Skip to content

Blog Archive

Key Advantages of Edge Computing

Cloud edge computing, now more commonly known as edge computing, is an IT architecture in which client data is processed as close to the source as possible. This often involves moving machine learning tools from cloud data centers to embedded systems on devices in the field, at the periphery of the network—the edge.

Tim Burke

5 Key Benefits of Effective Monitoring and Alerting

According to one report, cyber attackers spend an average of 11 days snooping around after breaching a network before they are detected. That discovery often only comes to light because the hackers have deployed ransomware. And cybercriminals are always hunting for new ways to sneak onto your network, compromise your resources, and steal or ransom your precious data. In these cases, what you don’t know really can hurt you, as Quest’s CEO wrote about in this post about monitoring and alerting. But plenty of other IT-related issues make a case for monitoring and alerting.

Adam Burke

How Businesses Can Achieve CMMC Compliance with Cloud Zero Trust

If your organization does business with the Pentagon, you probably know that Cybersecurity Maturity Model Certification (CMMC) is an absolute requirement. If your organization does not, you should still take heed. Whatever industry you operate in, know that Zero Trust Network Access (ZTNA), a cloud-based, multi-level security model, can help you fulfill CMMC requirements—and Cloud Zero Trust is available as a service.

Tim Burke

5 Reasons You’re Not Patching (Yet)

Ask any IT manager about their greatest challenges, and patching will undoubtedly earn a spot at the top of the list. Keeping up with the constant need for new patches is difficult – which is why many companies end up falling behind.

Mike Dillon

How to Avoid Major Disaster Recovery Pitfalls and Secure Your DR Plan

Not only can disaster strike at any time, it likely will, and your business’s very survival could depend on its disaster recovery (DR) capabilities. The evidence is clear: The National Oceanic and Atmospheric Administration (NOAA) predicts an above-normal hurricane season, and much of the West is in extreme drought and prone to devastating fires that in the past have destroyed businesses and critical infrastructure. In one recent survey of 5,600 IT pros, 66% said disaster struck their organization in another form having been hit by ransomware in 2021. The pace and sophistication of cyberattacks continue to grow, as I pointed out in my blog describing the variety of attack vectors coming at you.

Tim Burke

6 Essential Tips for Ensuring Physical Security and Safeguarding AV Communications

We talk a lot about cybersecurity in our posts because it’s on the top of almost everyone’s mind today. What often gets lost in the conversation is the need for sound physical security practices and securing AV communications. These areas are also vital if you want to fully protect your data and business. As our CEO wrote in a recent post, “physical security and good AV tools are keystones for success.” At the same time, the Cybersecurity and Infrastructure Security Agency (CISA) has written about the convergence of physical security and digital security, even offering a Cybersecurity and Physical Security Convergence Guide.

Adam Burke

Contact Quest Today  ˄
close slider