INFOGRAPHIC: Social Engineering Attacks – What to Look for & What to Do

social-engineering-infographic-public-header

Social engineering attacks are particularly effective and insidious because they use our own cultural norms and roles against us, short-circuiting our ability to easily identify and avoid them. 

In the infographic below, Avnet has outlined four ways you can identify social engineering attacks, along with steps you can take to neutralize the threats.

Feel free to share or redistribute this publicly or privately as you see fit, but please keep the Avnet header and footer intact.


CLICK HERE TO DOWNLOAD A PDF VERSION

... View Article


Setting and Delivering an Enterprise IT Strategy in Six Steps: Part II of II

six-steps-circle

Setting an IT strategy that balances the acute near-term needs of the business with the need to capitalize on evolving technology trends and standards in the longer term can be challenging for many new CIOs or leaders of IT organizations.

With that in mind, I thought I’d share our process for developing our IT strategy each year, in the hope that you can find a best practice or takeaway you can apply in your own business.

I discussed the strategic phases of the process... View Article


Setting and Delivering an Enterprise IT Strategy in Six Steps: Part I of II

six-steps-circle

All businesses—and public companies especially—operate with a natural tension between the need for short-term results and long-term strategic execution.

IT organizations are no different, working to apply today’s technology without sacrificing the ability to align with emerging trends and best practices in the future.

Setting an IT strategy that balances the acute near-term needs of the business with the need to capitalize on evolving technology trends and standards in the longer term can be challenging for many new CIOs or leaders of IT organizations.

... View Article


Two Easy Ways to Upgrade Your Account Security with Your Smartphone [INFOGRAPHIC]

password-alt-pub-final-header

A look at the 2015 list of the most common passwords exposes a sad truth: 50 years after it was first used, the account password is an increasingly inadequate way of protecting all the information we store online. 

Thankfully, a few superior alternatives are reaching the broader markets now, using features embedded in today’s smartphones. Avnet’s IT Security team developed the infographic below to encourage our employees to implement these alternatives whenever possible in their personal and professional lives, and... View Article


DOWNLOAD: Avnet’s FY17 State of IT Security report

Avnet-FY17-State-of-IT-Security-blog-header

In today’s highly mobile and cloud-enabled business environment, every employee and device is a potential target of opportunity for malicious hackers and identity thieves.

That’s why we at Avnet are committed to providing information and tips to help people:

  1. Recognize and appreciate the evolving threats they face.
  2. Understand the steps they can take to neutralize those threats.

One of the cornerstones of that effort is our annual security report, State of IT Security: What You Need to Know.

The latest version... View Article