Search Results
Your central resource for insights, thought leadership, and news from SHI
Demystifying FIDO and the path to passwordless authentication:
It’s time to consider reducing your dependence on passwords
May 8, 2020
More than 80% of hacking-related data breaches involve compromised credentials. The Fast IDentity Online (FIDO) Alliance is trying to eliminate that vulnerability.
Best practices to stay current on IBM licensing
April 16, 2020
IBM introduces software changes and updates all the time. Here’s how to ensure licensing compliance and a strong user experience.
5 keys to successful privileged access management
March 10, 2020
Security teams are struggling: 74% of data breaches involve access to privileged accounts. Privileged access management could help, but only with the right strategy in place.
SHI achieves Microsoft Azure Expert MSP status
March 3, 2020
SHI has been designated a Microsoft Azure Expert Managed Services Provider (MSP) – a status bestowed on only 62 companies globally.
Medical device security: 3 ways to secure medical devices from cyberattacks
February 6, 2020
With the health information of more than 32 million people reportedly breached in just the last year alone, steps must be taken to stop more sensitive data from getting into the wrong hands.
Seeing the glass half full: 4 cybersecurity trends for 2020:
As data breaches increase, it’s time to sharpen our focus on cyber defense
January 9, 2020
As data breaches increase in volume and severity, it’s time to sharpen our focus on cyber defense. Here are four trends for 2020.
Security awareness training: Bridging the technology and people divide:
Attackers are focusing on people, not infrastructure
December 3, 2019
The threat landscape has shifted dramatically in the past few years, how do we tackle the problem?
Enterprise architecture for AWS: Why it’s essential and how to get started:
SHI can help you implement a strategic approach
October 29, 2019
Enterprise architecture creates standards for planning, designing, & deploying your workloads in the cloud.
How a Cloud Architecture Review can help you improve workloads on Azure:
Build and operate a reliable, secure, and efficient cloud infrastructure
October 10, 2019
Microsoft Azure releases thousands of updates and new features every year. Here's what you need to know.
Adopting macOS in corporate environments: It’s time.
October 1, 2019
Organizations are reluctant to use Mac in corporate environments. Here's why you need to reconsider.
AWS Well-Architected Review: What it is, and why it matters
September 19, 2019
The AWS WAR framework allows your solution architects to take a lifecycle approach to managing your AWS workload.
Choosing an ITAM solution: DIY vs. managed service
September 10, 2019
There are typically two IT asset management options. We’re walking through the factors you need to consider.
What you need to know about Windows Virtual Desktop:
Is a VDI approach the best fit for your organization?
August 6, 2019
The benefits to virtual desktop infrastructure are many, but how do you get started with VDI?
How to address threats and secure your data in the cloud:
Cloud security is a two-way street
May 28, 2019
As enterprise cloud adoption is exploding with the promise of operational efficiency, organizations need to analyze areas of risk and match the increase in cloud adoption with a stronger focus on data security.
The best cloud migration strategy? It’s not lift and shift:
Choose wisely: your implementation strategy will determine whether you succeed or fail.
April 2, 2019
The implementation strategy you choose for each application will determine your success or failure.
