Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Zone Masergy Zenith Partner Program Newsroom Intel Partner Connect Digital Newsroom Dell Technologies World Newsroom Dell Technologies Newsroom IBM Newsroom The IoT Integrator NetApp Data Fabric Intel Tech Provider Zone

10 Questions With Tech Data Security Guru Alex Ryals On Security Trends And Training In Isolation

Learning about cybersecurity has never been more important, or easier to consume with a variety of styles and modules to select, Tech Data’s VP of Security Solutions Alex Ryals tells CRN.

Back 1   2   3   ... 11 Next
photo

What are some of the trends you are seeing in this new environment?

As work from home has become the new norm for our partners, as well as their customers, there absolutely are trends that we are seeing. For one, customers are just trying to understand, ‘What does work from home look like?’ This morning. I did a webinar on the topic of ‘How do managers manage people in a remote workforce?’ We had 450 people register for that webinar. We had almost 150 people show up. So the need of people to understand, how do you work remote and be effective and efficient has been fascinating?

In security specifically, what's interesting is we're getting a lot of questions where partners are asking ‘How do you protect employees who are working at home who may not be technology people?’

They need endpoint security. They need a VPN client on that laptop to secure that connection to the cloud. They need some training on email phishing scams because the rate of phishing emails has increased or doubled in the last couple weeks as bad guys are counting on the fact that IT staff are distracted with figuring out work from home.

Even something as simple as teaching employees how to upgrade the firmware on your home modem, and how to make sure that you protect your IoT devices at home, and put them on a guest Wi-Fi network instead of on your main network, just to segment vulnerable devices from the same network that you connect your work laptop to.”

 
 
Back 1   2   3   ... 11 Next

sponsored resources