Cybersecurity
Insight on cybersecurity topics, including identity and access management, extended threat detection, data protection, and end user training
The Houdini of hackers: An interview with Kevin Mitnick
February 18, 2021
Kevin Mitnick’s adventures as the world’s most wanted hacker are notorious.
Data encryption: How to avoid common pitfalls and improve cybersecurity:
Discover how to make sure you’re encrypting the right data
December 23, 2020
In this post, we’ll take a closer look at data encryption strategies, including how to make sure you’re encrypting the right data, how to avoid common pitfalls, and how to adhere to best practices.
Foxconn, FireEye, and SolarWinds: Key takeaways from high-profile breaches:
Strengthening your cyber defenses has never been more important
December 15, 2020
Between January and October, 36 billion records were exposed in data breaches. Here’s an overview of some of the latest high-profile cyberattacks, and what they teach us about cyber defense.
12 ways to protect your organization from ransomware
December 11, 2020
Cybercriminals are using more covert tactics with ransomware, carefully targeting organizations they believe are likely to pay a significant amount of money. Here are 12 tactics that can help protect your organization.
How to bridge your cybersecurity gaps:
SHI's cybersecurity experts discuss techniques and security controls
August 20, 2020
View highlights from our June 2020 virtual summit.
6 best practices for application security
August 3, 2020
Applications are the foundation of today’s enterprise, but they have vulnerabilities waiting to be exploited.
Ask the experts: bridging the cybersecurity gap
July 29, 2020
Current end-user computing environments are posing difficulties for customers looking to secure their remote workers, devices, and data.
How organizations can optimize your data protection strategy:
Protect one of your most valuable assets
July 14, 2020
The right combination of backup solutions can support your long-term DR plans, control costs, and keep your most important data safe.
How to improve threat detection and response with MITRE ATT&CK:
A compelling way to move toward a more threat-informed defense
June 11, 2020
To enable more effective threat detection and response, organizations must incorporate threat intelligence and threat detection frameworks that look beyond simple indicators of compromise (IOCs).
Facing history with courage
June 3, 2020
Today the employees of SHI lend our voices in support of the peaceful protestors of the most recent episodes of inequality, injustice, and human rights violations.
Demystifying FIDO and the path to passwordless authentication:
It’s time to consider reducing your dependence on passwords
May 8, 2020
More than 80% of hacking-related data breaches involve compromised credentials. The Fast IDentity Online (FIDO) Alliance is trying to eliminate that vulnerability.
The most important steps in the lead up and aftermath of a cyber breach
April 30, 2020
When an incident occurs, every moment counts. Here's how to make sure you're prepared to quickly identify, contain, and remediate cyber threats.
Securing your remote workforce during COVID-19
March 27, 2020
Allowing remote workers to access critical systems and data from endpoints and networks you don’t manage increases risk. Validating and reinforcing your cybersecurity, therefore, should be a top priority.
5 keys to successful privileged access management
March 10, 2020
Security teams are struggling: 74% of data breaches involve access to privileged accounts. Privileged access management could help, but only with the right strategy in place.
SHI achieves Microsoft Azure Expert MSP status
March 3, 2020
SHI has been designated a Microsoft Azure Expert Managed Services Provider (MSP) – a status bestowed on only 62 companies globally.