Tech DataSecurity

The Business of Compliance: NIST 800-171 and DFARS

December 1, 2017    |   Laura Vanassche    |   Security, Compliance, Government

Non-compliance with NIST 800-171 for government contractors can mean contract termination, criminal fraud or breach of contract. If your sub-contract work and the third-party isn’t compliant, you’re also liable. The Dec. 31, 2017, deadline is approaching to comply with NIST 800-171 as mandated in the Defense Federal Acquisition Regulation Supplement (DFARS).


Holiday Shopping Tips to Keep Customers Safe From Fraudulent Activities

November 27, 2017    |   Jennifer Ohlsen    |   holiday, security

With the holiday shopping season fast approaching, especially Black Friday, it’s time to refresh our memories on how to keep your customers safe from fraudulent activities.


3 Practical Steps for Reducing Your Unknown Endpoint Security Vulnerabilities

November 1, 2017    |   Joshua Hickok    |   Security, endpoint security, vulnerability, business risk

Every organization has a certain amount of acceptable and unacceptable security risk. Nearly every company accepts the level of risk entailed by granting their employees access to company data needed to perform their job. For example, running reports on your customer base might require access to a database of all your customers.


4 Enablement Tools to Accelerate Your Security Practice

October 30, 2017    |   Tracy Holtz    |   Security, Cybersecurity, enablement tools, focus month


In honor of National Cybersecurity Awareness Month (observed every October), Tech Data is bringing awareness to employees this week to educate and evangelize cybersecurity best practices. Cybersecurity is not one person’s job. It takes each person to be aware of risks and behavior that can expose personal and/or company information. The issue of cybersecurity gets even more personal with the recent news around the Equifax data breach, where an estimated 143 million U.S. records were compromised.

As the IT expert for your clients, you need to keep abreast of the latest trends and threats. It’s also your job to educate users about potential security risks. Here are tools to help you stay on top of the latest security threats as you accelerate your security practice:


Many vendors have blogs and publish articles relating to security threats. In addition to the Tech Data Authority blog, here are a few articles I recommend:

Great consumer content to share on your social media networks (text, images and campaigns are available for you to use):


Assessments are an excellent tool for understanding your current or prospective customers’ security posture, developing a strategy and execution. Most security vendors offer security assessments. Tech Data also has complimentary security assessments which align to key vertical market segments (retail, healthcare, public sector and education) in addition to external pen testing and security posture assessments. Regular assessments help organizations uncover evidence of an actual compromise, formulate a stronger security strategy and help obtain incremental funding for future security budgets. To understand best practices when implementing security audits, check out this article.

Consider including the security audit process in the discovery phase for prospective clients. When having quarterly business reviews, go back to the initial audit to ensure your future IT plans address any vulnerabilities discovered to continue reducing the risk of a breach.

Professional Services

Adding professional services to your offering, whether sourced from a third party or your own department, can help boost your profits and increase customer loyalty. As a Tech Data partner, you have access to pre-sales consulting, solutions design/architecture, and cybersecurity professional services including pen testing.

Managed Security Services

Adding managed services to your current MSP offering is another great way to boost profits and add value to customers. By partnering with Tech Data, we offer two routes to market allowing you to accelerate your MSP practice by offering cybersecurity and through monitoring endpoints, network firewalls and security posture. Identifying where patches need to be updated and tackling existing threats within your customer’s network are two critical steps to ensuring a healthy, secure IT environment.  


GDPR: What Does It Mean and Who Will It Impact?

October 27, 2017    |   Amber Langdon    |   Security, GDPR, regulations



A Channel Response to the Equifax Breach

October 16, 2017    |   Alex Ryals    |   Security, Security Vulnerabilities, Security Assessment

Most likely you have already heard the devastating news of the cyber-attack against Equifax in mid-May.  Although the world didn’t find out about the breach until mid-September, the impact to individuals was tremendous with the exfiltration of names, addresses, SSNs and birth dates for over 145.5M people. However, despite all the media coverage, reports that only about 61 million Americans—just over a quarter of all consumers—checked their credit score or credit report in the two weeks following the breach. In other words, the majority of Americas are doing very little to protect themselves despite the clear warnings as a result of this catastrophic incident.


3 Ways to Improve Industrial Cybersecurity

October 6, 2017    |   Christopher Parisi    |   Cybersecurity, industrial

A whole new Cybersecurity sector that deals with automation vulnerabilities has emerged due to the industry’s demand to streamline production of goods, monitor industrial services and the ability to create highly-refined processes to increase the efficiency of the industry.


The 4-Step Cybersecurity Framework Process: What It Is and How You Can Leverage It to Grow Your Security Practice

September 25, 2017    |   Marshall Hall    |   Security, Cybersecurity

Cybersecurity is discussed at such a high level that there typically isn’t a clear roadmap for businesses to follow to secure their workplace. Most companies are aware of the need to address security concerns, but taking concise actions to mitigate risk can seem overwhelming. What's missing in the cybersecurity discussion is a clear, holistic identification of the risks and actionable steps that can be taken to mitigate these risks. 


The Economics of Cybersecurity: 10 Ways to Tell if Your Company Is Operating Below the Security Poverty Line

September 1, 2017    |   Christopher Parisi    |   Security, Cybersecurity, economics

The term “The Security Poverty Line,” has been used as early as 2011. The concept is becoming more and more of a conversation point when talking with information security professionals, especially those who have very limited budgets due to the size of the business or C-Level executives who don’t have ownership responsibility of the data that’s in their possession. Companies that must meet government regulatory compliance metrics often find themselves “security poor” and unable to afford the security they need to pass compliance requirements. These requirements may be satisfied through certain security upgrades or policies, but security professional must remember that compliant and secure aren’t necessarily synonymous.


4 Easy Ways to Increase Your IT Security Customer Base

August 25, 2017    |   Laura Vanassche    |   Cybersecurity, lead generation, resellerCONNECT, IT marketing

Cybersecurity is big business – companies need your services and expertise now more than ever. Sure, new prospects are contacting you, but typically the majority of new clients seek out cybersecurity experts after they’ve fallen victim to a breach. Proactively finding and acquiring new leads doesn’t have to be costly and challenging. Here are four easy ways to expand your client base.