Cybersecurity
Insight on cybersecurity topics, including identity and access management, extended threat detection, data protection, and end user training
SHI implements Azure Cloud solution in under 24 hours after evacuation:
As a wildfire threatened Barton Memorial Hospital, IT and cloud engineers swung into action
September 30, 2021
Read on for more on how Barton Health pivoted to the cloud as a wildfire threatened their hospital.
Start your secure future the right way with a Security Posture Review:
Evaluate your security stack and create a strategy to acquire or harden vital security tools with SHI’s free security assessments.
August 2, 2021
SHI’s SPR and SPR Lite are free assessments designed to unlock visibility into your entire security stack.
Innovation Heroes: Cybersecurity in a post-pandemic world:
Season 2, Episode 7
July 1, 2021
Learn tips to keep your infrastructure, employees, and data safe in the post-pandemic climate.
Zero Trust: A 5-point plan to modernizing secure access
June 24, 2021
This article will show you how to build an effective security approach with Zero Trust.
Hybrid Workforce Series: Extended Detection & Response (XDR)
April 27, 2021
Learn more about unified endpoint protection and using coordinated defense networks to improve security operations.
Hybrid Workforce Series: Zero Trust Model
April 20, 2021
In this webinar, SHI outlines a five-step program for getting your Zero Trust model up and running.
How identity and access management (IAM) stops hackers in their tracks:
And what you should do to lock down one of the weakest aspects of your security posture.
March 9, 2021
Look at common identity protection mistakes and best practices for implementing access management solutions.
4 areas dominating the education technology landscape
February 25, 2021
Learn how COVID-19 drove hybrid learning, immersive technologies, esports, and cybersecurity in K-12.
The Houdini of hackers: An interview with Kevin Mitnick
February 18, 2021
Kevin Mitnick’s adventures as the world’s most wanted hacker are notorious.
Data encryption: How to avoid common pitfalls and improve cybersecurity:
Discover how to make sure you’re encrypting the right data
December 23, 2020
In this post, we’ll take a closer look at data encryption strategies, including how to make sure you’re encrypting the right data, how to avoid common pitfalls, and how to adhere to best practices.
Foxconn, FireEye, and SolarWinds: Key takeaways from high-profile breaches:
Strengthening your cyber defenses has never been more important
December 15, 2020
Between January and October, 36 billion records were exposed in data breaches. Here’s an overview of some of the latest high-profile cyberattacks, and what they teach us about cyber defense.
12 ways to protect your organization from ransomware
December 11, 2020
Cybercriminals are using more covert tactics with ransomware, carefully targeting organizations they believe are likely to pay a significant amount of money. Here are 12 tactics that can help protect your organization.
How to bridge your cybersecurity gaps:
SHI's cybersecurity experts discuss techniques and security controls
August 20, 2020
View highlights from our June 2020 virtual summit.
6 best practices for application security
August 3, 2020
Applications are the foundation of today’s enterprise, but they have vulnerabilities waiting to be exploited.
Ask the experts: bridging the cybersecurity gap
July 29, 2020
Current end-user computing environments are posing difficulties for customers looking to secure their remote workers, devices, and data.