GDT Webinar Series – How to Fail at Security? Reserve Your Spot

Blogs

Robust, resilient data infrastructure is key to keeping your organization secure and avoiding the challenges that arise from data breaches or loss. But it isn’t just a risk mitigation strategy — a well-architected and well-maintained data center empowers your organization to move quickly, serve customers well, streamline processes, and keep

As an award-winning Cisco partner and one of only a handful that has attained the Cisco Advanced Customer Experience Specialization, GDT has a deep history of driving customer value through our Cisco offerings, including lifecycle services. So, it’s no surprise that GDT has achieved 20% growth in services and 30%

Business disruption, inflation, market volatility, natural catastrophes…these are just a few of the many risks facing today’s businesses. But the top worry that keeps most business and tech leaders up at night? Cyber incidents[i]. Protecting against data breaches, ransomware, IT outages, and other events through increased cyber resilience has never

If you’re in the cybersecurity business, you’ve likely invested a fair amount of time (or perhaps a lot of time) in generating cybersecurity metrics. And you may have experienced some of the frustrations that I covered in my recent article, Cybersecurity Metrics: Avoiding Common Pitfalls. In this follow-up article, I’ll

Over the last three decades the technology evolution has pushed the boundaries of traditional industries and also sparked new ones. Cybersecurity — whether viewed as a sub-faction of information security, a set of practices within the information technology industry, or a significant industry in its own right — has emerged

As a global IT solutions provider, we understand that technology partnerships are absolutely crucial in our line of business. It’s fair to say that without great partners to work with, we couldn’t do what we do. It’s also fair to say that without the expertise the GDT team brings to

If you’re wondering if your organization’s ransomware defense strategy is as strong as it could be, you’re not alone. Ransomware has emerged as one of the top cybersecurity threats you need to be concerned about, with an average cost of $4.45 million per incident. According to Verizon, about a third

Mergers, acquisitions, and divestitures (M&A/D) offer opportunities for businesses to grow, streamline operations, and enter new markets. However, strategic planning and financial negotiations can overshadow a crucial element: information security.   This blog post dives into the critical security considerations for M&A/D activities, exploring the importance of information security, potential risks,

AI and Data Security

The advent of artificial intelligence (AI) brings transformative potential across industries while also introducing significant data security challenges. As AI systems become integral to operational and decision-making processes, safeguarding sensitive information against sophisticated threats is paramount. This exploration sheds light on the complexities of AI and data security and proposes