Security Operations

Leverage SHI resources to improve IT cybersecurity operations monitoring, analysis of and response to known and unknown threats

12 ways to protect your organization from ransomware

December 11, 2020
Cybercriminals are using more covert tactics with ransomware, carefully targeting organizations they believe are likely to pay a significant amount of money. Here are 12 tactics that can help protect your organization.

SHI receives Verizon’s 2020 Supplier Sustainability Award:
See how you can limit your carbon footprint and dispose of your electronics responsibly

December 3, 2020
SHI has a long history of advising Verizon on innovative substrates, formats, and process efficiencies for reducing the organization’s carbon footprint. This year, SHI received Verizon’s 2020 Supplier Sustainability Award.

Summit recap: Anatomy of a cyberattack:
As remote workforces have grown, so too has the potential attack surface

July 29, 2020
SHI’s security experts discuss techniques for securing remote workers, devices and data.

Summit recap: Bridging the cybersecurity gap:
Our experts offer top-of-mind remediation techniques for maintaining a secure environment

July 29, 2020
SHI’s security experts discuss techniques for securing remote workers, devices and data.

Ask the experts: bridging the cybersecurity gap

July 29, 2020
Current end-user computing environments are posing difficulties for customers looking to secure their remote workers, devices, and data.

Bridging the cybersecurity gap

June 11, 2020
This panel explores the most pressing cybersecurity issues organizations face today.

How to improve threat detection and response with MITRE ATT&CK:
A compelling way to move toward a more threat-informed defense

June 11, 2020
To enable more effective threat detection and response, organizations must incorporate threat intelligence and threat detection frameworks that look beyond simple indicators of compromise (IOCs).

Facing history with courage

June 3, 2020
Today the employees of SHI lend our voices in support of the peaceful protestors of the most recent episodes of inequality, injustice, and human rights violations.

4 ways AI is changing how IT leaders approach endpoint security

May 26, 2020
Artificial intelligence (AI) and robotic process automation (RPA) are offering organizations new advantages in their security practice.

The most important steps in the lead up and aftermath of a cyber breach

April 30, 2020
When an incident occurs, every moment counts. Here's how to make sure you're prepared to quickly identify, contain, and remediate cyber threats.

SHI achieves Microsoft Azure Expert MSP status

March 3, 2020
SHI has been designated a Microsoft Azure Expert Managed Services Provider (MSP) – a status bestowed on only 62 companies globally.

Is your public sector organization struggling to finance your dream project? There’s probably a grant for that!

February 20, 2020
Often, public sector organizations are forced to put their dream projects on hold – or scrap them entirely – because they lack proper funding or resources to get the initiative off the ground.

Medical device security: 3 ways to secure medical devices from cyberattacks

February 6, 2020
With the health information of more than 32 million people reportedly breached in just the last year alone, steps must be taken to stop more sensitive data from getting into the wrong hands.

SHI’s Austin office named a Best Place to Work:
Austin American-Statesman names SHI a Top Workplace for the greater Austin area.

November 4, 2019
SHI’s Austin, Texas office has once again been named one of the city’s top places to work!

Protect users from web-based attacks with browser isolation:
As cybercriminals continue to up their game, organizations need to reduce their attack surface

September 26, 2019
Cybercriminals generate, launder, spend, and reinvest more than $1 trillion a year, and it's predicted to increase.

Sort & Filter