The top 5 IT mistakes you’re probably making

Everyone makes mistakes. Not everyone knows when they’re making them.

This is especially true in the world of IT, where teams are often swamped just keeping their environment up and running. In that rush, details sometimes go overlooked, and opportunities sometimes get ignored. The consequences are everything from wasted money to lost time to a system outage.

Fortunately, the fixes are often easy and can save you a lot of trouble down the road. You just have to know where to look. Here are five mistakes you may not know you’re making, and the simple fixes you could consider. Continue Reading…

Tags: ,

6 tech trends that took over in 2016

Technology continues to become more and more integrated into our everyday lives—it’s hard to find a company that doesn’t use software to help run their business more smoothly. At SHI, we help organizations across a number of industries find the solutions they need, from printer security to healthy cubicle hacks and more. It gives us a great view of some of the trends that emerge each year, including what hit it big in 2016. Continue Reading…

Tags: , , , , , , ,

Not your father’s antivirus: How new malware detection gives IT a leg up in cybersecurity

IT security is a fundamentally uneven playing field: You have to win every day, but attackers have to win just once. Cyber criminals spend mere pennies compared to the huge investments that organizations make on network defenses, specialized security and compliance systems, and employee education. And IT is always chasing a new target – yesterday’s biggest risk was a Trojan horse, today’s threat is ransomware, but tomorrow’s threat is unknown.

Even IT’s best methods – whitelisting, quarantining, and sandboxing – still can’t prevent the majority of attacks, and they often disrupt employee productivity or increase the burden on IT. So is there a way to prevent malware, like ransomware, even if it’s never been seen before? And can you do so without impacting user productivity? The short answer is yes. Here’s how. Continue Reading…

Tags: , , ,

Ransomware 101: What it is and how to protect yourself

Ransomware
Ransomware was once a blip on the cyber security radar, but times have changed: Ransomware attacks grew nearly 500 percent, to 3.8 million attacks, from 2014 to 2015.

Ransomware has been headline news ever since hospitals became big targets. One survey found that only 18 percent of hospitals haven’t been hit with ransomware attacks. But health care isn’t alone: Police departments, schools, and churches are all seeing ransomware attacks grow in frequency. Still, some organizations fail to protect themselves or are simply unaware of the threat ransomware poses. Continue Reading…

Tags: , ,

What today’s IT security looks like in 3 charts

Internet Security Threat ReportThe 21st edition of Symantec’s Internet Security Threat Report (ISTR) was released in April, detailing emerging trends such as the increase in malware, the rise of mega data breaches, and an uptick in ransomware.

The data presented in the ISTR comes from Symantec’s Global Intelligence Network, which monitors threat activity in over 157 countries and is made up of 63.8 million attack sensors that record thousands of events per second.

The ISTR highlights some eye-opening security breakdowns: In 2015 alone, ransomware increased 35 percent, more than 100 million fake technical support scams had to be blocked, and vulnerabilities were found in 75 percent of all websites. And because the Internet of Things and smart devices are expected to grow to more than 20 billion units by 2020, the “insecurity of things” remains a huge risk.

A strong security strategy must be a top priority for organizations and their employees alike. Here are three areas in particular that deserve special focus. Continue Reading…

Tags: , ,

How one health care provider learned that compliance does not equal security

Health care compliance and securityWhich causes business leaders to buy into an IT security assessment quicker: ransomware or a data breach?

Both.

Unfortunately, that’s just the situation a regional health care provider network faced a few years ago. Although the IT staff knew a review of the security of the network and file server was overdue, the C-suite remained focused on existing HIPAA compliance guidelines.

That’s when a ransomware attack hit, resulting in a data breach. A user simply clicked on a popup, ransomware was then installed on the machine, and health care records stored on the user’s hard drive were compromised.

After the breach was fixed and the damage assessed, management realized many questions needed answering: Why did this attack happen? What should be IT’s first step in protecting data? What data should be secured? How could the organization balance compliance and security to stop attacks in the future? Continue Reading…

Tags: , , ,