Ingenuity in Motion Blog

Skip Navigation LinksHomeInsightsIngenuity in Motion BlogSecurity and Compliance Blog Posts
Avnet bloggers share their 2017 IT New Year’s Resolutions

It’s been a running gag on the internet that 2016 has been a trying year; thankfully it’s over and 2017 is upon us. Last year we recommended some New Year’s Resolutions to help slim and trim your IT environment – this year we opened it up to some of our regular blogger and asked them one question: What is your 2017 IT New Year’s Resolution?  Tim Camper, Sales Director "My 2017 IT New Year's Resolution is to avoid creating any more three-letter acronyms. I appreciate when things are easy to remember and acronyms do help my team and me to talk or write about products or solutions, but sometimes having all this lingo can be too much 'IT speak' and can get confusing."  Alisha Robinson, Demand Creation Specialist "My 2017 IT Resolution is to be more involved on social media. Specifically, I want to learn how to meme and hashtag with the best of them!" 

Read More ...

4 easy ways to celebrate Computer Security Day

​​​As technology continues to shape and influence our everyday world, it is important for us to be mindful of ways we can protect ourselves and enjoy the convenience the web and our electronic devices offer us. That’s why today (November 30th) we should all celebrate Computer Security Day. The holiday was first observed in 1988 as the result of the worst computer virus outbreak known as Jerusalem. Now businesses, schools and government organizations use the day to promote electronic and web security. Here are a few ways you can celebrate Computer Security Day and protect your information a bit more.

Read More ...

Improve your cybersecurity plan in 3 simple steps

Cybersecurity attacks are becoming more complex and more difficult to track and curtail. While attackers are able to patiently wait, probing and poking your network and data looking for ways in, security staff has to protect against external threats, accidental data leaks from staff, and even hostile actions from current and ex-staff. How can an organization possibly keep up when the threat or attacker seems to always be a step ahead? It seems a nearly insurmountable task, but despite a record amount of funding being diverted to security measures, many organizations still have not mastered the basics of IT security. Here are three simple steps that can immediately improve your odds against threats - external or internal.

Read More ...

4 Identity Management Challenges to Conquer in 2016

​Identity management plays an important part in our everyday lives. It uses all the different pieces of information we have about our users and systems to grant access to tools, functions, software or devices. Effective identity management is essential to enterprise security. Keeping identity information secure, reliable and usable is critical to ensuring that enterprise systems are used appropriately and that sensitive information is protected. Companies looking to simplify authentication need to decide in what ways users can and should be able to securely access their resources - both on location and remotely – and are coming up with creative ways whether it be via fingerprinting, facial recognition, passwords or keycards. 

Read More ...

Mobile security threats are growing just as fast as mobile technology – can endpoint protection help keep us ahead?

​Now more than ever, we keep and manage our entire world conveniently within our smartphones - from music, games and photos to emails, bank accounts, and credit cards. The consumer demand for mobility, access and convenience when using technology has placed a premium on endpoint protection. From the introduction of the first portable handset in 1984, mobile devices were thought to be impenetrable until a computer virus was discovered on a mobile device in 2004. Since then, the threats seem to evolve just as quickly as technology.

Read More ...