Solutions Blog

Solutions Blog Insights From Experts Who Get IT

  • Topics
    • Cloud (246)
    • Data Center (284)
    • Digital Workspace (372)
    • Networking (220)
    • Security (240)
    • Software (247)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

Tips for Bolstering Small Business Cybersecurity

Asking the right questions and responding with the right tools will help keep your organization secure.

By Alyssa Miller
|
August 8, 2019
Security, Services

With the rise of ransomware attacks against organizations of all sizes, cybersecurity has become a top priority for even small businesses. Unfortunately, the unique challenges of a smaller organization can make securing the IT environment particularly difficult. IT staffs are typically stretched thin and asked to be knowledgeable across a variety of domains. Additionally, allocating…

Read More   

Common Security Issues We’ve Spotted Over the Past Year of CDW Threat Checks

Many organizations are making the same mistakes that weaken their security posture.

By Alyssa Miller
|
July 17, 2019
Security, Services

CDW’s security engineers have conducted Threat Check security assessments for more than 500 organizations since launching the third version of this service one year ago. During a Threat Check, powerful security tools are deployed on an organization’s network to spot vulnerabilities and signs of a breach. As we’ve analyzed the results of those assessments, CDW…

Read More   

CDW Threat Check Offers Visibility into the 5 Most Common Security Issues

We’ve conducted hundreds of assessments over the past 10 months, and our experts have encountered several problems that IT teams should fix to improve security.

By Alyssa Miller
|
May 21, 2019
Services, Security

In July 2018, CDW rolled out the third iteration of our complimentary Threat Check service. This service is designed to minimize the effort required by our customers to complete the assessment. Threat Check customers are provided a fully loaded security appliance that they simply connect to their networks. The appliance works in the background, passively…

Read More   

How Secure Do You Want to Be?

The answer to this simple question can help your organization achieve its security objectives.

By Jeff Falcon
|
December 13, 2018
Security, Services

In years past, many organizations took a passive approach to cybersecurity. They’d sit back and wait for something bad to happen, then react to it. That approach is no longer acceptable for just about any organization. If you think your organization isn’t a target or that it doesn’t have anything that cybercriminals want, you’re wrong….

Read More   

Assess Your Network’s Security Status – For Free

CDW’s Threat Check service shows you how well your defenses are holding up against cyberattacks.

By Paul Shelton
|
September 19, 2018
Security, Networking, Services

Cybersecurity professionals have a mixed record of success in dealing with a security landscape that is becoming increasingly complex and dangerous. We’ve done a solid job of protecting the network perimeter — keeping out people who we don’t want to gain access to our networks. But we haven’t done a particularly good job of taking…

Read More   

State and Local Governments Focus on New Security Concerns

IoT, public safety and insider threats draw the most attention as localities beef up protection against cyberattacks.

By Dan Fagan
|
June 28, 2018
Networking, Security

State and local governments host vast amounts of sensitive data — nothing top secret, but information that contains the intimate details of their citizens’ lives: children’s school records, driving records, voter registration information, contacts with police and paramedics, the list goes on. As more communities lean on the internet and the cloud to create efficiencies…

Read More   
Recommended for You

Most Popular
Digital Workspace | Security

Mobile Security Is at the Heart of Modern Device Design

Networking | Security

Fight Social Engineering and Phishing Attacks by Correcting Risky Behaviors and Rewarding User Diligence

Data Center | Security

How to Handle GDPR Data Subject Access Requests

Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2019 CDW. All Rights Reserved