Skip to content

Archived CEO Blogs

Apps, Apps Everywhere — But How Secure Are Yours

Did you know that your applications are the most vulnerable part of your IT operations?

These days, problems with apps — many of them web-based apps — account for the majority of information security breaches. Over the last year or so, and going forward, application-level attacks have emerged as the preferred vector for gaining access to sensitive (and valuable) data. What’s more, the threats are becoming increasingly acute as complex web apps, as well as mobile apps, play ever greater roles in our business and personal activities.

App vulnerabilities for sale — cheap at the price?

Tim Burke

What Secure, Enterprise-Grade File Sharing/Syncing Looks Like

As I detailed in my last post, file sharing/syncing is quickly transforming how, where and when we work by making our apps and data available and usable on any Internet-connected device. Even if your organization doesn’t have an enterprise-grade file sharing/syncing capability in place, odds are your employees have attempted to make their lives easier by implementing their own consumer-grade alternatives.

Tim Burke

2014: The Year We Can Help Make BYOD Safe For Your Business

As we venture into 2014 expect to hear a lot more about file sharing/syncing. Not surprising given that 25% of information workers now use file sync and share services in their jobs, according to Forrester Research — up from just 5% in 2010.
Anywhere, Anytime, Anyone
And I believe those numbers will continue to climb. Despite sounding mundane, file sharing/syncing (thanks to the cloud and BYOD) has begun to significantly reshape how we work with each other. By making files, documents and application data available and usable on any device, file sharing/syncing empowers employees to work anywhere, anytime, with anyone — using whatever device is at hand.

Lest you decide to discourage such behavior, consider that BYOD provides more than eight hours of additional productivity per week as a BYODer normally works beyond the time-and-place parameters of the traditional office.

Tim Burke

A Glimpse of What’s on the 2014 Tech Horizon …

As 2013 comes to a close, it’s time to look ahead, and a good place to start is Gartner’s top ten strategic technology trends for 2014 , which point to an accelerating velocity of change that we ignore at our peril:

Tim Burke

How Big is The BYOD File-Sharing Target on Your Corporate Back?

If yours is like most businesses these days, many of your employees use their own smartphones, tablets and/or laptops to do their jobs — and the numbers are climbing fast as more people go mobile. Pew Research Center reports that as of May 2013, 56% of American adults have a smartphone and as of September 2013, 35% own a tablet.

Tim Burke

10 Information Security Best Practices You Can be Thankful For

If you’ve gotten this far through 2013 without an information security breach , count yourself fortunate. According to a recent survey by PwC , CIO magazine , and CSO magazine , security incidents have increased 25% over the last year. The financial costs of these incidents have climbed, too — by 18%.

The PwC/CIO/CSO survey points to three culprits: new hacker strategies, the bring-your-own-device (BYOD) trend and cloud computing. And it warns that too many organizations have not changed their security stances, leaving themselves dangerously vulnerable to new kinds of threats.

Tim Burke

Contact Quest Today  ˄
close slider