Solutions Blog

Solutions Blog Insights From Experts Who Get IT

  • Topics
    • Cloud (246)
    • Data Center (284)
    • Digital Workspace (372)
    • Networking (220)
    • Security (240)
    • Software (247)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

Security

As any thorough security assessment can tell you, every infrastructure is vulnerable to cyberthreats. In the face of growing phishing and ransomware attacks, IT leaders must look to advanced anti-malware protection and cloud security measures to guard sensitive corporate data. Next-generation firewalls — many of which feature built-in intrusion prevention system (IPS) technology — allow organizations to analyze network traffic and detect and block vulnerability exploits. Identity and access management (IAM) products and single sign-on (SSO) technology can then go beyond traditional password security to centralize authentication and authorization. Hear from CDW cybersecurity experts as they discuss these protections and others, and explore the benefits of a holistic security approach.

Learn More   


The Risks of Being a Data Hoarder

A data management plan is essential as organizations look to employ analytics in new ways.

By Alyssa Miller
|
October 29, 2019
Security

On the TV show Hoarders, the subjects of the program often explain that they allow apparently useless items to pile up around their houses because they might need them someday. Regardless of its implications for household décor, this is a poor model for data management, but we see some organizations follow it nonetheless. In some…

Read More   

How to Address 3 Next-Generation Firewall Management Challenges

Critical but labor-intensive security tasks are a good fit for CDW Managed Services.

By Ben Mason
|
October 22, 2019
Services, Security

Organizations face many challenges when it comes to keeping their operations secure and driving the most value from their next-generation firewalls (NGFWs). How to overcome these challenges is one of the most common discussions I have with customers. They often don’t have the personnel resources to tackle these important but mundane tasks. One fix is…

Read More   

Want More Effective Security? Start with the Basics

Top vulnerabilities can often be addressed with simple security strategy and tactics.

By Alyssa Miller
|
October 17, 2019
Security, Services

The seemingly endless headlines about security and data breaches can lead us to believe that attackers have become more advanced than ever before. While perhaps their goals and approach are more organized, analysis of recent breaches suggests that their techniques, in fact, have not significantly evolved. As CDW looks back on the last three years…

Read More   

How to Make Office 365 Even More Secure — Part 2

By Josh Walters  and Brandon Pierce
|
October 15, 2019
Security, Software

In our previous post, we shared some tips on how to better secure your Office 365 deployment. We covered: Applying multifactor authentication to your synced Active Directory and cloud passwords Addressing common security exposure points we’ve seen in Exchange Online Enabling the audit features in Office 365 These are all relatively simple steps that can…

Read More   

5 Ways to Start Threat Hunting Today

Many organizations already have tools in place to get started in proactively searching for evidence of a security breach.

By Sean Tierney
|
October 14, 2019
Security

Threat hunting has become an important cybersecurity practice. Building on the presumption that sophisticated attackers have already successfully penetrated many enterprise networks, threat hunting seeks to uncover evidence of these compromises, enabling a rapid response. While few of the organizations I work with are conducting threat hunting activities, many of them are talking about it….

Read More   

How to Handle GDPR Data Subject Access Requests

Overcoming these four hurdles can optimize your efforts to meet DSAR requirements.

By Alyssa Miller
|
October 10, 2019
Security, Data Center

When the European Union’s General Data Protection Regulation went into effect in May 2018, it posed a challenge for many organizations. But with more than a year of experience under their belts, most have been able to work through the growing pains of compliance and settle into new operational routines. Now that most of us…

Read More   
  1. Pages:
  2. «
  3. 1
  4. 2
  5. 3
  6. 4
  7. 5
  8. 6
  9. 7
  10. ...
  11. 40
  12. »
  • ‹ Previous
  • 1
  • 2 (current)
  • 3
  • 4
  • 5
  • 6
  • Next ›
  • Last »
Recommended for You

Most Popular
Digital Workspace | Security

Mobile Security Is at the Heart of Modern Device Design

Networking | Security

Fight Social Engineering and Phishing Attacks by Correcting Risky Behaviors and Rewarding User Diligence

Data Center | Security

How to Handle GDPR Data Subject Access Requests

Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2019 CDW. All Rights Reserved