All businesses—and public companies especially—operate with a natural tension between the need for short-term results and long-term strategic execution.
IT organizations are no different, working to apply today’s technology without sacrificing the ability to align with emerging trends and best practices in the future.
Setting an IT strategy that balances the acute near-term needs of the business with the need to capitalize on evolving technology trends and standards in the longer term can be challenging for many new CIOs or leaders of IT organizations.... View Article
A look at the 2015 list of the most common passwords exposes a sad truth: 50 years after it was first used, the account password is an increasingly inadequate way of protecting all the information we store online.
Thankfully, a few superior alternatives are reaching the broader markets now, using features embedded in today’s smartphones. Avnet’s IT Security team developed the infographic below to encourage our employees to implement these alternatives whenever possible in their personal and professional lives, and... View Article
In today’s highly mobile and cloud-enabled business environment, every employee and device is a potential target of opportunity for malicious hackers and identity thieves.
That’s why we at Avnet are committed to providing information and tips to help people:
- Recognize and appreciate the evolving threats they face.
- Understand the steps they can take to neutralize those threats.
One of the cornerstones of that effort is our annual security report, State of IT Security: What You Need to Know.
The latest version... View Article
In March of 2015, IBM committed $3 billion over the next four years toward a new Internet of Things (IoT) business built around the company’s Watson data analytics service.
Just six months later, the company announced it had acquired the digital assets from The Weather Channel as part of that initiative, raising questions and launching a thousand cloud jokes on Twitter.
Why such a large, public commitment to IoT? How does The Weather... View Article
We rely on our mobile devices to store an incredible amount of sensitive information, from social media logins to personal data to financial accounts.
So it pays to follow and pass along these five fast and easy ways to secure any mobile device and keep your most sensitive personal information out of the wrong hands.
Feel free to share or redistribute this publicly or privately as you see fit, but please keep the Avnet header and footer intact.