Skip to content

Archived CEO Blogs

Security holes that’ll keep you up at night: Doing some data breach math

Over the last few weeks, I’ve taken a look at what you can do to boost your organization’s IT security. But it occurs to me that maybe I’ve put the cart before the horse.

So I’m going to spend the next few weeks delving into the sort of threats your business’s IT infrastructure faces. And I’m going to start with data breaches and the most recent big-headline example: Zappos (parent company is Amazon.com), which last month admitted it suffered a data breach that compromised 24 million customer accounts.

Tim Burke

Automating network performance: 6 key capabilities

The right network management capabilities will provide the feedback you need to eliminate bottlenecks and IT failures while also enabling your network’s ability to deliver data, voice, wireless, Internet, and video services.

Which is why adequate performance management , trending and capacity planning , protocol analysis/ fault isolation , and onsite/remote network health monitoring have become so essential.

Tim Burke

Contact Quest Today  ˄
close slider