James Nagurney - National Business Development Manager
James Nagurney
National Business Development Manager
Kurt Hildebrand
Director of Practices and Initiatives for Enterprise Storage
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Rich Faille - Director of Mobility Practice
Rich Faille
Director of the Mobility Practice
Tony D'Ancona - Vice President of Professional Services
Tony D'Ancona
Vice President of Professional Services
»See All Authors
  • AwardsIndustry Recognition and More
  • EventsExpos, Conferences, and More
Stephen Nardone - Director of Security Solutions and Services
Featured Story

Don’t Short-Change Your Risk Assessment

Special Risk Circumstances

by Stephen Nardone | Tuesday, October 21, 2014

While there are commonalities to most risk assessments, companies in regulated industries that store sensitive customer data must follow additional government-mandated protocols. The overall goal is to gain an understanding, from an end-to-end perspective, of what the current risk is to your environment. However, a full Security Assessment can be targeted against compliance-related areas, like PCI or HIPAA.

Risk AssessmentHere are some common assessment procedures for BYOD and cloud risks that apply to any business, and a brief outline of requirements, with links to further information, for businesses with special data-protection needs.

Can Your Technology Stand Up to a Barrage of New Security Threats?

Keep Your Network Strong with Dell SonicWALL

by Bill Virtue | 10.16.14

Today, addressing security risk and threats is an ongoing rapid process. Organizations of all sizes need to protect themselves from the constant evolution of threats. My team at PC Connection is working with customers every day to eliminate dangerous gaps in protection and boost employee productivity at the same time.

Any competent IT professional will tell you that one of their top priorities— probably the top priority—is securing their enterprise’s data and network. Indeed, CIOs typically allocate a healthy chunk of their overall IT budgets to security.

Concern, however, does not always translate into competence, or even common sense. Further, throwing money at a problem without first properly assessing and prioritizing an enterprise’s unique IT-related risks actually can create greater vulnerability. You can’t just buy technology, put it in your environment, and assume that your assets are safe.

Technology Blog

Our technology blog, Connected, serves as your one-stop resource for valuable insights from our on-staff technology experts and featured industry leaders regarding the latest news and information on business IT solutions and technology trends.