The Official Blog of SHI International
  • Home
  • Hardware
    • End-User Devices – Get the latest strategies to help deploy and manage the computers, tablets, and other devices your employees use every day.enduserdevices-menu
    • Data Center – Create a secure, available, and high-performance data center whether on site or in the cloud.datacenter-menu
    • Storage – Maintain, manage, and protect your organization’s data with the latest equipment and best practices.storagemenu
    • Networking – Design, implement, and secure a reliable, high-performance network using tried-and-true strategies.networkingmenu
    • Configuration – Assemble, stage, and deploy everything from end-user devices to advanced, on-premises data center hardware solutions.configurationmenu
    • Close
  • Software
    • Microsoft – Learn how the newest Microsoft products, programs, and volume licensing changes could affect your IT environment.microsoftmenu
    • Volume Licensing – Review changes to licensing programs from the industry’s major software publishers and how they could impact your current or future licensing plans.volumelicensing-menu
    • SAM/IT Asset Management – Take control of deployed software, volume licensing, and internal governance to maximize ROI, ensure compliance, and avoid an audit.samitammenu
    • Close
  • Solutions
    • Case Studies – Learn about the real-world business and IT results SHI has delivered to some of our 18,000 customers around the globe.casestudies-menu
    • Professional Services – Extend the capabilities of your in-house IT team by outsourcing IT readiness assessments and project management.professionalservices-menu
    • Security – Protect your organization from internal and external threats by developing a comprehensive security posture.securitymenu
    • Mobility – Equip, empower, and manage a more productive mobile workforce with the best devices, strategies, and tools.mobilitymenu
    • Big Data – From data storage to analytics, explore big data’s challenges and opportunities to maximize its potential.bigdata-menu
    • Close
  • Cloud
    • AWS – Find news and tips to optimize your experience using the largest public cloud provider.aws-menu
    • Azure – Read the latest news, licensing, use cases, and best practices for infrastructure- and platform-as-a-service from Microsoft.azuremenu
    • Office 365 – Get familiar with licensing, deployment, security, and productivity for Microsoft’s cloud-based Office suite.office365-menu
    • Hybrid – Architect, implement, and utilize a combination of on-premises, private cloud, and public cloud services.hybridmenu
    • Virtualization – Uncover how virtualization can create efficiencies and safeguards, and improve end-user experience.virtualizationmenu
    • Close
  • News
    • SHI News – See what’s happening behind the scenes at SHI, from quarterly earnings to awards and new partnership announcements.shinewsmenu
    • IT News/Events – Analyze the biggest tech news of the day, from major mergers and acquisitions to on-the-ground reporting from major industry events.itneweventsmenu
    • Staff Picks – All work and no play makes for a dull day. Find out what tech stories we’re reading in our spare time.staffpicks-menu
    • Close
  • SHI.com
  • Home
  • Hardware
    • End-User Devices – Get the latest strategies to help deploy and manage the computers, tablets, and other devices your employees use every day.enduserdevices-menu
    • Data Center – Create a secure, available, and high-performance data center whether on site or in the cloud.datacenter-menu
    • Storage – Maintain, manage, and protect your organization’s data with the latest equipment and best practices.storagemenu
    • Networking – Design, implement, and secure a reliable, high-performance network using tried-and-true strategies.networkingmenu
    • Configuration – Assemble, stage, and deploy everything from end-user devices to advanced, on-premises data center hardware solutions.configurationmenu
    • Close
  • Software
    • Microsoft – Learn how the newest Microsoft products, programs, and volume licensing changes could affect your IT environment.microsoftmenu
    • Volume Licensing – Review changes to licensing programs from the industry’s major software publishers and how they could impact your current or future licensing plans.volumelicensing-menu
    • SAM/IT Asset Management – Take control of deployed software, volume licensing, and internal governance to maximize ROI, ensure compliance, and avoid an audit.samitammenu
    • Close
  • Solutions
    • Case Studies – Learn about the real-world business and IT results SHI has delivered to some of our 18,000 customers around the globe.casestudies-menu
    • Professional Services – Extend the capabilities of your in-house IT team by outsourcing IT readiness assessments and project management.professionalservices-menu
    • Security – Protect your organization from internal and external threats by developing a comprehensive security posture.securitymenu
    • Mobility – Equip, empower, and manage a more productive mobile workforce with the best devices, strategies, and tools.mobilitymenu
    • Big Data – From data storage to analytics, explore big data’s challenges and opportunities to maximize its potential.bigdata-menu
    • Close
  • Cloud
    • AWS – Find news and tips to optimize your experience using the largest public cloud provider.aws-menu
    • Azure – Read the latest news, licensing, use cases, and best practices for infrastructure- and platform-as-a-service from Microsoft.azuremenu
    • Office 365 – Get familiar with licensing, deployment, security, and productivity for Microsoft’s cloud-based Office suite.office365-menu
    • Hybrid – Architect, implement, and utilize a combination of on-premises, private cloud, and public cloud services.hybridmenu
    • Virtualization – Uncover how virtualization can create efficiencies and safeguards, and improve end-user experience.virtualizationmenu
    • Close
  • News
    • SHI News – See what’s happening behind the scenes at SHI, from quarterly earnings to awards and new partnership announcements.shinewsmenu
    • IT News/Events – Analyze the biggest tech news of the day, from major mergers and acquisitions to on-the-ground reporting from major industry events.itneweventsmenu
    • Staff Picks – All work and no play makes for a dull day. Find out what tech stories we’re reading in our spare time.staffpicks-menu
    • Close
  • SHI.com

Archives

Tag Archives for: "Security threats"
Home » Security threats
 12 ways to protect your organization from ransomware

12 ways to protect your organization from ransomware

December 11, 2020

Cybercriminals are using more covert tactics with ransomware, carefully targeting organizations they believe are likely to pay a significant amount of money. Here are 12 tactics that can help [...]

Read More 1
  • TomGreat article Anne. Thanks :-) Below are ...
 Insider risks of remote work on the rise: How to protect your organization

Insider risks of remote work on the rise: How to protect your organization

September 10, 2020

The recent shift to global, distributed work has emphasized key security concerns. Here are two of the most common insider risks of remote work, and how you can defend against them.

Read More 0
     How to improve threat detection and response with MITRE ATT&CK

    How to improve threat detection and response with MITRE ATT&CK

    June 11, 2020

    To enable more effective threat detection and response, organizations must incorporate threat intelligence and threat detection frameworks that look beyond simple indicators of compromise (IOCs).

    Read More 0
       Security awareness training: Bridging the technology and people divide

      Security awareness training: Bridging the technology and people divide

      December 3, 2019

      The threat landscape has shifted dramatically in the past few years. According to the 2019 Verizon Data Breach Investigations Report, 94% of all breaches are from attacks targeting people. So if [...]

      Read More 0
         2 key takeaways from the 2019 Verizon DBIR

        2 key takeaways from the 2019 Verizon DBIR

        September 3, 2019

        Security professionals always look forward to Verizon’s analysis of the past year’s data breach activity. The 2019 Data Breach Investigation Report (DBIR) doesn’t disappoint. It details more than [...]

        Read More 0
           Ransomware 101: What it is and how to protect yourself

          Ransomware 101: What it is and how to protect yourself

          June 20, 2016

          Ransomware was once a blip on the cyber security radar, but times have changed: Ransomware attacks grew nearly 500 percent, to 3.8 million attacks, from 2014 to 2015. Ransomware has been [...]

          Read More 0
             Is your phone safe from mobile malware?

            Is your phone safe from mobile malware?

            August 11, 2015

            A decade ago, Windows machines were perceived as the target of all malware. Today, malware is a threat to all platforms. Rather than one popular operating system being inherently more secure than [...]

            Read More 0
               Cyberattackers had a great 2014. Here’s how to stay ahead of them in the second half of 2015.

              Cyberattackers had a great 2014. Here’s how to stay ahead of them in the second half of 2015.

              July 21, 2015

              2014 was a banner year for cyberattackers, but not security. The high-profile data breaches of last year prove that antivirus is not enough, and the numbers of spear-phishing and web-based [...]

              Read More 0
                 Is it a patch, or just another problem for your network?

                Is it a patch, or just another problem for your network?

                July 14, 2015

                When is a patch not a patch? When it becomes another exploit on your network. We sometimes lose sight of these obvious points when talking about patching and vulnerability management. At [...]

                Read More 0
                   Why it’s time to rethink what drives your IT security program

                  Why it’s time to rethink what drives your IT security program

                  May 19, 2015

                  In the past, IT security was like insurance, viewed as an expense, not a revenue generator. That perception left IT with minimal dollars allocated to securing networks, data, and other assets. [...]

                  Read More 0
                    Load More
                    Popular Posts
                    The top 21 tech conferences to attend in 2020
                    WVD vs. RDS: How to choose the remote desktop option in Microsoft Azure that fits you best
                    Building a cybersecurity roadmap: The path to success
                    7 can’t-miss Microsoft webinars hosted by SHI in Fall 2020

                    Subscribe
                    Get SHI updates sent right to your inbox. Never miss a post!

                    Follow
                    • Facebook
                      0 Followers
                    • Twitter
                      6.1k Followers
                    • RSS Feed
                      1.5k Followers
                    • YouTube
                      736 Followers
                    • Instagram
                      0 Followers
                    • LinkedIn
                      0 Followers

                    Subscribe to the SHI Blog
                    Product, program, and IT industry news, right to your inbox!

                    ""
                    1
                    Enter your email address
                    Previous
                    Next
                    Connect With Us
                    © 2018 SHI International Corp. All Rights Reserved. This site is owned and maintained by SHI for the use of its customers. | Privacy Policy

                    Pin It on Pinterest