Cybersecurity

Data encryption: How to avoid common pitfalls and improve cybersecurity

December 23, 2020
In this post, we’ll take a closer look at data encryption strategies, including how to make sure you’re encrypting the right data, how to avoid common pitfalls, and how to adhere to best practices.

Stratascale: Digital agility delivered

December 17, 2020
Stratascale is an exciting new consulting services venture from SHI, one of the world’s most successful IT Solutions provider.

Foxconn, FireEye, and SolarWinds: Key takeaways from high-profile breaches

December 15, 2020
Between January and October, 36 billion records were exposed in data breaches. Here’s an overview of some of the latest high-profile cyberattacks, and what they teach us about cyber defense.

12 ways to protect your organization from ransomware

December 11, 2020
Cybercriminals are using more covert tactics with ransomware, carefully targeting organizations they believe are likely to pay a significant amount of money. Here are 12 tactics that can help protect your organization.

SHI receives Verizon’s 2020 Supplier Sustainability Award

December 3, 2020
SHI has a long history of advising Verizon on innovative substrates, formats, and process efficiencies for reducing the organization’s carbon footprint. This year, SHI received Verizon’s 2020 Supplier Sustainability Award.

Insider risks of remote work on the rise: How to protect your organization

September 10, 2020
Here are two of the most common insider risks of remote work, and how you can defend against them.

Best practices for building an effective security awareness program

September 3, 2020
Here are nine steps to foster a culture of cybersecurity and transform awareness training from an annual event into a lifecycle.

How to bridge your cybersecurity gaps

August 20, 2020
View highlights from our June 2020 virtual summit.

6 best practices for application security

August 3, 2020
Applications are the foundation of today’s enterprise, but they have vulnerabilities waiting to be exploited.

Summit recap: Anatomy of a cyberattack

July 29, 2020
SHI’s security experts discuss techniques for securing remote workers, devices and data.

Summit recap: Bridging the cybersecurity gap

July 29, 2020
SHI’s security experts discuss techniques for securing remote workers, devices and data.

Ask the experts: bridging the cybersecurity gap

July 29, 2020
Current end user computing environments are posing difficulties for customers looking to secure their remote workers, devices and data.