CDW Solutions Blog
Solutions Blog Insights From Experts Who Get IT
  • Topics
    • Cloud (308)
    • Data Center (330)
    • Digital Workspace (470)
    • Networking (263)
    • Security (318)
    • Software (327)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

4 Security Trends to Watch in a Post-Pandemic World

These technologies can help your organization protect data in a computing landscape that has shifted massively over the past year.

By Michael Lane
|
February 22, 2021
Security

The COVID-19 pandemic suddenly transformed the way that we all work. Businesses around the world found themselves rapidly shifting to a remote work environment that required agile reconfiguration of systems and shifts in security policy. Cybersecurity teams scrambled to protect the confidentiality, integrity and availability of the data entrusted to their care while accommodating unprecedented remote work requirements.

Now that organizations have settled into these new work routines, it’s time to take a look at how these changes will shape future trends in the way that we work and how security teams can build controls that both facilitate remote work and foster a defense-in-depth approach to cybersecurity.

Let’s look at four major cybersecurity trends that will endure beyond the pandemic.

Read More   

Tackling the Microsoft Windows Zerologon Vulnerability

Knowing how to patch this security threat will help keep your Microsoft domain secure.

By Ben Mason
|
October 27, 2020
Security

Zerologon is the name given to a security vulnerability found in Microsoft Windows domain controllers by Secura. It is an unauthenticated privilege escalation vulnerability in the Netlogon Remote Protocol (MS-NRPC). An attacker can leverage this flaw to gain administrative access to a Windows domain.

This vulnerability was assigned CVE number CVE-2020-1472 and rated critical. A Zerologon vulnerability that was patched by Microsoft in August has been making the news lately as proof of concept exploits have started to appear in the wild. In this post, I will discuss in more detail what this vulnerability is and how you can defend against it.

Read More   

How ServiceNow Can Improve Your Information Security

There’s a whole other side to the popular service management platform, and many organizations aren’t taking advantage of it.

By Brian Huber
|
August 31, 2020
Security, Services

A lot of attention gets paid in the press to “zero-day” threats — attacks that wreak havoc on organizations while they’re still completely unknown to the cybersecurity community. But the truth is that 60 percent of breaches are the result of known vulnerabilities that have been left unpatched.

The problem is that patching practices in many organizations are slow and disorganized. Too many teams are in charge of patching too many different systems, and security leaders typically lack visibility into who is staying on top of patching and who isn’t. The good news is that many organizations already have a powerful tool to help streamline vulnerability management — the service management platform ServiceNow. Although some organizations use the platform primarily to manage help desk tickets, it’s capable of much more. The solution can also help organizations shore up vulnerabilities across their IT environments.

Here’s how.

Read More   

6 Essential Security Considerations for the ‘New Normal’

As remote work becomes the norm, these practices can help organizations overcome new challenges.

By Mikela Lea
|
June 30, 2020
Security, Services

Recent events turned our working lives upside down. With very little notice, millions of people around the world were sent home from their offices to suddenly adopt a remote work lifestyle. Four months into this adventure, most knowledge workers have adapted to working styles that replace conference rooms with video meetings and coffee chats with virtual happy hours.

I believe that we’ve arrived at a new normal where remote work will become a standard arrangement for knowledge workers. Both companies and employees will benefit from this approach. While employees can better balance their lives, companies will be able to reduce overhead expenses by consolidating and eliminating expensive physical offices. This work style comes with new cybersecurity considerations, and I urge organizations to adopt six key practices to adapt to our new working patterns.

Read More   

Remote Security Solutions for Small Organizations

With many staff now working from home, it is a good time to reconsider how to best protect your organization’s users and data.

By Drew Shumate
|
June 16, 2020
Security, Cloud, Services, Software

The global pandemic and social distancing measures have redefined the office for many people. Industries that never would have considered allowing their office employees to work from home were forced to rethink decades of business as usual.

This change has also brought new technology needs. Since these businesses had built technology infrastructures that relied on traditional network and application architecture, a shift had to occur. Suddenly, IT departments were dealing with overloaded VPNs or having to deploy a VPN that they never had to maintain before. Compound that with the fact that users are now accessing company resources from networks or assets that corporate IT has no control over, that most home routers are still vulnerable to exploitation and that, in many cases, the network gates were flung open in the name of productivity ― it’s enough to give any CISO an ulcer.

So how can companies mitigate these risks? Now that everyone is settling into a routine and we’re adjusting to this “new normal,” it’s an ideal time to reach out to your users and talk about security.

Read More   

Security Threat: Apache Struts 2.3.35 Security Vulnerability

With another flaw to patch in this open-source application, security teams need to remain vigilant.

By Ben Mason
|
October 24, 2018
Security, Software
Read More   
  • 1 (current)
  • 2
Most Popular
Digital Workspace | Security

Prioritize These Security Considerations as Users Work from Home More Frequently

Digital Workspace

8 Things to Consider Prior to Deploying Microsoft Teams

Digital Workspace | Services

How to Enable Remote Work for a Contact Center

Cloud | Digital Workspace

Avaya Cloud Office Serves Up Collaboration Solutions

Cloud | Digital Workspace

How Cisco Webex Interop Connects with Microsoft Teams

Recommended for You
Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2021 CDW. All Rights Reserved