Welcome to the SymQuest Blog! Here we share the latest developments and stories from our world of managed IT and managed print services. Explore our articles on cloud computing, disaster recovery, Green IT, mobile printing and more and join the conversation.

Featured Posts

Mark Jennings

Mark Jennings is SymQuest’s Area Vice President of IT Sales. Jennings works with SymQuest’s sales and service teams to educate customers on current best practices around data protection, disaster recovery, security, and overall technology planning.
Find me on:

Recent Posts

How to Strengthen Company Data Security with Multi-Factor Authentication

Posted by Mark Jennings - February 04, 2019 - MFA

The modern workplace has transformed. New developments in business technology and improved mobility has made it easier than ever before to collaborate on projects and access company information wherever and whenever necessary.

Cloud computing technology and company adoption of BYOD (Bring Your Own Device) policies have introduced a new level of flexibility for employers and their employees who wish to work remotely and on devices they’re most comfortable using.

However, over time there has been a growing concern in the security of these systems, especially in companies that maintain higher levels of data accessibility. With the number of cyberattacks and data breaches on the rise each year, businesses are now turning to more advanced methods of digital asset protection.

Read More ›

Why it’s Time to Replace Your On-Prem File Server With Cloud-Based Collaboration

Posted by Mark Jennings - January 21, 2019 - Office 365

Most people have become comfortable using cloud-based applications in their daily lives. We back up our photos, stream shows, and use online banking from multiple devices, all with the cloud.

Beyond personal use, many workplaces have started shifting certain business functions to the cloud as well.

Typically, email is one of the first applications that organizations choose to make cloud-based by moving their Exchange servers to the cloud. The next step is usually moving communication-focused office applications such as video conferencing, chat, and CRMs. Everyone can understand the benefit of having easy access to these programs. It is often easy and comfortable to make this change.

Read More ›

Creating a Cybersecurity Protocol for Employee Turnover

Posted by Mark Jennings - October 25, 2018 - IT Security

When an employee leaves or is let go from your company, your first priority may be hiring their replacement or delegating their day-to-day workload. But protecting your company should be at the very top of your to-do list when an employee leaves.    

It’s essential that companies adopt a series of protocols to ensure best business security practices. Most employees have varying levels of networked access to relevant company documentation. Being able to control these access points during an employee's exit will keep your company protected from any form of disgruntled retaliation or loss of competitive information.

Here are five critical aspects of an effective cybersecurity protocol that should be followed when addressing employee turnover.

Read More ›

about the author

Comments