Social media has changed the way we communicate personally and professionally. But as with all things related to technology, misuse of social can leave you vulnerable to malicious hackers and identity thieves.
With that in mind, here are six steps every user of social media should follow to reduce the risk of identity theft or hacking.
Feel free to share or redistribute this publicly or privately as you see fit, but please keep the Avnet header and footer intact.
We’ll be sharing more of these in the... View Article
Although the number of highly-public data breaches feels smaller through the first three quarters of 2015 than it did last year, two indisputable facts remain:
- Large public and private organizations will continue to be high-value targets, based on the massive sets of customer and financial data they maintain.
- Malicious hackers and thieves will continue to focus their attacks on the individual employee to breach the company’s defenses.
Although hackers may view a company’s employees as the weakest link in the... View Article
As one of the world’s largest global technology distributors, Avnet’s ability to efficiently quote and process orders is at the very heart of our business.
We offer more than 10 million products to more than 100,000 customers in 120 countries, supporting 36,000 orders per day. Our customers have told us that when it comes to delivering quotes for our customers and prospects, speed and accuracy counts.
The faster and more accurately we can deliver quotes, the more likely we are to fulfill our customers’ needs—whether... View Article
In 2012, I devoted a blog post to our global contract lifecycle management tool, iContract, which we believe was among the first applications of its kind at the time.
Since then much has changed, and the application needed to change with it. So I’ve asked Susan Engle, vice president of Avnet’s Project Management Office, to share how we recently improved iContract to better meet the needs of our global user base in today’s business environment.
In early 2014, we began receiving feedback... View Article
As the Internet of Things continues to gain momentum in business and consumer circles alike, the potential security holes these devices can create are multiplying as well.
Physical threats like a Jeep Cherokee being hacked while driving and a mobile app-aided rifle that can be controlled remotely make the headlines, but the primary threat IoT device users face can have significant consequences as well: the theft of sensitive data and personal information.
Here are four things every consumer can and should do to reduce the risk... View Article