Notifications
Notifications
Research everything IT

Refine Your Search

  • Topic
    View Fewer Options
  • Media Type
    View Fewer Options
  • Industry
    View Fewer Options
  • Brand
    View Fewer Options
Showing results for: "security"
1 - 24 of 493
Sort By:
View:
Services
Apr 17, 2024 Services CDW Executive SummIT: How to Cost-Optimize Your Technology Investments
3 min
At this year’s April SummIT, experts gave best practices for overcoming technical debt and optimizing tech investments.
From
Apr 17, 2024 Security CDW Executive SummIT: Navigating the Evolving Threat Landscape
4 min
Threat actors are constantly changing their tactics to include innovative new technology. Cybersecurity teams must do the same to keep their organizations secure and resilient.
From
Security
Apr 15, 2024 Security What’s Best for My Organization: EDR, XDR, SIEM or EUBA?
4 min
Understanding the differences between EDR, MDR, XDR, SIEM and EUBA is crucial for selecting the right tools for your security posture. Here's a breakdown of each and trends you should know about.
From
Security
Apr 15, 2024 Security How To Implement a Holistic School Safety Strategy To Secure K-12 Environments
3 min
Due to devastating incidents of school violence, schools must create a comprehensive plan that addresses all areas of school safety including physical security, cybersecurity, social and emotional learning, and prevention.
From
Security
Apr 15, 2024 Security Thwart SCADA System Cyberthreats
4 min
Dependable SCADA security protects utility infrastructures.
From
Security
Apr 12, 2024 Security 4 Best Practices for Creating Effective Vulnerability Management Programs
5 min
Vulnerability management is a key part of an organization’s cyber resilience strategy — but it includes more than scanning tools. Better protect your data, assets and stakeholders by creating a comprehensive program that extends beyond technology.
From
Security
Apr 08, 2024 Security Why Managed Security Services Are Important in Healthcare
3 min
Learn how managed security services can help healthcare organizations better protect their environment, secure sensitive information and improve security maturity.
From
Services
Apr 03, 2024 Services How Services Drive Digital Transformation in K-12 Without Shredding Budgets
3 min
Here’s how outside partners can help schools easily and quickly accelerate their digital transformation journey.
From
Mar 28, 2024 Security Follow These Best Practices to Improve Cyber Resilience in Healthcare
5 min
Healthcare organizations have intensified their focus on cybersecurity in recent years, but it’s equally important to be prepared to recover from a successful attack.
From
Security
Mar 21, 2024 Security Can You Trust a Third-Party User? No. But You Can Manage Their Lifecycle Access.
5 min
Allowing third parties access to organizational systems means striking a careful balance between enabling collaboration while safeguarding sensitive data and company credentials. To achieve this balance, effective lifecycle management is essential.
From
Security
Mar 08, 2024 Security 5 Considerations for Navigating the Cultural Shift to Zero-Trust Integration
5 min
Successful integration of zero-trust strategies requires a cultural shift at every level of your organization — but it may also lead to internal challenges that cause projects to stall or fail. Keep these considerations in mind during implementation.
From
Digital Workspace
Mar 05, 2024 Digital Workspace How Federal Agencies Can Provide an Optimal Digital Experience
15 min
To optimize the digital experience, agencies must consider the needs of both remote and in-office workers.
From
Security
Feb 22, 2024 Security 3 Strategies to Reinforce Device Security in Higher Education
3 min
Device security continues to be a major concern for IT administrators in colleges and universities. With thousands of devices on the network, you can turn security up a notch with a few strategies to combat modern educational cyberthreats.
From
Security
Feb 21, 2024 Security Building Modern Integrated Cyber Recovery Environments
5 min
New cyber threats have introduced novel challenges that disaster recovery plans alone can no longer account for. Building a cyber recovery environment that ensures business viability following a cyber incident involves a strategic shift in approach.
From
Security
Feb 16, 2024 Security The Top 5 Vulnerabilities Uncovered During Penetration Testing
6 min
Penetration testing experts “attack” your environment by attempting to gain access to systems, networks or permissions that should be inaccessible. Here are some of the most common vulnerabilities we’ve found across organizations during pen testing.
From
Security
Feb 09, 2024 Security FETC 2024: Cybersecurity Must Become a Group Project in K–12
7 min
Mandatory cybersecurity training and data policies can minimize ransomware.
From
Jan 30, 2024 Data Analytics NRF 2024: How RFID is Making Retail Smarter
4 min
Retailers have started to use radio frequency identification tags in a variety of new ways to drive business outcomes.
From
Digital Workspace
Jan 26, 2024 Digital Workspace 3 Questions to Ask Before Migrating Workloads to the Cloud
3 min
Migrating your workload to the cloud is an important step in modern business — and establishing security and governance foundations in advance will help your migration be safe and successful.
From
Security
Jan 25, 2024 Security Outsourcing for School Districts that Hate Outsourcing
4 min
Even the most self-sufficient school districts often turn to cybersecurity partners.
From
Security
Jan 25, 2024 Security How One K–12 School Got Affordable Help Managing Cyberthreats
12 min
In Eden Prairie, Minn., school IT officials found a partner to monitor network traffic, improve phishing awareness and free up internal staffers to support teaching and learning.
From
Security
Jan 22, 2024 Security Evolving the Zero-Trust Security Model for Business
12 min
An effective approach can help organizations get the most out of their zero-trust security initiatives.
From
Dec 19, 2023 Security How CDW Helps MemorialCare Protect Its Valuable Healthcare Data
3 min
By focusing on the basics, this healthcare provider establishes clear visibility into its environment, enabling quick action when a threat is detected.
From
Software
Dec 11, 2023 Software CITE 2023: Optimize Your Education Environment for Data Protection
3 min
Experts from Google and CDW shared best practices for enhancing the security capabilities in Google Workspace for Education domains.
From
Security
Dec 11, 2023 Security What Would Ransomware Cost Your Business?
3 min
To take their security program to the next level, a customer worked with CDW to engage executive leadership during a Ransomware Recovery Workshop.
From
1 - 24 of 493
1
2 ... >