Skip to content

Blog Archive

Why the SASE Security Model Makes Sense in Today’s Environment

Security is certainly front of mind for anyone involved with IT today. That’s why many companies have adopted stronger and stronger measures to prevent successful cyberattacks. That typically means having end users—those working both remotely and in the office — access all their data via a backhaul connection through a virtual private network (VPN). This approach lets users take advantage of the organization’s firewall, filters, and other security measures. But while users may be able to access the resources, they need this way—whether that’s SaaS applications or files—there are probably still plenty of gaps that exist in your security fabric.

Jon Bolden

How Tabletop Exercises Can Enhance Your Risk Management Processes

Tabletop exercises led by a risk management professional can help your team prepare for any potential cybersecurity incident or natural disaster. As cybercrime has spiked and natural disasters including hurricanes and wildfires are becoming more frequent, many organizations are employing a rigorous set of risk-management practices known as “tabletop exercises.”

Tim Burke

What is Zero Trust Network Access and Why Does it Matter?

The pandemic gave a hearty push to the migration to remote work. And, while the pandemic may soon be in the rear-view mirror, working from home is here to stay. Point in fact: Bloomberg says U.S. job listings that tout working remotely as a benefit have more than doubled in the past year. Another recent study found that remote workers—overwhelmingly at 97 percent—would like to work remotely at least part of the time for the rest of their careers. With employees now scattered everywhere you can no longer be certain that every device that’s connected to your network is authenticated and behind a firewall. The traditional delivery of security services simply doesn’t work anymore because your organization no longer has a clearly defined perimeter.

Tim Burke

Why You Need 6 Layers of Zero-Trust Control

A recent report produced for IBM put the average cost of a data breach at $3.86 million. The same report said that simply having a remote workforce added nearly $137,000 to the cost of data breach resolution. Those are big numbers. And, with today’s migration to a remote workforce, that should be plenty of motivation for those responsible for their organization’s data security to take notice.

Jon Bolden

Three Signs Your Business Needs Help Managing Its Data

If you run your own onsite data center, already work with a co-location service provider, or are one of the fast-growing number of companies utilizing a cloud services provider, there is a very good chance that you need help managing your data.

Tim Burke

Contact Quest Today  ˄
close slider