Malware is an “Everyone” Problem
I’ve seen many instances of our customers struggling with viruses and malware-related challenges over my past 15 years of working in the IT security arena. However, no more so than now has malware...
View ArticleIs Your Network Under Attack?
Do you have malware on your network? What about remote access tools? Are machines on your network connecting to a botnet? What about users visiting malicious web site? How do you even know? Odds are...
View ArticleConsider a Third-Party Threat Assessment to Bolster Cybersecurity
In my 15 years of experience in consulting with customers on their security strategy, one thing is abundantly clear, security is tricky. No matter whom we work with, they have questions and concerns...
View ArticleSophos and the Heartbeat of Information Security
A business hires two security guards to protect the premises. The first guard patrols the perimeter while the second protects the lobby. Late one night, the guard patrolling the perimeter discovers a...
View ArticleA Proactive Approach to Cyber Attack Prevention
With 1,500 network security reviews under our belts using CDW Threat Check, we’ve learned a few things about how organizations can close up security loopholes. By offering this complimentary Threat...
View ArticleCybersecurity at CDW
At CDW, we focus on managing risk by protecting the confidentiality, availability and integrity of our information assets. We accomplish that with a three-pronged approach: People: Information...
View Article7 Action Steps for Combating WannaCry Ransomware
The WannaCry ransomware attack has been big news since Friday, May 12, 2017, and organizations are scurrying to understand and mitigate the risk from this attack. The following is a very quick summary...
View ArticleBack to Basics with WannaCry (and Other Threats)
A global cyberattack labeled WannaCry surprised and impacted users across the globe last Friday. This latest version of ransomware has already infected more than 300,000 information systems across 150...
View ArticleWhat Is Emotet Malware and How Can You Protect Your Organization From It?
In April, the Center for Internet Security announced that Emotet arrived in the U.S. This malware represents a serious threat. It has largely targeted financial organizations in Europe, but other...
View ArticleCommon Security Issues We’ve Spotted Over the Past Year of CDW Threat Checks
CDW’s security engineers have conducted Threat Check security assessments for more than 500 organizations since launching the third version of this service one year ago. During a Threat Check,...
View ArticleSecurity Logging and Incident Response: A Tale of Two Customers
In my role as the technical lead for CDW’s incident response practice, I spend much of my time working with organizations in the midst of battling a security incident. I’ve observed that the...
View ArticleChoosing a Next-Generation Endpoint Protection Platform
Endpoints are on the front lines of every cybersecurity program. Laptops, smartphones, tablets and other end-user devices travel around the world, connecting to a variety of networks with varying...
View ArticleGetting to Know Cisco SD-WAN: Vendor Overview Series
Over the past few months I’ve spent a lot of time working with and researching some of the top software-defined WAN vendors in the market to continue developing CDW’s Professional Services. In this...
View ArticleSafety First: Remote Work Security Solutions
As organizations across the country have moved to remote work models, many have reported an increase in cyberattacks. Cybercriminals, it seems, are taking advantage of the public health crisis to...
View Article
More Pages to Explore .....