CDW Solutions Blog
Solutions Blog Insights From Experts Who Get IT
  • Topics
    • Cloud (317)
    • Data Center (335)
    • Digital Workspace (477)
    • Networking (267)
    • Security (326)
    • Software (337)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

Safety First: Remote Work Security Solutions

The shift to remote work raised the bar for organizations when it comes to maintaining information security.

By Ziyad Roumaya
|
June 23, 2020
Security, Cloud, Digital Workspace, Networking

As organizations across the country have moved to remote work models, many have reported an increase in cyberattacks. Cybercriminals, it seems, are taking advantage of the public health crisis to exploit security vulnerabilities in home-based computer systems. What can organizations do to minimize the chances that their shift to remote work results in an expensive breach? We recommend a multipronged approach that combines the use of security tools and end-user education.

Read More   

Tap Email Gateways, DNS Filters and User Training to Fight Phishing Attacks

These security controls can help you mitigate the threat of cybercriminals exploiting users — the weakest part of any defense.

By Sean Tierney
|
February 21, 2020
Security

As cybersecurity professionals, we work each day to protect against a wide variety of threats. Attackers probe our firewalls with port scans, search out application security flaws and wage other exotic attacks against our systems. While those threats are real, the controls we use to address them don’t touch the No. 1 threat that affects organizations on a daily basis: phishing.

Phishing attacks are nothing new. They’ve certainly increased in sophistication over the past 20 years, but attackers have consistently used them to gain access to systems and information over the years for one good reason: They too often work. Let’s look at three security controls that organizations can put in place today to reduce their risk of falling victim to a phishing attack.

Read More   

How to Avoid a Census Scam: 5 Steps for Protecting Your Organization

Cybercriminals may use the census to exploit your employees, but these steps can help you prepare for upcoming attacks.

By Kyle McGrane
|
January 15, 2020
Security, Services

The decennial U.S. census is about to begin. The work of the census provides crucial information for government agencies, academic researchers and private businesses, but it also opens the door for cybercriminals seeking to exploit the widespread publicity around the census to conduct malicious attacks. We will inevitably witness social engineering attacks from individuals pretending to be associated with the census asking for Social Security numbers, passwords and other sensitive personally identifiable information.

Organizations need to prepare themselves for these inevitable attacks and ensure that their employees don’t fall for scams that accidentally compromise sensitive information.

Read More   

How to Make Office 365 Even More Secure — Part 1

Make these three tweaks to take full advantage of Microsoft’s security capabilities.

By Josh Walters  and Brandon Pierce
|
October 9, 2019
Security, Cloud, Software

Cybersecurity — one word that can inspire many different tactical approaches depending on its definition. If you feel overwhelmed by the idea of defining cybersecurity and developing a plan for its inclusion within your environment, then you’re not alone. Many organizations have started down the path of addressing exposure points, defining red and blue teams,…

Read More   

Fight Social Engineering and Phishing Attacks by Correcting Risky Behaviors and Rewarding User Diligence

The carrot and stick approach makes sense when you understand why email-based attacks are successful.

By Gabriel Whalen
|
August 27, 2019
Security, Networking

I recently spent time speaking with IT leaders at CDW’s Protect SummIT in Philadelphia and heard a common theme: Organizations across the U.S. are incredibly concerned about the threat posed by social engineering attacks. All too often, leaders I speak with tell me that their organizations had recently fallen victim to phishing attacks that requested…

Read More   

4 Best Practices to Get More from Multifactor Authentication Implementation

MFA solutions have evolved, and so should your plan to implement them.

By Paul Shelton
|
August 7, 2019
Security, Digital Workspace

What’s the current state of multifactor authentication in your organization? If you’re like many of my customers, you might think that MFA is old hat — a problem solved years ago that now just requires a little routine maintenance. If that sounds familiar, it’s probably time for you to re-evaluate the role that MFA plays…

Read More   
  • 1 (current)
  • 2
  • 3
Most Popular
Digital Workspace | Security

Prioritize These Security Considerations as Users Work from Home More Frequently

Digital Workspace

8 Things to Consider Prior to Deploying Microsoft Teams

Digital Workspace | Services

Why Adoption Services Are More Important Than Ever

Digital Workspace | Security

Android™ Enterprise Essentials Simplifies Mobile Security for Small and Medium Businesses (SMBs)

Digital Workspace | Security

Overcoming the Cybersecurity Skills Gap with Automation

Recommended for You
Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2021 CDW. All Rights Reserved