James Nagurney - National Business Development Manager
James Nagurney
National Business Development Manager
Kurt Hildebrand - Director of Practices and Initiatives for Enterprise Storage
Kurt Hildebrand
Director of Practices and Initiatives for Enterprise Storage
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Rich Faille - Director of Mobility Practice
Rich Faille
Director of the Mobility Practice
Tony D'Ancona - Vice President of Professional Services
Tony D'Ancona
Vice President of Professional Services
»See All Authors
  • AwardsIndustry Recognition and More
  • EventsExpos, Conferences, and More

Security

We have searched the depths of our blog to provide you with the latest IT articles on Security. Get Connected Today!
Secure Your Online Data

3 Ways to Secure Your Data

Don’t Let Attackers Get the Better of Your Organization

by Clive Anthony | 09.16.13

Today, security threats are more of a problem for organizations than ever. Not only are they increasing in sophistication and frequency, but they also have a whole host of new targets: everything from traditional desktop PCs to smartphones and tablets to Web apps. Attackers can use any of these to gain access to your password-protected, mission-critical information. Now is the time for a security enhancement to protect your data, users, and network. Read on for three tips for ensuring the security of your organization’s data and assets.

Tags:NetworkingSecurity

2013 Outlook on Technology: BYOD Survey Results

Our BYOD Survey Results Are In

Security Is Everyone’s Top Concern

by Kelly Schuttinger | 08.19.13

Here at PC Connection, we recently conducted a survey to gain deeper insight into the BYOD marketplace. We surveyed 500 IT professionals at organizations of various sizes, and today I’d like to share some of our key findings.

As with most BYOD research, we found security to be the top concern among organizations.

Tags:BYODMobilitySecurity

Can Your Network Handle BYOD?

Get Your Infrastructure Up to Speed

by Mike Glew | 08.16.13
Like many IT professionals, you are probably evaluating your wireless network’s ability to support new applications and meet user expectations for mobility and BYOD. As more organizations move toward implementing a BYOD policy, legacy wireless networks will struggle to keep up. Here are some insights and steps you can take to prepare for the influx of mobile devices that place increasing demands on your wireless network, while keeping everything secure.

Tags:BYODNetworkingSecurityWireless

Cisco BYOD Solution - Bring Your Own Device

Secure Your BYOD Environment

Cisco Has the Solution

by Peter Eisenhauer | 07.24.13
It seems like everywhere you turn in the tech world these days, people are talking about BYOD (bring your own device, for the uninitiated). While many organizations would like to offer their employees the freedom and control that come with using their chosen mobile devices, security issues abound. How do you keep your network and valuable data secure when your end-users are all using different devices? How can you keep your limited IT resources focused on the important issues, instead of managing the potential headaches BYOD might cause?

Tags:BYODInfrastructureManagementMobilitySecurity