Vulnerability Assessments vs. Penetrating Testing. Is there really a difference?

vulnerability assessment
May 22, 2017

Puzzled on Services? Fit the pieces together with vulnerability assessments and penetration testing. Growing businesses come with more opportunities for security breaches, the need for your customers’ to understand the differences between a vulnerability assessment and a penetration test becomes a necessity.  Some will say that there is an overlap and similarities between these, however, the opposite could not prove to be truer. To put it simply, a vulnerability assessment…

Read More >>

Who is watching your wire, other than the bad guys?

firewall security management
March 9, 2017

Have you ever wondered if the bad guys are really trying to compromise your corporate network or those of your customers?  With all the potential targets out there, surely it’s the other guys who have to worry, right? A customer told me the other day that budgets are tight this year and he has so many priorities, that he feels like he has to take his chances with cyber security…

Read More >>

3 important considerations for the booming IoT market in 2017

2017 IoT Market
February 7, 2017

IoT is one of the latest and most buzz-worthy acronyms to enter the technology scene in the last year. IoT, or the Internet of Things, is a term for the concept of embedding computing devices like sensors into everyday objects to allow those objects to send and receive data. Seize opportunities in the growing IoT market while minimizing risk The market for IoT devices and services is rapidly expanding. Gartner…

Read More >>

Security Success Story Video – Fighting malware with secure endpoints in under 30 days

Fighting malware
January 24, 2017

In recent years, the news has been riddled with stories of cyber-attacks and the devastating effects they have on businesses. Being able to protect your customers’ data and mitigate reputational damage by providing robust security solutions is vital. Hear how David Cristal, VP and GM of Insight Public Sector, partnered with Avnet to bring the “right, smart folks” to the table to devise a solution to protect the data of…

Read More >>

10 steps to fight ransomware AFTER it’s infected healthcare systems

it security ransomware
October 12, 2016

More and more, hackers are turning their attention from banks and financial institutions to healthcare organizations. Why? Because they see healthcare companies as low-hanging fruit. Not only is it relatively easy to infiltrate IT systems, by hacking medical devices, targeting new or uneducated employees and/or from general weak security systems – but also the information being protected is extremely lucrative to criminals. Cybersecurity is a big concern for your healthcare…

Read More >>

Coaching customers to identify, prevent and recover from ransomware

ransomeware
October 5, 2016

Do you know which industry experienced the highest rate of cyber-attacks last year? It wasn’t retail. It wasn’t government. It wasn’t even finance. It’s healthcare. Unfortunately, this trend is expected to continue this year and throughout 2017 as well. Why? Because electronic healthcare records are twenty times more valuable on the black market than other sensitive data, including credit card information. Cyber security is a major concern within the healthcare…

Read More >>

Tis the Season to Slide into SLED

cloud-computing-government
September 27, 2016

In my recent posts, I’ve focused on initiatives in the Federal space and steps Avnet Government Solutions is taking to protect Uncle Sam’s goods. As summer wraps up I wanted to drill down on the other side of the public sector. Last month we attended XChange SLED University and then road tripped to the Sunshine State for NASCIO a couple weeks ago. The state, local and education (SLED) industry provides…

Read More >>

Office of Personnel Management breach one year later – look how far we’ve come

government cyber security
September 6, 2016

It’s been more than a year since the Office of Personnel Management (OPM) breach that exposed the personal information of millions of U.S. Federal workers. You’ve probably seen the news – the breach exposed personal information from a jaw-dropping 22 million people including finger prints, social security numbers and other private information. Victims included current and former Federal employees, retirees, contractors and others who had undergone Federal background checks. It…

Read More >>

Data Breach Summer Shake Down in the Public Sector

Protect your enterprise from a data breach
August 12, 2016

As Washington, D.C. battles a hazy, hot, and humid summer, it also continues to battle a more complex threat – cyber attacks. The public sector is leading a data breach shake down as organizations and agencies look to stop hackers from exposing the United States’ most secure and sensitive data. Planning ahead for a cyber attack In June 2016, the National Institute of Standards and Technology (NIST) released a set…

Read More >>

Avnet’s Solution Team Launches 4 New Sales Plays to Lead the Channel to Success

chess
March 10, 2016

Avnet has released four new sales plays that are designed to drive your hardware, software and services sales and align with a solution approach. These plays were selected after many discussions with IDC analysts to identify high growth areas of the market, Avnet Suppliers to align with their solution strategies and many of our trusted partners who told us where their customers are focusing.

Read More >>

The Noise Pollution in Security – And How to Cut Through It

noise
January 26, 2016

We all know that like a diamond, there are many facets to “security”. I want to take just a couple minutes to highlight one particular area that customers have been asking our partners to help them address – the “noise pollution” that comes from all the devices, people, applications, etc. that make-up their ever increasing and complex business computing environment.

Read More >>

4 Prescriptions to Protect the Future of Healthcare

tEREUy1vSfuSu8LzTop3_IMG_2538
October 15, 2015

The risk for healthcare organizations isn’t getting any better. In fact, we’re now more than five years into the HITECH and Affordable Care Acts, and the risks are greater than ever.

In this blog, I’ve listed four top security priorities I believe healthcare organizations need to take into account now in order to secure data, and their patient confidence, for the future of healthcare:

Read More >>

3 Ways Healthcare Organizations Can Rethink Their Security Strategy

Cyber Security
April 1, 2015

Recently, Premera Blue Cross was hit with the second-biggest cyberattack in healthcare industry history, exposing the personal, financial and medical information of more than 11 million customers. Only six weeks before, Anthem announced that it had been victim of a breach subjecting nearly 80 million records of customers to exposure. Although these breaches are becoming more and more common in the healthcare industry, they’re nothing new.

Read More >>

The Double Life of Data

male hands typing on a laptop
January 12, 2015

Although data, when properly analyzed, has the ability to grow organizations by leaps and bounds, it has the possibility of bringing it to its knees – and it does. Learn the dual roles solution providers play in helping customers gain value from their data, and keeping that same data safe.

Read More >>