Skip to content

Archived CEO Blogs

Security in the cloud: What you need to know

Cloud computing gets immense attention these days as a profound agent of change affecting how IT serves the business. In particular, Cloud computing has begun the untethering of employees from their desks and their offices. Because the mobility of today’s, and tomorrow’s workforce cannot happen without the Cloud.

Yet worries about Cloud security abound, and for good reason: Cloud computing that involves processing sensitive or regulated data in shared environments needs extra scrutiny in terms of security (as well as codifying requirements, defining a cloud services contract, managing the transition from in-house to cloud, and overseeing the resulting mixed IT environment).

Tim Burke

What’s Happening to the IT Department?

Where once IT departments were the sole source when it came to technology implementation, today technology is finding its way into corporate America through nearly every department.

Marketing folks may have been among the first to leave the IT department fold when they ditched cumbersome CRM systems for easy-to-use Salesforce.com, but they were just the tip of what has grown into a pretty big iceberg.

Virtually every day sees a new app available to help workers be more productive — and those workers aren’t hesitating to download those apps and get on with business.

Tim Burke

Securing your virtual environment

Odds are your IT environment is somehow engaged in virtualization — either directly in your data center or indirectly via the service providers you’ve engaged.

But how much have you — or your IT people — thought about virtualization security? This matters more than you may think. One Gartner analyst has estimated that 60% of virtualized servers will be less secure than the physical servers they’ve replaced.

Tim Burke

Think it can’t happen to you? Think again

Two kinds of security threats have emerged of late that need special attention, even if you’re running a small enterprise: Targeted zero-day attacks and advanced persistent threats .

Targeted zero-day attacks
Microsoft’s recent Internet Explorer security flaw (see my last blog post) is a fine example of a zero-day attack. The attackers got their edge from speed, since reactive countermeasures that depend on threat signatures — such as patching and tools like antivirus software and intrusion prevention — couldn’t be updated fast enough to halt the flaw.

Tim Burke

The importance of IT security vigilance

Last September 18th, Germany’s Federal Office for Information Security warned that nation’s population not to use Internet Explorer because of an IE security flaw “is already being used for targeted attacks” designed to lure users to an infected website which, when visited, allows hackers to take control of the user’s computer. Soon after, the Swedish government issued a similar warning.

Even worse, Microsoft was not immediately able to fix the problem. First came a temporary patch, said to be less that complete.

Tim Burke

How to get the precise Cloud capabilities you need — affordably

When you find a Cloud services provider who’s able to precisely design and customize Cloud capabilities to address your organization’s unique needs, you can begin down the path to achieving the flexibility, scalability, cost reductions, efficiencies, redundancy , and disaster recovery protections you need. And you can do it without overspending on overcapacity.

In particular, a services provider who will customize your Cloud services can address your security concerns with an over-arching services contract and service-level agreement (SLA) that’s explicitly written for your business.

Tim Burke

Contact Quest Today  ˄
close slider