Home Security

Security

No infrastructure is immune from threats. Hear from our experts as they discuss how taking on security with a holistic approach that includes assessments, threat checks, and risk management coupled with the right technology is keeping infrastructures safe and data secure.

Easier Wi-Fi Planning, Security & Management from the Cloud

Wi-Fi access is ubiquitous, but it’s not always easy to plan, deploy, secure and manage, especially for distributed businesses and enterprises. SonicWall...

How Next-Generation Endpoint Security Solutions Bolster Your Cyberdefences

Anti-virus tools have been a foundational part of cybersecurity programs for years. For many organizations, they’ve been must-have tools to protect against constant malware attacks. But as cybercriminals...

Hackers Don’t Take Holidays – Is Your Organization Ready to Defend?

As people across the country are getting ready for a holiday, cybercriminals are also gearing up for the long weekend. Holidays can be an ideal time for...

How to protect your business against identity theft

As workplaces become more mobile, with employees working remotely from a variety of locations on a variety of devices, identity management is becoming of greater concern for IT....

Modern SaaS Security: How to Secure Email, Data, User Access in the Age of...

SaaS applications have changed the way employees and organizations operate, how an application is purchased and provisioned, and how employees access and use the apps.

BTEX 2019: 3 Steps to Creating an In-depth Cybersecurity Defence

When Michael Tryon, Cisco Canada’s Managing Director of Cybersecurity, began his career in the IT industry more than 20 years ago, security involved locking down the network perimeter....

BTEX 2019: Microsoft on Meeting Today’s Cyber Risk Challenge

With a special guest keynote from Michael “Mafiaboy” Calce, security was top-of-mind with attendees as well as presenters at CDW BTEX 2019. But the security landscape has...

10 Key Elements of a Robust Mobile Security Policy

As organizations rely more and more on mobile devices, mobile security is a key consideration across many industries. For example, retail staff can use tablets to serve customers...

BTEX 2019: 8 Common Security Challenges in Today’s Threat Environment

Awareness of the threat cyberattacks pose to organizations has grown exponentially in recent years, due to very public attacks on businesses and governments. Each year...

BTEX 2019: Michael “MafiaBoy” Calce Says the Hacker Mindset Has Changed

The attitude and goals of hackers have shifted in recent decades, said Michael “MafiaBoy” Calce in his keynote presentation at CDW Canada’s BTEX 2019. The white hat security...

Must Read