Home Security

Security

No infrastructure is immune from threats. Hear from our experts as they discuss how taking on security with a holistic approach that includes assessments, threat checks, and risk management coupled with the right technology is keeping infrastructures safe and data secure.

How Security Went from a Hurdle to a Selling Point in the Cloud

Today, the world faces an increasingly complex cybersecurity landscape, defined by an unprecedented number of internet-connected devices — the number of which is expected to reach nearly...

Phishing in K–12: How to Avoid Taking the Bait

Cybersecurity is critical to making sure students are safe as they use digital tools. In school systems that provide one-to-one devices to students, phishing is a...

5 Tips for Keeping Your Small Business Secure

While it’s usually the big-name organizations that make the news when they get hit with a cyberattack, Verizon’s 2018 Data Breach Investigation Report found that 58 percent of...

Easier Wi-Fi Planning, Security & Management from the Cloud

Wi-Fi access is ubiquitous, but it’s not always easy to plan, deploy, secure and manage, especially for distributed businesses and enterprises. SonicWall...

How Next-Generation Endpoint Security Solutions Bolster Your Cyberdefences

Anti-virus tools have been a foundational part of cybersecurity programs for years. For many organizations, they’ve been must-have tools to protect against constant malware attacks. But as cybercriminals...

Hackers Don’t Take Holidays – Is Your Organization Ready to Defend?

As people across the country are getting ready for a holiday, cybercriminals are also gearing up for the long weekend. Holidays can be an ideal time for...

How to protect your business against identity theft

As workplaces become more mobile, with employees working remotely from a variety of locations on a variety of devices, identity management is becoming of greater concern for IT....

Modern SaaS Security: How to Secure Email, Data, User Access in the Age of...

SaaS applications have changed the way employees and organizations operate, how an application is purchased and provisioned, and how employees access and use the apps.

BTEX 2019: 3 Steps to Creating an In-depth Cybersecurity Defence

When Michael Tryon, Cisco Canada’s Managing Director of Cybersecurity, began his career in the IT industry more than 20 years ago, security involved locking down the network perimeter....

BTEX 2019: Microsoft on Meeting Today’s Cyber Risk Challenge

With a special guest keynote from Michael “Mafiaboy” Calce, security was top-of-mind with attendees as well as presenters at CDW BTEX 2019. But the security landscape has...

Must Read