Research everything IT
Refine Your Search
1 - 24 of 287
Jul 20, 2020 Security The 3 Main Types of Cyberattacks & How to Prevent Them
Learn about common types of cyberattacks along with some examples and tips on preventing them. Here's what you need to know.
Nov 17, 2023 Security 5 Things Company Leaders Need to Know if They’re Breached
The best time to make decisions about cyber incident response is before an attack ever takes place.
Nov 03, 2023 Security Staying One Step Ahead of Cyber Threats With a Cybersecurity Risk Assessment
Cyber threats loom large for us all — but a cybersecurity risk assessment can help quantify cyber risks across your organization and enable data-driven decisions about risk prioritization and resource allocation to prevent negative outcomes.
Oct 26, 2023 Security Why Physical Security and Cybersecurity Work So Well Together
Today’s security leaders can’t rely on just a lock and key anymore. Integrating cybersecurity can provide 360-degree insight.
Oct 23, 2023 Security EDUCAUSE 2023: Redefining Data Protection in Higher Ed
Partnerships such as the one between CDW, Commvault and the University of Illinois Chicago are helping higher education institutions build comprehensive data protection plans in an era of increasing data sprawl.
Oct 19, 2023 Security Can a Sound Cyber Resilience Strategy Help Ensure Business Continuity?
Cyber threats today are more complex — and damaging — than ever. To ensure business continuity during and after an incident, your organization needs a focused cyber resilience and cyber recovery strategy tailored to your business requirements.
Oct 09, 2023 Security How Can Operational Technology Assessments Help Bridge the IoT Divide?
Connecting IoT assets to enterprise management systems can bring a myriad of new capabilities — and with it, new risks. An OT assessment can help manage the convergence of Information Technology (IT) and Operational Technology (OT) networks.
Oct 03, 2023 Security 4 Benefits of Consolidating with Secure Access Service Edge
Moving to a SASE platform can reduce security management burdens, minimize vulnerabilities, cut costs and improve the user experience.
Sep 29, 2023 Security Protecting Against Threats to GenAI Models: What CISOs Need to Know
In product development, Generative AI models (GenAI) bring transformative capabilities in content generation, creative design tools and more — but with it, there are potential security risks that IT leaders, especially CISOs, must be aware of.
Sep 29, 2023 Security Fend Off Ransomware with a Cybersecurity Recovery Program
As healthcare organizations continue to take advantage of digital transformation and modernization, cybersecurity intrusions and ransomware attacks continue to skyrocket.
Sep 22, 2023 Security 5 Key Takeaways From CISA's Zero Trust Guidance 2.0
The Cybersecurity and Infrastructure Security Agency (CISA) recently updated their guidance on zero-trust maturity in April of this year, shedding new light on the importance of zero trust in today’s expanding threat landscape. Here’s what to know.
Sep 19, 2023 Security Time To Break Down Silos To Help Promote Security Measures in K-12 Schools
Security approaches K-12 schools can take to help ensure their students are safe learning at home or at their desks in the classroom.
Sep 15, 2023 Security Important Security Considerations for Embracing AI
As artificial intelligence (AI) continues to rapidly disrupt existing technology and industries of all types, it is important for businesses to consider the security risks before welcoming new AI tools and technology with open arms.
Sep 06, 2023 Security Unlock the Transformative Power of Your Surveillance System with Video Analytics
Even with a cutting-edge surveillance system in place, organizations that aren’t using video analytics powered by AI and ML to gain valuable business insights may be underutilizing the capabilities of the video technology they’ve already installed.
Aug 25, 2023 Security How Can Federal Agencies Modernize to Protect Against Cybersecurity Threats
CDW·G can help your organization achieve mission success.
Aug 17, 2023 Security Top 3 Reasons to Modernize Your IAM Program
Organizations relying on legacy Identity and Access Management (IAM) programs may be missing out on critical opportunities to achieve crucial security objectives while consolidating platforms, streamlining resource management and optimizing costs.
Jun 30, 2023 Security Navigating the Road to Cyber Liability Insurance
The frequency of cyberattacks have made cyber liability insurance more challenging and costly to procure than ever. As requirements become more stringent, it’s important to consider the kind of coverage your business needs before you invest.
Jun 26, 2023 Security How a Managed Security Service Provider Can Support Your Organizational Needs
Finding a partner that can work within your environment greatly improves your defense against threats.
Jun 30, 2023 Security Strengthen Supply Chain Resilience with Third-Party Risk Management Strategies
Organizations that outsource critical processes must consider several emerging threats or risk unintended consequences. Robust third-party risk management (TPRM) programs that gauge third-party risks have become an essential piece of the puzzle.
Jun 16, 2023 Security Top 3 Considerations in Securing Remote Access for Users and Customers
Remote access has enabled users to connect to organizational networks from anywhere. But this increased access has also led to increased security risks. What should organizations keep in mind when securing remote access for users and customers?