CHI Corporation
  • About Us
    • Why Chi?
    • Our History
    • Professional Services
    • Chi’s GDPR Statement
    • Our Clients
    • Careers
    • LEARN
  • Solutions
    • Networking
    • Security
      • Network Security
      • Endpoint Security
      • Application Security
    • Data Storage
    • Backup and Recovery
    • Virtualization
    • Chi Cloud Solutions powered by Expedient
    • Autonomous Vehicles
  • Partners
  • Industries
    • Automotive
    • Banking
    • Healthcare
    • Higher Education
    • K-12 Education
      • E-RATE 2.0
    • Legal
    • Manufacturing
    • Media
    • Retail
  • Events
    • Chi-Sponsored Events
    • Trade Shows
  • Blog
  • Newsletter
  • Contact
Select Page
Shadow IT – Should Your Organization Worry?

Shadow IT – Should Your Organization Worry?

by Christine Thome | Dec 5, 2019 | mobile threats, Security

In today’s collaborative, mobile world, employees are constantly looking for new and better ways to get their work done. Whether it’s checking email on personal devices or sharing files via cloud-based apps, they’re bypassing IT-sanctioned technology...
10 Data Security Risks That Could Impact Your Company In 2020

10 Data Security Risks That Could Impact Your Company In 2020

by Christine Thome | Nov 8, 2019 | Infrastructure, mobile threats, Security

Few things are as ominous in today’s digital landscape as a data breach. I know this firsthand through my work in the insider threat detection and monitoring space. Not only do data breaches come with an immense cost, estimated at close to $4 million, but shifting...
Ransomware ROI From the Criminal Perspective

Ransomware ROI From the Criminal Perspective

by Christine Thome | Sep 11, 2019 | Backup, Infrastructure, mobile threats, Security

Are we going to pay?” This is how many conversations about ransomware get started, hopefully before falling victim to an attack.  In making that decision, companies will evaluate what goes into a ransomware defense program, what risk level they will accept, and how...
10 Types of Security Incidents and How to Handle Them

10 Types of Security Incidents and How to Handle Them

by Christine Thome | Aug 7, 2019 | mobile threats, Security

The expanding cyber threat landscape puts organizations at more risk of being attacked than ever before. As a result, enterprises must constantly monitor the threat landscape and be ready to respond to security incidents, data breaches, and cyberthreats when they...
5G Vs. WiFi 6: What It Means for IoT

5G Vs. WiFi 6: What It Means for IoT

by Christine Thome | May 1, 2019 | Infrastructure, mobile threats, Networking

Originally published on IoT for All, February 26, 2019 Thanks to two new wireless standards rolling out this year—WiFi 6 and 5G—2019 is shaping up to be a watershed year for the Internet of Things (IoT). These new technologies are expected to revolutionize IoT, and...
Seven Reasons to Never Forward Company Emails to Your Personal Account

Seven Reasons to Never Forward Company Emails to Your Personal Account

by Paul Comfort | Feb 12, 2019 | Cloud, mobile threats, Security

Several readers asked Paul Comfort, Chi’s Lead Engineer, to follow up his November 2018 Company Email vs Personal Email article with his thoughts on forwarding company email to a personal account.  If you have a tech or corporate question you’d like Paul...
« Older Entries

Contact Information

Telephone
440-498-2300
800-828-0599
Email
sales@chicorporation.com
Chi Corporation
5265 Naiman Pkwy
Cleveland, OH 44139

Recent Posts

  • Vulnerable Networks and How to Avoid Cyberattacks
  • Five Disruptive Storage Technologies for 2020
  • Shadow IT – Should Your Organization Worry?
  • The “Chill Factor” in a Secured Backup and Archive Solution

Connect

© Copyright 2017 Chi Corporation