The Official Blog of SHI International
  • Home
  • Hardware
    • End-User Devices – Get the latest strategies to help deploy and manage the computers, tablets, and other devices your employees use every day.enduserdevices-menu
    • Data Center – Create a secure, available, and high-performance data center whether on site or in the cloud.datacenter-menu
    • Storage – Maintain, manage, and protect your organization’s data with the latest equipment and best practices.storagemenu
    • Networking – Design, implement, and secure a reliable, high-performance network using tried-and-true strategies.networkingmenu
    • Configuration – Assemble, stage, and deploy everything from end-user devices to advanced, on-premises data center hardware solutions.configurationmenu
    • Close
  • Software
    • Microsoft – Learn how the newest Microsoft products, programs, and volume licensing changes could affect your IT environment.microsoftmenu
    • Volume Licensing – Review changes to licensing programs from the industry’s major software publishers and how they could impact your current or future licensing plans.volumelicensing-menu
    • SAM/IT Asset Management – Take control of deployed software, volume licensing, and internal governance to maximize ROI, ensure compliance, and avoid an audit.samitammenu
    • Close
  • Solutions
    • Case Studies – Learn about the real-world business and IT results SHI has delivered to some of our 18,000 customers around the globe.casestudies-menu
    • Professional Services – Extend the capabilities of your in-house IT team by outsourcing IT readiness assessments and project management.professionalservices-menu
    • Security – Protect your organization from internal and external threats by developing a comprehensive security posture.securitymenu
    • Mobility – Equip, empower, and manage a more productive mobile workforce with the best devices, strategies, and tools.mobilitymenu
    • Big Data – From data storage to analytics, explore big data’s challenges and opportunities to maximize its potential.bigdata-menu
    • Close
  • Cloud
    • AWS – Find news and tips to optimize your experience using the largest public cloud provider.aws-menu
    • Azure – Read the latest news, licensing, use cases, and best practices for infrastructure- and platform-as-a-service from Microsoft.azuremenu
    • Office 365 – Get familiar with licensing, deployment, security, and productivity for Microsoft’s cloud-based Office suite.office365-menu
    • Hybrid – Architect, implement, and utilize a combination of on-premises, private cloud, and public cloud services.hybridmenu
    • Virtualization – Uncover how virtualization can create efficiencies and safeguards, and improve end-user experience.virtualizationmenu
    • Close
  • News
    • SHI News – See what’s happening behind the scenes at SHI, from quarterly earnings to awards and new partnership announcements.shinewsmenu
    • IT News/Events – Analyze the biggest tech news of the day, from major mergers and acquisitions to on-the-ground reporting from major industry events.itneweventsmenu
    • Staff Picks – All work and no play makes for a dull day. Find out what tech stories we’re reading in our spare time.staffpicks-menu
    • Close
  • SHI.com
  • Home
  • Hardware
    • End-User Devices – Get the latest strategies to help deploy and manage the computers, tablets, and other devices your employees use every day.enduserdevices-menu
    • Data Center – Create a secure, available, and high-performance data center whether on site or in the cloud.datacenter-menu
    • Storage – Maintain, manage, and protect your organization’s data with the latest equipment and best practices.storagemenu
    • Networking – Design, implement, and secure a reliable, high-performance network using tried-and-true strategies.networkingmenu
    • Configuration – Assemble, stage, and deploy everything from end-user devices to advanced, on-premises data center hardware solutions.configurationmenu
    • Close
  • Software
    • Microsoft – Learn how the newest Microsoft products, programs, and volume licensing changes could affect your IT environment.microsoftmenu
    • Volume Licensing – Review changes to licensing programs from the industry’s major software publishers and how they could impact your current or future licensing plans.volumelicensing-menu
    • SAM/IT Asset Management – Take control of deployed software, volume licensing, and internal governance to maximize ROI, ensure compliance, and avoid an audit.samitammenu
    • Close
  • Solutions
    • Case Studies – Learn about the real-world business and IT results SHI has delivered to some of our 18,000 customers around the globe.casestudies-menu
    • Professional Services – Extend the capabilities of your in-house IT team by outsourcing IT readiness assessments and project management.professionalservices-menu
    • Security – Protect your organization from internal and external threats by developing a comprehensive security posture.securitymenu
    • Mobility – Equip, empower, and manage a more productive mobile workforce with the best devices, strategies, and tools.mobilitymenu
    • Big Data – From data storage to analytics, explore big data’s challenges and opportunities to maximize its potential.bigdata-menu
    • Close
  • Cloud
    • AWS – Find news and tips to optimize your experience using the largest public cloud provider.aws-menu
    • Azure – Read the latest news, licensing, use cases, and best practices for infrastructure- and platform-as-a-service from Microsoft.azuremenu
    • Office 365 – Get familiar with licensing, deployment, security, and productivity for Microsoft’s cloud-based Office suite.office365-menu
    • Hybrid – Architect, implement, and utilize a combination of on-premises, private cloud, and public cloud services.hybridmenu
    • Virtualization – Uncover how virtualization can create efficiencies and safeguards, and improve end-user experience.virtualizationmenu
    • Close
  • News
    • SHI News – See what’s happening behind the scenes at SHI, from quarterly earnings to awards and new partnership announcements.shinewsmenu
    • IT News/Events – Analyze the biggest tech news of the day, from major mergers and acquisitions to on-the-ground reporting from major industry events.itneweventsmenu
    • Staff Picks – All work and no play makes for a dull day. Find out what tech stories we’re reading in our spare time.staffpicks-menu
    • Close
  • SHI.com

Archives

Author Archive for: "Anne Grahn"
Home » Archives for Anne Grahn
 Foxconn, FireEye, and SolarWinds: Key takeaways from high-profile breaches

Foxconn, FireEye, and SolarWinds: Key takeaways from high-profile breaches

December 15, 2020

Between January and October, 36 billion records were exposed in data breaches. Here’s an overview of some of the latest high-profile cyberattacks, and what they teach us about cyber defense.

Read More 0
     12 ways to protect your organization from ransomware

    12 ways to protect your organization from ransomware

    December 11, 2020

    Cybercriminals are using more covert tactics with ransomware, carefully targeting organizations they believe are likely to pay a significant amount of money. Here are 12 tactics that can help [...]

    Read More 1
    • TomGreat article Anne. Thanks :-) Below are ...
     Best practices for building an effective security awareness program

    Best practices for building an effective security awareness program

    September 3, 2020

    The best security tools in the world can’t compensate for a lack of awareness. Here are nine steps to foster a culture of cybersecurity and transform awareness training from an annual event into [...]

    Read More 0
       5 keys to successful privileged access management

      5 keys to successful privileged access management

      March 10, 2020

      Security teams are struggling: 74% of data breaches involve access to privileged accounts. Privileged access management could help, but only with the right strategy in place.

      Read More 0
         Seeing the glass half full: 4 cybersecurity trends for 2020

        Seeing the glass half full: 4 cybersecurity trends for 2020

        January 9, 2020

        As data breaches increase in volume and severity, it’s time to sharpen our focus on cyber defense. Here are four trends for 2020, and actions your organization can take to improve your [...]

        Read More 0
           Protecting users from web-based attacks with browser isolation

          Protecting users from web-based attacks with browser isolation

          September 26, 2019

          Battered by data breaches, organizations of all sizes and sectors are looking for new ways to reduce their attack surface. Because you cannot prevent — or even detect — every attack, improving [...]

          Read More 1
          • Tracy HickoxAnne - excellent points brought forward in th...
           Black Hat 2019: Communication, culture, and controversy

          Black Hat 2019: Communication, culture, and controversy

          August 22, 2019

          Now in its 22nd year, the conference was jam-packed with the latest cybersecurity research, threats, trends, and technologies.

          Read More 0
             Cybersecurity and privacy in the wake of GDPR

            Cybersecurity and privacy in the wake of GDPR

            July 9, 2019

            Organizations that collect, use, and share personal information are facing a sea change in the legal landscape for data protection and privacy.

            Read More 0
               How to address threats and secure your data in the cloud

              How to address threats and secure your data in the cloud

              May 28, 2019

              Enterprise cloud adoption is exploding as companies pursue the promise of operational efficiency, agility, flexibility, and profitability. But every technology has its drawbacks.

              Read More 0
                 How cyber attackers are flying under the radar and what you can do about it

                How cyber attackers are flying under the radar and what you can do about it

                May 2, 2019

                Cybercriminals adapted to diminishing returns from ransomware and cryptojacking with more stealthy and destructive techniques in 2018. Here's what you need to know about the evolving threats.

                Read More 0
                  Load More
                  Popular Posts
                  The top 21 tech conferences to attend in 2020
                  WVD vs. RDS: How to choose the remote desktop option in Microsoft Azure that fits you best
                  Building a cybersecurity roadmap: The path to success
                  7 can’t-miss Microsoft webinars hosted by SHI in Fall 2020

                  Subscribe
                  Get SHI updates sent right to your inbox. Never miss a post!

                  Follow
                  • Facebook
                    0 Followers
                  • Twitter
                    6.1k Followers
                  • RSS Feed
                    1.5k Followers
                  • YouTube
                    736 Followers
                  • Instagram
                    0 Followers
                  • LinkedIn
                    0 Followers

                  Subscribe to the SHI Blog
                  Product, program, and IT industry news, right to your inbox!

                  ""
                  1
                  Enter your email address
                  Previous
                  Next
                  Connect With Us
                  © 2018 SHI International Corp. All Rights Reserved. This site is owned and maintained by SHI for the use of its customers. | Privacy Policy

                  Pin It on Pinterest