CDW Solutions Blog
Solutions Blog Insights From Experts Who Get IT
  • Topics
    • Cloud (303)
    • Data Center (322)
    • Digital Workspace (461)
    • Networking (261)
    • Security (309)
    • Software (320)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

Exploring the NIST Cybersecurity Framework

This standard describes the five most important steps an organization can take to secure its information systems.

By Mikela Lea
|
June 2, 2020
Security, Services

In my work with CDW customers, I often come across technology leaders who want to improve their cybersecurity posture but aren’t really sure where to start. They might recognize that their organizations need to improve their cybersecurity controls but don’t know where their investments will pay off the most.

When I hear concerns like this, I immediately look to the Cybersecurity Framework (CSF) developed by the National Institute of Standards and Technology (NIST). While there are many different cybersecurity standards out there, I prefer this one because it uses plain language to describe the five most important activities in cybersecurity. I’d like to walk you through this framework using two different examples.

Read More   

Mobile Security Is at the Heart of Modern Device Design

Smartphone vendors are producing devices with increasingly sophisticated defense features.

By Danny Fayne
|
June 5, 2019
Security, Digital Workspace

Today’s smartphones have security features that were practically science fiction just a few years ago. A user with a new device likely has a phone that encrypts data, continuously updates its operating system to ward off threats and allows users to authenticate their identity with biometric factors such as fingerprint and facial recognition.

This is great for users, and it can also be great for the enterprise. By taking advantage of these baked-in security measures, organizations can direct their own efforts toward other security steps and ensure that their growing mobile environments don’t put their networks and data in harm’s way.

Read More   

“Let’s Encrypt”: The Open and Free SSL Certificate Authority

By Jesse Wiener
|
December 18, 2015
Networking, Security

If you’ve ever had the task of requesting and installing a digital certificate on a web server or network device, you’ve probably found it tedious. And maybe you were surprised at the price public certificate authorities charge for their most basic certificates. While any self-signed certificate can provide an identity to set up a secure…

Read More   

Windows 10: Addressing New Data Security Challenges

Don’t let your corporate data fall victim to hacking, insider leaks and negligence

By Drew Shanahan
|
December 15, 2015
Security

What is your data worth? What if it got out into the public or fell into your competitors’ hands? Would it impact your organization or your reputation? What about your customers? How much would it affect your bottom line? 

Read More   

Is Office 365 Security Safe Enough For Your Needs?

By CDW Expert
|
April 29, 2014
Security

As a Solution Architect for CDW Microsoft Services I am often asked “How secure is Microsoft Office 365?” I have also heard concerns of downtime, data not being secure and more. What we rarely hear is how a large number of customers are satisfied with Office 365. In this article, I look to discredit some…

Read More   

What Your Company Can Learn from the Target Breach

By Aaron Colwell
|
January 3, 2014
Security

On December 19th, Target confirmed that there was unauthorized access to payment card data of about 40 million credit and debit cards used in Target stores between November 27th and December 15th. On December 27th, the company confirmed reports that encrypted data containing debit card PIN numbers was also obtained but they maintain that this…

Read More   
  • 1 (current)
  • 2
Most Popular
Digital Workspace | Security

Prioritize These Security Considerations as Users Work from Home More Frequently

Digital Workspace | Services | Software

How to Switch Collaboration Vendors

Cloud | Data Center | Digital Workspace

The Business Benefits of File Modernization

Digital Workspace

8 Things to Consider Prior to Deploying Microsoft Teams

Data Center | Digital Workspace

Overcoming Data Lifecycle Management Hurdles

Recommended for You
Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2021 CDW. All Rights Reserved