CDW Solutions Blog
Solutions Blog Insights From Experts Who Get IT
  • Topics
    • Cloud (302)
    • Data Center (322)
    • Digital Workspace (460)
    • Networking (260)
    • Security (308)
    • Software (320)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

4 Easy Ways to Protect Yourself Against Email Phishing Attacks

Email threats such as spear-phishing trick users, but simple measures can improve your defenses.

By Gabriel Whalen
|
September 13, 2019
Security

It’s no secret that email is one of the most common ways that attackers gain a foothold on an organization’s network. Targeted spear-phishing campaigns use carefully designed messages that combine a sophisticated look and feel with appealing content to trick users into clicking on malicious messages. Awareness campaigns have their place, but the practical reality…

Read More   

4 Best Practices to Get More from Multifactor Authentication Implementation

MFA solutions have evolved, and so should your plan to implement them.

By Paul Shelton
|
August 7, 2019
Security, Digital Workspace

What’s the current state of multifactor authentication in your organization? If you’re like many of my customers, you might think that MFA is old hat — a problem solved years ago that now just requires a little routine maintenance. If that sounds familiar, it’s probably time for you to re-evaluate the role that MFA plays…

Read More   

Securing Your Organization Against WPA Vulnerabilities — Part 3

A few changes to how you secure your PSKs will go a long way toward protecting your network.

By Colin Vallance
|
October 18, 2018
Security, Networking

In Part 1 and Part 2 of my blog series, I shared some insights into how attackers continue to exploit the weaknesses of WPA and the tools and techniques they are using to gain access to poorly secured networks. In the last post of the series, I will offer some suggestions for how organizations can…

Read More   

Securing Your Organization Against WPA Vulnerabilities — Part 2

Knowing the basic tools and techniques that attackers use will help you defend your network.

By Colin Vallance
|
October 12, 2018
Security, Networking

In my first blog post on securing against Wi-Fi Protected Access vulnerabilities, I talked about the fact that attacks are still being developed to take advantage of weaknesses found in WPA/WPA2, which are known and have been around for a while. This post continues that discussion, getting into how exactly most attacks are carried out…

Read More   

Securing Your Organization Against WPA Vulnerabilities — Part 1

New attacks continue to take advantage of Wi-Fi Protected Access weaknesses, so don’t let down your guard.

By Colin Vallance
|
October 4, 2018
Security, Networking

In early August this year, the folks behind the Hashcat password cracking tool posted a thread on a new attack against Wi-Fi Protected Access (WPA/WPA2) using the Pairwise Master Key Identification technique. The attack differs from the traditional WPA/WPA2 attack vector in that it does not require the capture of a full Extensible Authentication Protocol…

Read More   

Effective Authentication Is a Human Problem, Not Just a Technology Problem

Passwords remain a challenge because IT teams have no easy solutions to replace them.

By Paul Shelton
|
March 8, 2018
Security, Data Center

The intense interest in cybersecurity among IT professionals reflects its growing importance to just about every organization in every industry. I talked with many people who attended the CDW SummIT on Managing Risk in Las Vegas last month, and I was really impressed with the number of attendees and their level of engagement. One of…

Read More   
  • 1 (current)
  • 2
Most Popular
Digital Workspace | Security

Prioritize These Security Considerations as Users Work from Home More Frequently

Digital Workspace | Services | Software

How to Switch Collaboration Vendors

Cloud | Data Center | Digital Workspace

The Business Benefits of File Modernization

Data Center | Digital Workspace

Overcoming Data Lifecycle Management Hurdles

Digital Workspace

8 Things to Consider Prior to Deploying Microsoft Teams

Recommended for You
Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2021 CDW. All Rights Reserved