Cybersecurity

Insight on cybersecurity topics, including identity and access management, extended threat detection, data protection, and end user training

Hybrid Workforce Series: Zero Trust Model

April 20, 2021
In this webinar, SHI outlines a five-step program for getting your Zero Trust model up and running.

How identity and access management (IAM) stops hackers in their tracks:
And what you should do to lock down one of the weakest aspects of your security posture.

March 9, 2021
Look at common identity protection mistakes and best practices for implementing access management solutions.

4 areas dominating the education technology landscape

February 25, 2021
Learn how COVID-19 drove hybrid learning, immersive technologies, esports, and cybersecurity in K-12.

The Houdini of hackers: An interview with Kevin Mitnick

February 18, 2021
Kevin Mitnick’s adventures as the world’s most wanted hacker are notorious.

Data encryption: How to avoid common pitfalls and improve cybersecurity:
Discover how to make sure you’re encrypting the right data

December 23, 2020
In this post, we’ll take a closer look at data encryption strategies, including how to make sure you’re encrypting the right data, how to avoid common pitfalls, and how to adhere to best practices.

Foxconn, FireEye, and SolarWinds: Key takeaways from high-profile breaches:
Strengthening your cyber defenses has never been more important

December 15, 2020
Between January and October, 36 billion records were exposed in data breaches. Here’s an overview of some of the latest high-profile cyberattacks, and what they teach us about cyber defense.

12 ways to protect your organization from ransomware

December 11, 2020
Cybercriminals are using more covert tactics with ransomware, carefully targeting organizations they believe are likely to pay a significant amount of money. Here are 12 tactics that can help protect your organization.

6 best practices for application security

August 3, 2020
Applications are the foundation of today’s enterprise, but they have vulnerabilities waiting to be exploited.

How organizations can optimize your data protection strategy:
Protect one of your most valuable assets

July 14, 2020
The right combination of backup solutions can support your long-term DR plans, control costs, and keep your most important data safe.

How to improve threat detection and response with MITRE ATT&CK:
A compelling way to move toward a more threat-informed defense

June 11, 2020
To enable more effective threat detection and response, organizations must incorporate threat intelligence and threat detection frameworks that look beyond simple indicators of compromise (IOCs).

Facing history with courage

June 3, 2020
Today the employees of SHI lend our voices in support of the peaceful protestors of the most recent episodes of inequality, injustice, and human rights violations.

Demystifying FIDO and the path to passwordless authentication:
It’s time to consider reducing your dependence on passwords

May 8, 2020
More than 80% of hacking-related data breaches involve compromised credentials. The Fast IDentity Online (FIDO) Alliance is trying to eliminate that vulnerability.

5 keys to successful privileged access management

March 10, 2020
Security teams are struggling: 74% of data breaches involve access to privileged accounts. Privileged access management could help, but only with the right strategy in place.

SHI achieves Microsoft Azure Expert MSP status

March 3, 2020
SHI has been designated a Microsoft Azure Expert Managed Services Provider (MSP) – a status bestowed on only 62 companies globally.

Medical device security: 3 ways to secure medical devices from cyberattacks

February 6, 2020
With the health information of more than 32 million people reportedly breached in just the last year alone, steps must be taken to stop more sensitive data from getting into the wrong hands.

Sort & Filter