Research everything IT
1 - 24 of 287
Sort By:
View:
Jul 20, 2020
Security
The 3 Main Types of Cyberattacks & How to Prevent Them
Use Case
13 min
Learn about common types of cyberattacks along with some examples and tips on preventing them. Here's what you need to know.
Nov 17, 2023
Security
5 Things Company Leaders Need to Know if They’re Breached
Article
3 min
The best time to make decisions about cyber incident response is before an attack ever takes place.
Nov 06, 2023
Security
Access the Power of Managed Security Services
Article
3 min
Discover how managed security services can revolutionize IT departments. Uncover the benefits, challenges and CDW’s expertise in this transformative landscape.
Nov 03, 2023
Security
Staying One Step Ahead of Cyber Threats With a Cybersecurity Risk Assessment
Article
5 min
Cyber threats loom large for us all — but a cybersecurity risk assessment can help quantify cyber risks across your organization and enable data-driven decisions about risk prioritization and resource allocation to prevent negative outcomes.
Oct 26, 2023
Security
Why Physical Security and Cybersecurity Work So Well Together
Article
3 min
Today’s security leaders can’t rely on just a lock and key anymore. Integrating cybersecurity can provide 360-degree insight.
Oct 23, 2023
Security
EDUCAUSE 2023: Redefining Data Protection in Higher Ed
Video
5 min
Partnerships such as the one between CDW, Commvault and the University of Illinois Chicago are helping higher education institutions build comprehensive data protection plans in an era of increasing data sprawl.
Oct 19, 2023
Security
Can a Sound Cyber Resilience Strategy Help Ensure Business Continuity?
Article
6 min
Cyber threats today are more complex — and damaging — than ever. To ensure business continuity during and after an incident, your organization needs a focused cyber resilience and cyber recovery strategy tailored to your business requirements.
Oct 18, 2023
Security
Securing SCADA Networks in the Digital Age
Article
4 min
As organizations connect their operational technology to their IT networks, they must take proactive steps to stay safe in a constantly evolving threat landscape.
Oct 11, 2023
Security
3 Strategies to Combat Cyber Risk
Article
3 min
At the CDW Executive SummIT in September, experts shared what “cyber risk management 2.0” entails and how IT leaders can prepare for it.
Oct 09, 2023
Security
How Can Operational Technology Assessments Help Bridge the IoT Divide?
Article
5 min
Connecting IoT assets to enterprise management systems can bring a myriad of new capabilities — and with it, new risks. An OT assessment can help manage the convergence of Information Technology (IT) and Operational Technology (OT) networks.
Oct 03, 2023
Security
4 Benefits of Consolidating with Secure Access Service Edge
Article
3 min
Moving to a SASE platform can reduce security management burdens, minimize vulnerabilities, cut costs and improve the user experience.
Sep 29, 2023
Security
Protecting Against Threats to GenAI Models: What CISOs Need to Know
Article
5 min
In product development, Generative AI models (GenAI) bring transformative capabilities in content generation, creative design tools and more — but with it, there are potential security risks that IT leaders, especially CISOs, must be aware of.
Sep 19, 2023
Security
Top 3 Risks of BYOD Policies for Higher Education
Article
3 min
Higher education institutions must be ready for the risks that BYOD policies create.
Sep 29, 2023
Security
Fend Off Ransomware with a Cybersecurity Recovery Program
Article
6 min
As healthcare organizations continue to take advantage of digital transformation and modernization, cybersecurity intrusions and ransomware attacks continue to skyrocket.
Sep 22, 2023
Security
5 Key Takeaways From CISA's Zero Trust Guidance 2.0
Article
6 min
The Cybersecurity and Infrastructure Security Agency (CISA) recently updated their guidance on zero-trust maturity in April of this year, shedding new light on the importance of zero trust in today’s expanding threat landscape. Here’s what to know.
Sep 19, 2023
Security
Time To Break Down Silos To Help Promote Security Measures in K-12 Schools
Article
3 min
Security approaches K-12 schools can take to help ensure their students are safe learning at home or at their desks in the classroom.
Sep 15, 2023
Security
Important Security Considerations for Embracing AI
Article
5 min
As artificial intelligence (AI) continues to rapidly disrupt existing technology and industries of all types, it is important for businesses to consider the security risks before welcoming new AI tools and technology with open arms.
Sep 06, 2023
Security
Unlock the Transformative Power of Your Surveillance System with Video Analytics
Article
5 min
Even with a cutting-edge surveillance system in place, organizations that aren’t using video analytics powered by AI and ML to gain valuable business insights may be underutilizing the capabilities of the video technology they’ve already installed.
Aug 25, 2023
Security
How Can Federal Agencies Modernize to Protect Against Cybersecurity Threats
Article
3 min
CDW·G can help your organization achieve mission success.
Aug 17, 2023
Security
Top 3 Reasons to Modernize Your IAM Program
Article
4 min
Organizations relying on legacy Identity and Access Management (IAM) programs may be missing out on critical opportunities to achieve crucial security objectives while consolidating platforms, streamlining resource management and optimizing costs.
Jun 30, 2023
Security
Navigating the Road to Cyber Liability Insurance
Article
4 min
The frequency of cyberattacks have made cyber liability insurance more challenging and costly to procure than ever. As requirements become more stringent, it’s important to consider the kind of coverage your business needs before you invest.
Jun 26, 2023
Security
How a Managed Security Service Provider Can Support Your Organizational Needs
Article
3 min
Finding a partner that can work within your environment greatly improves your defense against threats.
Jun 30, 2023
Security
Strengthen Supply Chain Resilience with Third-Party Risk Management Strategies
Article
5 min
Organizations that outsource critical processes must consider several emerging threats or risk unintended consequences. Robust third-party risk management (TPRM) programs that gauge third-party risks have become an essential piece of the puzzle.
Jun 16, 2023
Security
Top 3 Considerations in Securing Remote Access for Users and Customers
Article
4 min
Remote access has enabled users to connect to organizational networks from anywhere. But this increased access has also led to increased security risks. What should organizations keep in mind when securing remote access for users and customers?