SHI’s ringing in spring once again with our Microsoft webinar series, highlighting Microsoft’s latest products and licensing options. SHI and Microsoft have a long history of collaborating on regular webinars, which keep thousands of procurement and IT professionals up-to-date on Microsoft technologies.
Tags: Staff picks
Health care has HIPAA. Credit card merchants have PCI. But if you’re not part of these compliance-heavy industries, how can you know your cybersecurity is up to scratch?
The answer is a cybersecurity framework–a set of practices, policies, and processes that holds your organization accountable for its defenses. Security frameworks provide a calculated approach to determining risk, setting up a security strategy, and allocating security resources. They are measurable, repeatable, and used across many organizations. Continue Reading…
Tags: IT security, Security frameworks
At best, this proves inconvenient for customers that have to allot valuable time and resources to manage the audit. At worst, organizations face steep financial penalties if unintentional license deficits are discovered.
Perhaps the best means of protecting your company from the risks of software audits is negotiating sufficient protections in your software license agreements when initiating your relationships with publishers. By getting down on paper the terms of any future audits, you mitigate many of their potential risks. Continue Reading…
Tags: IT asset management, ITAM, Software audits
Tags: Staff picks
Another year, another record set! Once again, SHI topped our own company-best by reaching $7.5 billion in annual revenue in 2016 —our first year ever exceeding $7 billion! Continue Reading…
Tags: Earnings, Press releases
This is especially true in the world of IT, where teams are often swamped just keeping their environment up and running. In that rush, details sometimes go overlooked, and opportunities sometimes get ignored. The consequences are everything from wasted money to lost time to a system outage.
Fortunately, the fixes are often easy and can save you a lot of trouble down the road. You just have to know where to look. Here are five mistakes you may not know you’re making, and the simple fixes you could consider. Continue Reading…
Tags: Battery backups, Ransomware
Tags: Staff picks
With the ever-increasing number of cyberattacks for both financial gains and political purposes, companies, government agencies, and other organizations are forced to deploy and maintain an expanding depth of security controls. This has led to a breadth of oftentimes independent point solutions that aren’t driven by policies and processes and aren’t created by an experienced information security professional.
Many organizations just aren’t large enough to employ a chief information security officer (CISO), and even the ones that can afford it struggle to find qualified candidates. As a result, security falls by the wayside, becomes secondary to other IT operational concerns, and is more reactive than proactive.
That’s why virtual CISOs are growing more popular. These on-demand experts step in to evaluate, maintain, or repair your security, on-site or remotely, working as a flexible addition to your current IT team and offering the security management you may not be able to find yourself.
But not all virtual CISOs are created equal. To help you navigate the different types and functions—and whether they’re right for you at all—we’ve put together some background to guide your search. Continue Reading…
Tags: IT security, Virtual CISO
Happy Friday! Here are the most interesting tech stories our team read this week. Continue Reading…