Tech Data Blog

Smart Device Security Myths - Debunked

February 17, 2017   |   Christopher Parisi

Many of us travel extensively and there is inevitably a time when your portable device alerts you that it needs power—often in an airport, mall or other public place. More often, “charging stations” are becoming a fixture in airports, malls and even bars, making it convenient to pull up a chair and plug in your device.

Read More

Topics: Security, Client & Mobility, Mobile

Securing Smart Devices from Intrusion & Data Loss

January 20, 2017   |   Christopher Parisi

Security for your smart device is now more important than ever. Since 2015, the amount of e-commerce transactions, social media interactions and corporate data interactions, as well as personal communications performed on smart devices including tablets, phones and smart watches, has surpassed the amount on PCs and laptops.

Read More

Topics: Security, Mobility

Phishing: Stay in the know to keep your information safe

December 21, 2016   |   Tim Ayer

A devious new technique is being used by cyber thieves that involve something called phone phishing. Most of us are on the defense when we receive an unsolicited call from someone posing as a representative of Microsoft’s Technical Support Department, wanting you to log on to a “special” website, or posing as an IRS auditor demanding immediate payment, or posing as a bank representative trying to confirm your account information for security purposes. What if the cyber thief convinced you to call them and give your information willingly? If you think this is not going happen to you, keep reading.

Read More

Topics: Security, Cybersecurity, Mobile

It’s December and the Phishing is Fine.

December 14, 2016   |   Christopher Parisi

It’s that time of year when online shopping and credit card purchases increase drastically during the Christmas buying season. Analysts predict the numbers for Cyber Monday point to over 122 million transactions, with specials running throughout the month of December. So what does this mean for the throngs of hackers trolling the internet to steal Christmas?
Read More

Topics: Security

Not All Cloud Productivity Requirements Are Created Equal

December 6, 2016   |   Jeff Salanco

We are passionate about provide IT Solution providers with Access to best in class cloud and managed service technology.  Tech Data Cloud’s portfolio of solutions is built on lasting partnerships with established market leaders and innovative born in cloud vendors.

Read More

Topics: Security, Cloud