QeH2 IT Consulting Blog

Denver IT Support Advice: 10 Cyber Threats To Watch Out For

Posted by Ian Holt on Wed, Jun 08, 2016 @ 05:33


As a Denver IT support firm, we see all sorts of digital attacks on computers. Check out some of the most dangerous threats to your company security! 

1. Attacks via USB drives: as these types of drives become cheaper and more ubiquitous, malware and Trojans will spread on them. Many companies hand out USB drives at trade shows.

2. Large-scale, targeted botnet attacks.

3. Denial of service attacks, like those that affected San Francisco-based Visa Inc. (NYSE: V) in the Wikileaks fiasco.

4.More attacks via social networks like Facebook Inc. Future viruses will likely be designed to steal or delete users’ personal information, which can be sold in numerous black markets.

Read More

Topics: Security & Compliance, Disaster Planning

4 Ways to Determine the Need for a Full-Time CIO

Posted by Ian Holt on Wed, Nov 04, 2015 @ 03:51


It is becoming clear that the success of a business is closely tied to an effective CIO, as technology is becoming more and more strategically connected to the overall success of an enterprise. With this in mind, many SMBs are questioning whether or not they need a full-time CIO of their own. Though it’s true that larger enterprises have more financial capabilities to support a CIO, SMBs can benefit from CIO expertise and need to be able to figure out if, when, and how to implement a CIO of their own.

Read More

Topics: CIO Services

3 Reasons That SMBs Need a CIO

Posted by Ian Holt on Fri, Oct 30, 2015 @ 09:39

Being considered an SMB is a unique opportunity that also comes with its own set of unique challenges. Most SMBs consider themselves too small to necessitate bringing somebody on internally to act as a CIO. Instead, most SMBs settle for operations-level IT employees, if they choose to bring any on at all. This is a mistake that can have negative impacts on long-term business operations for SMBs.

Read More

Topics: CIO Services

Are All RTOs the Same?

Posted by Kelley Wrede on Fri, Oct 23, 2015 @ 03:20

Successfully protecting and recovering your business is an integral part of any IT decision maker’s strategy and focus while building and purchasing BDR requirements. But, what if you’ve never had to go through the buying process yourself? Chances are, you’ve probably had to implement and troubleshoot these technologies in the past, but have never had to actually lead the purchasing and decision making aspect of “Recovery-as-a-Service” technologies. This brings up an important question that not many providers address: “Are all RTOs the same?”

Read More

What is RTO & Why Does It Matter to My Business?

Posted by Kelley Wrede on Thu, Oct 15, 2015 @ 11:37

We’ve discussed why RPO is an important component of Business Continuity for SMBs, but we also need to address the term “Recovery Time Objective”, which goes hand-in-hand with RPO and is another critical detail that a solid Business Continuity plan should include.  If you’d like to see your business survive any future disaster, this is important information for you to know.

Read More

Topics: Business Continuity Planning, BDR, Disaster Planning

What is an RPO & Why Does it Matter to My Business?

Posted by Kelley Wrede on Wed, Oct 07, 2015 @ 07:40

By now, most have heard the terms “Disaster Recovery” and “Business Continuity”, and how they are applicable to business.  However, to some, the term “Recovery Point Objective” means absolutely nothing, and that’s a problem. And we’ll tell you why.

Read More

The Evolution of the CIO From 1970 to Today

Posted by Joe Ledbetter on Wed, Sep 30, 2015 @ 02:37

Recently Salesforce.com published an infographic charting the evolution of computing power and that of the CIO role within an organization from the early 70s to today.

Read More

Topics: CIO Services

Is Your Data Center at Risk for a Security Breach?

Posted by Joe Ledbetter on Fri, Sep 25, 2015 @ 12:43

We live in a world of viruses, malware, and hackers where information security is an issue that we all have to deal with. The bottom line is that only one method of IT security will not fully protect your mission-critical data. In the enterprise IT space, implementing multiple tactics and security processes can mitigate many of the gaps. Let’s look at the eight levels of IT security which work together to form a tight-knit and (hopefully) impenetrable web of safeness.

Read More

Topics: Security & Compliance, Technology for Business