by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : October 2014
Learn more at CDWG.com/Security ©2014 CDW Government, LLC. CDW®, CDW•G® and PEOPLE WHO GET ITTM are trademarks of CDW, LLC. THE PEOPLE — Our dedicated account managers receive regular training in next-generation security. Our experienced solution architects have deep knowledge and can guide you through every stage of your investment, from preparation through deployment. THE PLAN — Our security experts are there for you throughout the entire lifecycle of your investment. We can help you assess your network with security evaluation s like our Rapid Vulnerability Assessment, Comprehensive Vulnerability Assessment and CDW Threat Check. WE GET IT. For more than a decade, the federal government has been struggling to implement a mandate that will protect its IT systems from malicious attacks. Developing a plan to keep your organization safe doesn’t have to be difficult. CDW•G understands the challenges you face, and we can help you keep the hackers at bay. How do we do it? With the people, the products and the plan to build a security solution that fits your needs. THE PARTNERS — Our partnerships with industry- leading security vendors grant you access to some of the exceptional next generation security products on the market, and our in-depth analysis helps ensure that you’ll get the right security solution for your unique needs. Hackers have penetrated, taken control of, caused damage to and/or stolen sensitive personal and official information from computer systems at the Departments of Homeland Security, Justice, Defense, State, Labor, Energy, and Commerce; NASA; the Environmental Protection Agency; the Office of Personnel Management; the Federal Reserve; the Commodity Futures Trading Commission; the Food and Drug Administration; the U.S. Copyright Office; and the National Weather Service. 1 CYBER SECURE 1Source: Reported incidents compiled by the Senate Committee on Commerce, 2013; Rosenzweig, Paul, “The Alarming Trend of Cybersecurity Breaches and Failures in the U.S . Government Continues.” Today, your network is mobile, it’s social, it’s borderless and it’s in the crosshairs. Hackers use social networks to gather passwords, security codes, even your mother’s maiden name. And the attacks are on the rise. The increase in reported federal security incidents involving personally identifiable data from 2009-2013.2 2Source: “Federal Agencies Need to Enhance Responses to Data Breaches,” Federal Accountability Office, April 2014. 143% HACK ATTACK
September 30, 2014
November and December 2014