Home Security

Security

No infrastructure is immune from threats. Hear from our experts as they discuss how taking on security with a holistic approach that includes assessments, threat checks, and risk management coupled with the right technology is keeping infrastructures safe and data secure.

When Should You Outsource Cybersecurity for Your Small Business?

As the cyberthreat landscape becomes more complex, many small and medium-sized businesses (SMBs) are weighing their options for protecting their data. And with good reason. Networks are becoming...

5 Questions Nonprofits Need to Ask Their IT Staffs

When it comes to staying on top of trends or navigating an unexpected crisis, the lack of a dedicated IT staff or reduced IT spending can be...

Why Security Is a Concern in Digital Transformation Projects

At Cisco Live 2018, much of the buzz centered on Cisco’s intent-based networking paradigm, which promises to give businesses greater flexibility and efficiency as it transforms data...

MAKING SENSE OF TOMORROW’S CYBERSECURITY TRENDS

In cybersecurity, new threats and vulnerabilities appear at break-neck speed – faster than any one security team or analyst can manage. As new technologies create opportunities to...

SonicWall Capture Cloud Platform Ushers in New Era of Threat Intelligence, Connectivity and Automation

CDW's + SonicWall's mission is to help organizations protect themselves from the growing number of cyber attacks in the fast-moving threat landscape. There are many schools of thought...
CDW Canada - Experts Who Get IT

8 Cyber Security Predictions for 2018

The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from more than 1 million sensors around the world, performs rigorous testing and...

FAKE APPS: Mirror mirror on the wall, which of these apps is real amongst...

What is the difference between a real and fake app? Well, one is legitimate and one is malicious. You would think that this topic would be general...

WAR-DRIVING: Coffee goers beware!

Wardriving is the art of executing a mobile attack surface, by literally being on the move while propagating a wireless attack. You achieve this by creating an...

SMISHING & GREYWARE: Come again?

Let’s talk about some areas of mobile security that fly under the proverbial radar; Smishng & Greyware. These are terms that the 99.99% of users never hear...

FREE APPS: Not as free as you might think!

When searching the app store (on a budget), we come across millions of “free” apps and we are inclined to download them. What is the difference between...

Must Read