Skip to content

Archived CEO Blogs

5 Questions to Help Build Your Disaster Recovery Preparedness Plan

Wildfires, earthquakes, hurricanes, and massive cyberattacks—when we think of natural or man-made disasters, we often imagine major catastrophes. As we are reminded too often, these things really do happen, which is one reason I hope your organization has a Disaster Recovery preparedness plan

Tim Burke

Does your organization need a virtual CISO?

Cybersecurity has become a core concern in recent years for any organization that deals with sensitive information. With large-scale cyber attacks in the news practically every month, more and more companies have determined that they require the services of a highly experienced security expert. This has resulted in a relatively new executive-level position: the Chief Information Security Officer (CISO). These are folks with enterprise-level experience who, as officers of the company, make certain that security is embedded into the mission and day-to-day operations

Tim Burke

Application Security Scanning Can Save Your Business

Web and mobile applications are everywhere, connecting us to our digital world. These applications drive just about everything we do online, from login pages to shopping carts, webmail to content management systems, and much more

Tim Burke

What to know when moving your business to the cloud

If you are a business leader or an IT professional who has not yet begun the process of moving your organization to the cloud, it’s likely that you are considering doing so. The first thing you need to know is that cloud services are a different species of technology than traditional enterprise IT infrastructure. In most cases, that means a move to the cloud cannot be safely executed or supported by traditional IT organizations.

Tim Burke

10 Tips to Keep Your Email Secure

For cybercriminals, email scams and attacks, including phishing and malware attacks, are some of the oldest tricks in the book—and they are still extremely effective. In fact, eight out of ten successful hacks and data breaches start with phishing scams.

Tim Burke

No Application is an Island

When it comes to getting the DevOps help you need, you may be tempted by vendors offering low prices, typically because they have a narrow, app-only focus.

Maybe this will work for you — if you already have the resources necessary to ensure that the application being developed plays well with the rest of your IT infrastructure.

Tim Burke

Contact Quest Today  ˄
close slider