CDW Solutions Blog
Solutions Blog Insights From Experts Who Get IT
  • Topics
    • Cloud (308)
    • Data Center (330)
    • Digital Workspace (470)
    • Networking (263)
    • Security (318)
    • Software (327)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

4 Security Trends to Watch in a Post-Pandemic World

These technologies can help your organization protect data in a computing landscape that has shifted massively over the past year.

By Michael Lane
|
February 22, 2021
Security

The COVID-19 pandemic suddenly transformed the way that we all work. Businesses around the world found themselves rapidly shifting to a remote work environment that required agile reconfiguration of systems and shifts in security policy. Cybersecurity teams scrambled to protect the confidentiality, integrity and availability of the data entrusted to their care while accommodating unprecedented remote work requirements.

Now that organizations have settled into these new work routines, it’s time to take a look at how these changes will shape future trends in the way that we work and how security teams can build controls that both facilitate remote work and foster a defense-in-depth approach to cybersecurity.

Let’s look at four major cybersecurity trends that will endure beyond the pandemic.

Read More   

Common Threats Uncovered During CDW Security Assessments

Mitigating these risks can help you significantly improve your organization’s cybersecurity posture.

By Mikela Lea
|
November 19, 2020
Security, Services

As part of CDW’s cybersecurity team, I often have the opportunity to visit with our customers and help them identify gaps in their security programs. CDW offers a variety of security assessments that help organizations shore up their cybersecurity weaknesses.

I’ve performed dozens of these assessments, which provides me with a unique vantage point on the state of cybersecurity across different industries and organizations of various sizes. With that perspective, I’ve seen four common threats that continue to pose significant risk to cybersecurity programs.

Read More   

Remote Security Solutions for Small Organizations

With many staff now working from home, it is a good time to reconsider how to best protect your organization’s users and data.

By Drew Shumate
|
June 16, 2020
Security, Cloud, Services, Software

The global pandemic and social distancing measures have redefined the office for many people. Industries that never would have considered allowing their office employees to work from home were forced to rethink decades of business as usual.

This change has also brought new technology needs. Since these businesses had built technology infrastructures that relied on traditional network and application architecture, a shift had to occur. Suddenly, IT departments were dealing with overloaded VPNs or having to deploy a VPN that they never had to maintain before. Compound that with the fact that users are now accessing company resources from networks or assets that corporate IT has no control over, that most home routers are still vulnerable to exploitation and that, in many cases, the network gates were flung open in the name of productivity ― it’s enough to give any CISO an ulcer.

So how can companies mitigate these risks? Now that everyone is settling into a routine and we’re adjusting to this “new normal,” it’s an ideal time to reach out to your users and talk about security.

Read More   

How to Make Office 365 Even More Secure — Part 1

Make these three tweaks to take full advantage of Microsoft’s security capabilities.

By Josh Walters  and Brandon Pierce
|
October 9, 2019
Security, Cloud, Software

Cybersecurity — one word that can inspire many different tactical approaches depending on its definition. If you feel overwhelmed by the idea of defining cybersecurity and developing a plan for its inclusion within your environment, then you’re not alone. Many organizations have started down the path of addressing exposure points, defining red and blue teams,…

Read More   

4 Best Practices to Get More from Multifactor Authentication Implementation

MFA solutions have evolved, and so should your plan to implement them.

By Paul Shelton
|
August 7, 2019
Security, Digital Workspace

What’s the current state of multifactor authentication in your organization? If you’re like many of my customers, you might think that MFA is old hat — a problem solved years ago that now just requires a little routine maintenance. If that sounds familiar, it’s probably time for you to re-evaluate the role that MFA plays…

Read More   
Most Popular
Digital Workspace | Security

Prioritize These Security Considerations as Users Work from Home More Frequently

Digital Workspace

8 Things to Consider Prior to Deploying Microsoft Teams

Digital Workspace | Services

How to Enable Remote Work for a Contact Center

Cloud | Digital Workspace

Avaya Cloud Office Serves Up Collaboration Solutions

Cloud | Digital Workspace

How Cisco Webex Interop Connects with Microsoft Teams

Recommended for You
Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2021 CDW. All Rights Reserved