INFOGRAPHIC: How to Unlock the Power of Data Encryption

Avnet_SecurIT_Encryption_Infographic header

Encryption sounds like one of those information security options that’s only available to government agencies and global companies, but the fact is, anyone can take advantage of this powerful tool at little to no cost. 

In the infographic below, Avnet has identified eight easy ways to secure your devices and information at no cost using tools you already have available.

Feel free to share or redistribute this publicly or privately as you see fit, but please keep the Avnet header and footer intact.


CLICK HERE TO... View Article


Guest Post: Bi-modal IT for a Bi-modal Business, Part II

bimodal-blog-header

by Dave Bent, senior vice president of IT, Avnet, Inc.

In the previous post, we defined what it means to be a bi-modal business, and why organizations like Avnet are embracing that model to stay one step ahead of the needs of “digital native” customers without losing focus on the core traditional business.

In this follow up, I’d like to share how we as Avnet’s IT team are supporting that transformation when it comes to our IT project pipeline.

Waterfalls and scrums

Avnet... View Article


Guest Post: Bi-modal IT for a Bi-modal Business, Part I

bimodal-blog-header

by Dave Bent, senior vice president of IT, Avnet, Inc.

How does a nearly century-old electronics distribution company continue to deliver value when there’s nothing to physically deliver?

Since Avnet was founded back in 1921, the majority of the company’s value—what customers are willing to pay for—has been linked to the three core activities of any distribution business: procuring goods, storing goods and delivering goods.

The dawn of digital delivery

The advent of the internet—and particularly ubiquitous broadband internet—has created an entirely new method... View Article


My Summer Reading List: Business & Leisure

summer-reading-header

Summer is a great time for reading for both business and leisure, and with the season officially underway, I thought I’d share my summer reading list with you.

My list covers a variety of topics, from technology and business to historical nonfiction and a fictional thriller, based on recommendations from friends and colleagues and a few new releases from some of my favorite authors.


Connectography: Mapping the Future of Global Civilization by Parag Khanna

As the CIO of a global technology company, I am fascinated... View Article


INFOGRAPHIC: Social Engineering Attacks – What to Look for & What to Do

social-engineering-infographic-public-final-v1-header

Social engineering attacks are particularly effective and insidious because they use our own cultural norms and roles against us, short-circuiting our ability to easily identify and avoid them. 

In the infographic below, Avnet has outlined four ways you can identify social engineering attacks, along with steps you can take to neutralize the threats.

Feel free to share or redistribute this publicly or privately as you see fit, but please keep the Avnet header and footer intact.


CLICK HERE TO DOWNLOAD A PDF VERSION

View Article