonderful sense. We are, in effect, expressing appreciation for feeling secure and safe.

In fact, this is a time of year when it’s a good idea to pay particular attention to security — especially data security. With the season of holiday gift-buying underway, opportunities for data thieves, hackers, and malware abound.

This isn’t only a concern for retailers and credit card firms. We’re all vulnerable and we all have to continually tend to the security of our businesses. 

Tim Burke

Contact Quest Today  ˄
close slider