The Official Blog of SHI International
  • Home
  • Hardware
    • End-User Devices – Get the latest strategies to help deploy and manage the computers, tablets, and other devices your employees use every day.enduserdevices-menu
    • Data Center – Create a secure, available, and high-performance data center whether on site or in the cloud.datacenter-menu
    • Storage – Maintain, manage, and protect your organization’s data with the latest equipment and best practices.storagemenu
    • Networking – Design, implement, and secure a reliable, high-performance network using tried-and-true strategies.networkingmenu
    • Configuration – Assemble, stage, and deploy everything from end-user devices to advanced, on-premises data center hardware solutions.configurationmenu
    • Close
  • Software
    • Microsoft – Learn how the newest Microsoft products, programs, and volume licensing changes could affect your IT environment.microsoftmenu
    • Volume Licensing – Review changes to licensing programs from the industry’s major software publishers and how they could impact your current or future licensing plans.volumelicensing-menu
    • SAM/IT Asset Management – Take control of deployed software, volume licensing, and internal governance to maximize ROI, ensure compliance, and avoid an audit.samitammenu
    • Close
  • Solutions
    • Case Studies – Learn about the real-world business and IT results SHI has delivered to some of our 18,000 customers around the globe.casestudies-menu
    • Professional Services – Extend the capabilities of your in-house IT team by outsourcing IT readiness assessments and project management.professionalservices-menu
    • Security – Protect your organization from internal and external threats by developing a comprehensive security posture.securitymenu
    • Mobility – Equip, empower, and manage a more productive mobile workforce with the best devices, strategies, and tools.mobilitymenu
    • Big Data – From data storage to analytics, explore big data’s challenges and opportunities to maximize its potential.bigdata-menu
    • Close
  • Cloud
    • AWS – Find news and tips to optimize your experience using the largest public cloud provider.aws-menu
    • Azure – Read the latest news, licensing, use cases, and best practices for infrastructure- and platform-as-a-service from Microsoft.azuremenu
    • Office 365 – Get familiar with licensing, deployment, security, and productivity for Microsoft’s cloud-based Office suite.office365-menu
    • Hybrid – Architect, implement, and utilize a combination of on-premises, private cloud, and public cloud services.hybridmenu
    • Virtualization – Uncover how virtualization can create efficiencies and safeguards, and improve end-user experience.virtualizationmenu
    • Close
  • News
    • SHI News – See what’s happening behind the scenes at SHI, from quarterly earnings to awards and new partnership announcements.shinewsmenu
    • IT News/Events – Analyze the biggest tech news of the day, from major mergers and acquisitions to on-the-ground reporting from major industry events.itneweventsmenu
    • Staff Picks – All work and no play makes for a dull day. Find out what tech stories we’re reading in our spare time.staffpicks-menu
    • Close
  • SHI.com
  • Home
  • Hardware
    • End-User Devices – Get the latest strategies to help deploy and manage the computers, tablets, and other devices your employees use every day.enduserdevices-menu
    • Data Center – Create a secure, available, and high-performance data center whether on site or in the cloud.datacenter-menu
    • Storage – Maintain, manage, and protect your organization’s data with the latest equipment and best practices.storagemenu
    • Networking – Design, implement, and secure a reliable, high-performance network using tried-and-true strategies.networkingmenu
    • Configuration – Assemble, stage, and deploy everything from end-user devices to advanced, on-premises data center hardware solutions.configurationmenu
    • Close
  • Software
    • Microsoft – Learn how the newest Microsoft products, programs, and volume licensing changes could affect your IT environment.microsoftmenu
    • Volume Licensing – Review changes to licensing programs from the industry’s major software publishers and how they could impact your current or future licensing plans.volumelicensing-menu
    • SAM/IT Asset Management – Take control of deployed software, volume licensing, and internal governance to maximize ROI, ensure compliance, and avoid an audit.samitammenu
    • Close
  • Solutions
    • Case Studies – Learn about the real-world business and IT results SHI has delivered to some of our 18,000 customers around the globe.casestudies-menu
    • Professional Services – Extend the capabilities of your in-house IT team by outsourcing IT readiness assessments and project management.professionalservices-menu
    • Security – Protect your organization from internal and external threats by developing a comprehensive security posture.securitymenu
    • Mobility – Equip, empower, and manage a more productive mobile workforce with the best devices, strategies, and tools.mobilitymenu
    • Big Data – From data storage to analytics, explore big data’s challenges and opportunities to maximize its potential.bigdata-menu
    • Close
  • Cloud
    • AWS – Find news and tips to optimize your experience using the largest public cloud provider.aws-menu
    • Azure – Read the latest news, licensing, use cases, and best practices for infrastructure- and platform-as-a-service from Microsoft.azuremenu
    • Office 365 – Get familiar with licensing, deployment, security, and productivity for Microsoft’s cloud-based Office suite.office365-menu
    • Hybrid – Architect, implement, and utilize a combination of on-premises, private cloud, and public cloud services.hybridmenu
    • Virtualization – Uncover how virtualization can create efficiencies and safeguards, and improve end-user experience.virtualizationmenu
    • Close
  • News
    • SHI News – See what’s happening behind the scenes at SHI, from quarterly earnings to awards and new partnership announcements.shinewsmenu
    • IT News/Events – Analyze the biggest tech news of the day, from major mergers and acquisitions to on-the-ground reporting from major industry events.itneweventsmenu
    • Staff Picks – All work and no play makes for a dull day. Find out what tech stories we’re reading in our spare time.staffpicks-menu
    • Close
  • SHI.com

Archives

Author Archive for: "DavidO"
Home » Archives for David O'Leary
 Foxconn, FireEye, and SolarWinds: Key takeaways from high-profile breaches

Foxconn, FireEye, and SolarWinds: Key takeaways from high-profile breaches

December 15, 2020

Between January and October, 36 billion records were exposed in data breaches. Here’s an overview of some of the latest high-profile cyberattacks, and what they teach us about cyber defense.

Read More 0
     Best practices for building an effective security awareness program

    Best practices for building an effective security awareness program

    September 3, 2020

    The best security tools in the world can’t compensate for a lack of awareness. Here are nine steps to foster a culture of cybersecurity and transform awareness training from an annual event into [...]

    Read More 0
       Securing your remote workforce during COVID-19

      Securing your remote workforce during COVID-19

      March 27, 2020

      Allowing remote workers to access critical systems and data from endpoints and networks you don’t manage increases risk. Validating and reinforcing your cybersecurity, therefore, should be a top [...]

      Read More 0
         5 keys to successful privileged access management

        5 keys to successful privileged access management

        March 10, 2020

        Security teams are struggling: 74% of data breaches involve access to privileged accounts. Privileged access management could help, but only with the right strategy in place.

        Read More 0
           Still running Windows 7? Take these 3 precautions to protect yourself against cybercriminals

          Still running Windows 7? Take these 3 precautions to protect yourself against cybercriminals

          January 28, 2020

          With Windows 7 extended support reaching end of life, companies still running applications on this operating system could be at risk for cyber attack. Here are three steps you should take to [...]

          Read More 0
             Seeing the glass half full: 4 cybersecurity trends for 2020

            Seeing the glass half full: 4 cybersecurity trends for 2020

            January 9, 2020

            As data breaches increase in volume and severity, it’s time to sharpen our focus on cyber defense. Here are four trends for 2020, and actions your organization can take to improve your [...]

            Read More 0
               Protecting users from web-based attacks with browser isolation

              Protecting users from web-based attacks with browser isolation

              September 26, 2019

              Battered by data breaches, organizations of all sizes and sectors are looking for new ways to reduce their attack surface. Because you cannot prevent — or even detect — every attack, improving [...]

              Read More 1
              • Tracy HickoxAnne - excellent points brought forward in th...
               2 key takeaways from the 2019 Verizon DBIR

              2 key takeaways from the 2019 Verizon DBIR

              September 3, 2019

              Security professionals always look forward to Verizon’s analysis of the past year’s data breach activity. The 2019 Data Breach Investigation Report (DBIR) doesn’t disappoint. It details more than [...]

              Read More 0
                 Black Hat 2019: Communication, culture, and controversy

                Black Hat 2019: Communication, culture, and controversy

                August 22, 2019

                Now in its 22nd year, the conference was jam-packed with the latest cybersecurity research, threats, trends, and technologies.

                Read More 0
                   How to address threats and secure your data in the cloud

                  How to address threats and secure your data in the cloud

                  May 28, 2019

                  Enterprise cloud adoption is exploding as companies pursue the promise of operational efficiency, agility, flexibility, and profitability. But every technology has its drawbacks.

                  Read More 0
                    Load More
                    Popular Posts
                    The top 21 tech conferences to attend in 2021
                    Building a cybersecurity roadmap: The path to success
                    7 can’t-miss Microsoft webinars hosted by SHI in Fall 2020
                    Facing history with courage

                    Subscribe
                    Get SHI updates sent right to your inbox. Never miss a post!

                    Follow
                    • Facebook
                      0 Followers
                    • Twitter
                      6.1k Followers
                    • RSS Feed
                      1.5k Followers
                    • YouTube
                      750 Followers
                    • Instagram
                      0 Followers
                    • LinkedIn
                      0 Followers

                    Subscribe to the SHI Blog
                    Product, program, and IT industry news, right to your inbox!

                    ""
                    1
                    Enter your email address
                    Previous
                    Next
                    Connect With Us
                    © 2018 SHI International Corp. All Rights Reserved. This site is owned and maintained by SHI for the use of its customers. | Privacy Policy

                    Pin It on Pinterest