Home Security

Security

No infrastructure is immune from threats. Hear from our experts as they discuss how taking on security with a holistic approach that includes assessments, threat checks, and risk management coupled with the right technology is keeping infrastructures safe and data secure.

10 Key Elements of a Robust Mobile Security Policy

As organizations rely more and more on mobile devices, mobile security is a key consideration across many industries. For example, retail staff can use tablets to serve customers...

BTEX 2019: 8 Common Security Challenges in Today’s Threat Environment

Awareness of the threat cyberattacks pose to organizations has grown exponentially in recent years, due to very public attacks on businesses and governments. Each year...

BTEX 2019: Michael “MafiaBoy” Calce Says the Hacker Mindset Has Changed

The attitude and goals of hackers have shifted in recent decades, said Michael “MafiaBoy” Calce in his keynote presentation at CDW Canada’s BTEX 2019. The white hat security...

BTEX 2019: The Landscape Has Changed – Are You Secure?

It used to be that all you needed to secure your enterprise was a strong firewall and good anti-virus software. But the cybersecurity landscape has shifted –...

How to Combat Threats in an Increasingly Complex Security Environment

Security technology is constantly improving, but also becoming more complex, which can lead to gaps and increased cyberattack risk, according to IT analysts. The...

SIMPLE CYBERSECURITY TIPS CANADIAN SHOULD CONSIDER THIS FRAUD PREVENTION MONTH, BY ESET

With Fraud Prevention Month just around the corner, ESET, with the support of CDW, has created quick and easy tips to ensure Canadians are...

Protect your retail organization with comprehensive security from HP

Security is important for all companies, but retail organizations have additional concerns. Retailers are vulnerable to threats posed by high employee turnover, large numbers of...

5 Resolutions for Improving Your IT Security in 2019

Protecting your organization’s key data is more important than ever. Data breaches are on the rise. The past year saw significant public attacks including the exposure of...

Cybersecurity for SMBs: Bundled and Brought to you by SonicWall

If you’re a small- or medium-sized business (SMB), don’t bury your head in the digital sand. Cybercriminals don’t discriminate. Your data, credentials or access could be valuable...

LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group

UEFI rootkits are widely viewed as extremely dangerous tools for implementing cyberattacks, as they are hard to detect and able to survive security measures such as operating...

Must Read