CHI Corporation
  • About Us
    • Why Chi?
    • Our History
    • Chi’s GDPR Statement
    • Our Clients
    • Careers
    • LEARN
  • Solutions
    • Networking
    • Security
      • Network Security
      • Endpoint Security
      • Application Security
    • Data Storage
    • Cloud Solutions
    • Backup and Recovery
    • Virtualization
    • Professional Services
    • Autonomous Vehicles
  • Partners
  • Industries
    • Automotive
    • Banking
    • Healthcare
    • Higher Education
    • K-12 Education
      • E-RATE 2.0
    • Legal
    • Manufacturing
    • Media
    • Retail
  • Events
    • Chi Events & Webcasts
    • Trade Shows
  • Blog
  • Contact
  • Professional Services
Select Page

Ransomware ROI From the Criminal Perspective

by Christine Thome | Sep 11, 2019 | Backup, Infrastructure, mobile threats, Security

Are we going to pay?” This is how many conversations about ransomware get started, hopefully before falling victim to an attack.  In making that decision, companies will evaluate what goes into a ransomware defense program, what risk level they will accept, and how...

10 Types of Security Incidents and How to Handle Them

by Christine Thome | Aug 7, 2019 | mobile threats, Security

The expanding cyber threat landscape puts organizations at more risk of being attacked than ever before. As a result, enterprises must constantly monitor the threat landscape and be ready to respond to security incidents, data breaches, and cyberthreats when they...

5G Vs. WiFi 6: What It Means for IoT

by Christine Thome | May 1, 2019 | Infrastructure, mobile threats, Networking

Originally published on IoT for All, February 26, 2019 Thanks to two new wireless standards rolling out this year—WiFi 6 and 5G—2019 is shaping up to be a watershed year for the Internet of Things (IoT). These new technologies are expected to revolutionize IoT, and...

Seven Reasons to Never Forward Company Emails to Your Personal Account

by Paul Comfort | Feb 12, 2019 | Cloud, mobile threats, Security

Several readers asked Paul Comfort, Chi’s Lead Engineer, to follow up his November 2018 Company Email vs Personal Email article with his thoughts on forwarding company email to a personal account.  If you have a tech or corporate question you’d like Paul...

Deploying Multiple Security Tools Might Be The Reason You’re Breached

by Christine Thome | Jan 9, 2019 | mobile threats, Security

Originally published in PC World, December 18, 2018, by Brett Raphael, Managing Director of Australia & New Zealand, CrowdStrike  Gartner’s latest global forecast for spending on information security products and services shows spending across the world is set to...

What’s the Difference Between Spam, Phishing and Spear Phishing?

by Paul Comfort | Jul 16, 2018 | Infrastructure, mobile threats, Security

Twenty years ago, if you mentioned spam and phishing in the same sentence, one would assume you were enjoying some time on the lake and a sandwich made from canned meat. In today’s IT world, those words have much more menacing meanings (although the canned meat...
« Older Entries
Next Entries »

Contact Information

Telephone
440-498-2300
800-828-0599
Email
sales@chicorporation.com
Chi Corporation
5265 Naiman Pkwy
Cleveland, OH 44139

Recent Posts

  • The Rising Threat of Email Attachments
  • Turning Cloud Migration Costs into Cloud Storage Savings
  • Why Microsegmentation is Key to Enhancing Network Security
  • It’s Called a Vault For a Reason: Why CISOs Are Embracing Cloud Object Storage 

Connect

© Copyright 2017 Chi Corporation