January 23, 2019

How to Secure Your Network on a Budget

We all know that in recent years, there has been an exponential increase in the scale and sophistication of cybersecurity attacks. Taking on unprecedented shapes and forms, such security incidents

Read More
January 09, 2019

Cybersecurity Failures Part II - Data Breaches from 2018

Data breaches are not a new phenomenon, and everyone who lives in the digital world is aware of the vulnerabilities that we face as individuals, or as businesses. Short of having no digital

Read More
1
January 23, 2019

How to Secure Your Network on a Budget

We all know that in recent years, there has been an exponential increase in the scale and sophistication of cybersecurity attacks. Taking on unprecedented shapes and forms, such security incidents

Read More
January 09, 2019

Cybersecurity Failures Part II - Data Breaches from 2018

Data breaches are not a new phenomenon, and everyone who lives in the digital world is aware of the vulnerabilities that we face as individuals, or as businesses. Short of having no digital

Read More
1

How to Secure Your Network on a Budget

Posted by GlassHouse Systems on Jan 23, 2019 10:58:35 AM

We all know that in recent years, there has been an exponential increase in the scale and sophistication of cybersecurity attacks. Taking on unprecedented shapes and forms, such security incidents have led to devastating effects on the reputation and profitability of the impacted businesses. Whether you are an IT specialist at a small or medium sized business, or the CIO of a large enterprise, cybersecurity will continue to be one of your key areas of concern. However, very often, the competitive landscape, tough economic situations and ever-shrinking budgets will mean that you have to cut corners on your IT spends.

Read More

Topics: cyber security, Security

Cybersecurity Failures Part II - Data Breaches from 2018

Posted by GlassHouse Systems on Jan 9, 2019 12:56:01 PM

Data breaches are not a new phenomenon, and everyone who lives in the digital world is aware of the vulnerabilities that we face as individuals, or as businesses. Short of having no digital presence and staying completely offline, there is no way to achieve 100 percent foolproof protection for your private and confidential data. In Part I of our blog post, we looked at 2018’s most talked-about breach (Facebook), as well as the largest hack in terms of number of records (Marriott Hotels). In this continuing piece, we will look at a few more incidents that hit a whole new level of intrusion. As CIOs or IT security specialists, you may want to study the gaps or negligence in cybersecurity measures that led to these events and take the necessary steps to strengthen your enterprise security.

Read More

Topics: cyber security, Security