<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=522217871302542&amp;ev=PageView&amp;noscript=1">

Tech DataSecurity

5 Overlooked Security Tasks

February 16, 2018    |   Christopher Parisi    |   Cybersecurity, shadow it, zero-day, Tech Data Security

Security engineers spend countless hours tightening the perimeter of their network, purchasing appliances, virus protection and sandbox services to combat the latest
zero-day warnings. Then the one day they think they have it all under control, the unthinkable happens – a breach in the network. The team manages to gain control, closes the gap and remediates the issues. When the disaster recovery plan has been completed and the summary report is due, the source of the invasion was something that was simply overlooked. All the planning, hardware, BMP and employee training was subverted by an issue that deserves the hardest face-palm.  


Reining in Shadow IT: Why Does It Happen and How Can You Protect Your Customer?

February 9, 2018    |   Danny Smith    |   IT Security, security, shadow it

“Shadow IT” sounds like something sinister or rebellious, but that’s not really the case. Shadow IT refers to employees accessing outside software or tools on their own without going through the company’s of­ficial IT infrastructure and processes. However, it can cause serious issues for companies and individuals.


4 Identity Management Challenges to Conquer

February 7, 2018    |   Tech Data    |   Security, identity management, authentication

Identity management plays an important part in our everyday lives. It uses all the different pieces of information we have about our users and systems to grant access to tools, functions, software or devices.


What Digital Transformation Means to Me - An Americas Perspective

January 25, 2018    |   Tech Data    |   Security, Cybersecurity, Internet of Things (IoT), enterprise mobility

Blog Image (1)

In part two of our digital transformation blog series, we asked leaders from the Americas region, “What does digital transformation mean to you?” Find out our team’s business insights and recommendations on how to navigate the evolving digital landscape in 2018.


Artificial Intelligence and Machine Learning: Their Role in Cybersecurity

Two cutting-edge technologies that are consistently mentioned in market trends and product advancement are artificial intelligence (AI) and machine learning (ML). Often they’re used interchangeably, especially when talking about big data, analytics and other technologies that require processing power, mathematical parsing and data interpretation on massive scales. Unfortunately, these technologies, while related, are not one in the same.


The Beginner’s Guide to Security Assessments

January 12, 2018    |   Donald Lupejkis    |   Security, Security Assessment

Security-180401852 (1).jpg

There are two approaches to cybersecurity: proactive and reactive. Security assessments are a great discovery tool for prospects, but also effective to ensure proactive monitoring for any future network vulnerabilities. It starts a dialogue that you, the security expert, can control. The term “security assessment” is very broad though – there are several types of assessments with varying purposes. Where do you start?


What Does Meltdown and Spectre Mean for the Channel?

January 8, 2018    |   Alex Ryals    |   Security, Cybersecurity, tag-1, Cyber Security, meltdown, spectre

As you have likely heard, Google researchers working for Google’s Project Zero group, along with other research groups and academic institutions, have published information on two new security exploits called Meltdown and Spectre that will have far-reaching consequences for most computing devices, whether on-premise or in the cloud.  In short, a hardware vulnerability has been identified in Intel, AMD, ARM and POWER processors which could allow an attacker to bypass all security measures in an operating system (Windows®, IOS or Linux) and access protected data such as passwords, encryption keys and more. 


How Secure Are Your Users’ Passwords?

December 29, 2017    |   Vedrana Bojovic    |   Security, passwords, security structure

Studies show that 81 percent of hacking-related breaches used either stolen and/or weak passwords. When thinking about your company’s security structure, anti-virus, firewall and backup are all words that come to mind. However, we seldom think about the minimal things we can do for our company’s security, starting with our users. We can begin by looking at our employees as the first line of defense against a potential security breach within our company’s network by implementing a strong password policy.


Key Components for Your Cybersecurity Strategy

December 22, 2017    |   Laura Vanassche    |   Security, Cyber Security, Cyber Threats, Security Tips

A comprehensive cybersecurity plan is no longer installing the best anti-virus software on the market. With today’s environment, this singular approach is not enough to keep a business (or individual) safe from cybercriminals. Understanding the basics and the building blocks for a comprehensive security strategy is the best defense.

This understanding starts with knowing the various ways thieves are looking to capture your information, enter your networks and the damage that they can inflict. Second and more importantly, is identifying the proactive steps you can take to safeguard a network. Please understand that even with a comprehensive security strategy, this does not immunize a business from an attack.

Cybercriminals are becoming smarter each day with new attempts, malware, phishing, social engineering, etc. A dynamic approach to cybersecurity is key to staying protected. The Tech Data Security Solutions team promoted 12 important components of cybersecurity including common threats and tactics partners should consider as part of their approach to cybersecurity in a 12 Days of Security campaign.

While all pieces are important, here are a few that stand out:

• Artificial Intelligence and Cybersecurity – Relatively new to cyber security but commonly mentioned in other industries, the principles of artificial intelligence and machine learning are bringing new ways to combat cyber threats.

• Hiring talent – The skills gap for talent is a pressing reality. Whether you are hunting for trained talent or harvesting it within the organization, there is a gap in today’s workforce. As universities are trying to address with curriculum for students today, this is something that takes time to educate.

• Industries and Regulations – Industries like healthcare and financial services are prime targets for cybercriminals. With repeated breaches over the years, regulations are being passed into law at state and federal levels more often. It is usually the responsibility of the company and all associated contractors within the “supply chain” to comply with such standards. This scenario presents a vast opportunity for partners to help these businesses remain compliant.

For more detail into each of the 12 components, visit the Tech Data Security Solutions LinkedIn showcase page.


Defining a Security Posture

December 15, 2017    |   Donald Lupejkis    |   Security, Cybersecurity, Security Assessment

Imagine you’re going camping this weekend. You’ll be meeting your friends and family there, and it’s going to be a festive time.  (C’mon, play along here.) Time is short, so your brain has probably already started thinking about what you need to pack and purchase to make sure a good time is had by all.