CDW Solutions Blog
Solutions Blog Insights From Experts Who Get IT
  • Topics
    • Cloud (303)
    • Data Center (323)
    • Digital Workspace (462)
    • Networking (261)
    • Security (309)
    • Software (321)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

Paul Shelton


Paul Shelton is the lead practice architect for CDW's security solutions practice, providing overall technical strategy and direction for dealing with today's security challenges. Paul has been in the business of solving customers' security concerns for 15 years, serving local governments, large-scale enterprises and more. Starting with CDW is 2006, Paul has held the positions of senior consultant, technical architect and practice architect.

Solution Practice Lead


Assessing the ‘New Normal’ of Cybersecurity

Security assessments can help organizations uncover vulnerabilities introduced by new technologies.

By Paul Shelton
|
May 20, 2020
Security, Services, Software

[sayit]In the early days of the coronavirus crisis, as nonprofits shuttered their offices and canceled large events, many began to roll out videoconferencing at scale for the first time. At first, things generally went smoothly, with employees and other stakeholders able to connect with one another from the safety of their homes. Then the videobombers…

Read More   

Prioritize These Security Considerations as Users Work from Home More Frequently

Security is often an afterthought for WFH programs, but it shouldn’t be.

By Jeff Falcon  and Paul Shelton
|
March 16, 2020
Digital Workspace, Security

— Written by Jeff Falcon, Paul Shelton and Ziyad Roumaya When it comes to working from home, for many organizations, user devices and network connectivity are top-of-mind concerns. And while that makes sense, there are certainly other considerations. Like everything else IT-related, there are aspects of security that need to be minded when rolling out…

Read More   

How Risk Assessments Help Small Organizations Thwart Ransomware

Every piece of data represents a potential target for attackers, but security services can reduce the risk.

By Paul Shelton
|
January 24, 2020
Security, Services

[sayit]Everyone who works in IT is familiar with the phone call that I received from a friend last year: “Hey, Paul, you work with computers, right?” I braced myself, knowing that I was once again about to don the “friends and family” technical support hat that all of us are asked to wear from time…

Read More   

4 Best Practices to Get More from Multifactor Authentication Implementation

MFA solutions have evolved, and so should your plan to implement them.

By Paul Shelton
|
August 7, 2019
Security, Digital Workspace

[sayit]What’s the current state of multifactor authentication in your organization? If you’re like many of my customers, you might think that MFA is old hat — a problem solved years ago that now just requires a little routine maintenance. If that sounds familiar, it’s probably time for you to re-evaluate the role that MFA plays…

Read More   

Effective Authentication Is a Human Problem, Not Just a Technology Problem

Passwords remain a challenge because IT teams have no easy solutions to replace them.

By Paul Shelton
|
March 8, 2018
Security, Data Center

The intense interest in cybersecurity among IT professionals reflects its growing importance to just about every organization in every industry. I talked with many people who attended the CDW SummIT on Managing Risk in Las Vegas last month, and I was really impressed with the number of attendees and their level of engagement. One of…

Read More   

Why Employee Education Is Essential for Email Security

Defensive solutions alone are not enough to protect against increasingly sophisticated cybercriminals.

By Paul Shelton
|
October 11, 2017
Security

The past five years have seen a dramatic change in the cybersecurity threat landscape. Our defenses must evolve to meet these new threats. Enterprise security teams have dedicated the last two decades to perimeter protection, and they have gotten quite good at building a secure box in which we may place our sensitive data. However,…

Read More   

Anti-Phishing Training Remains Essential to Enterprise Security

While attacks are changing with the times, a solution centered on user education continues to be the most effective defense against spear phishing.

By Paul Shelton
|
May 15, 2017
Security

Remember the old days of phishing, where poorly written and designed e-mails linked to obviously fake websites, where you were asked to divulge your Social Security number, your mother’s maiden name, even your passwords. Those were simpler times — so much easier to spot a phishing scam. The warnings were clear and the perpetrators clumsy…

Read More   

A New Cybersecurity Approach for Evolving Email Threats

Next-generation security tools focus on getting ahead of attackers, rather than playing catch-up.

By Paul Shelton
|
February 28, 2017
Security

Few email users fork over their bank account numbers to Nigerian princes or click links to claim lottery prizes anymore. In fact, as digital natives enter the workforce, the collective sophistication of email users grows. Yet email scams are still big business. That’s because while users are increasingly savvy, so are the bad actors. Today’s…

Read More   

The Secret Handshake and Other Anti-Phishing Tips

By Paul Shelton
|
June 23, 2016
Security

A CFO gets an email from his CEO: She is traveling, but needs $10 million transferred to an account to finalize an acquisition. The CFO knows a deal is in the works, so he approves the transfer. Poof! The money is gone forever. It turns out a fraudster sent the email. Farfetched? Hardly. This trick…

Read More   

Sophos and the Heartbeat of Information Security

Communication between firewalls and endpoints can stop threats before they grow into something bigger.

By Paul Shelton
|
February 17, 2016
Security

A business hires two security guards to protect the premises. The first guard patrols the perimeter while the second protects the lobby. Late one night, the guard patrolling the perimeter discovers a freshly broken window. You’d expect that he would immediately alert the inside security guard about the possibility of an intruder, right? Unfortunately, IT…

Read More   

Consider a Third-Party Threat Assessment to Bolster Cybersecurity

By Paul Shelton
|
October 20, 2015
Security

In my 15 years of experience in consulting with customers on their security strategy, one thing is abundantly clear, security is tricky. No matter whom we work with, they have questions and concerns revolving around their security. “Am I secure enough?” is the nagging question that will keep security managers up at night. That’s not…

Read More   
Most Popular
Digital Workspace | Security

Prioritize These Security Considerations as Users Work from Home More Frequently

Digital Workspace | Services | Software

How to Switch Collaboration Vendors

Cloud | Data Center | Digital Workspace

The Business Benefits of File Modernization

Digital Workspace

8 Things to Consider Prior to Deploying Microsoft Teams

Data Center | Digital Workspace

Overcoming Data Lifecycle Management Hurdles

Recommended for You
Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2021 CDW. All Rights Reserved