GlassHouse Systems

Recent Posts

August 19, 2020

5G IoT and Cybersecurity: High Risk, High Reward

According to a new study from Juniper Research, the advent of 5G will cause an explosion in ubiquity and profitability for IoT devices: total operator-billed revenue is predicted to rise

Read More
August 11, 2020

Introducing the Red Hat® Ansible® Automation Platform

We'd like to thank Red Hat® for this guest blog.

Read More
July 14, 2020

Flash Storage: The Benefits for Business Users

Flash storage is a storage media technology that is designed to electronically secure data. Flash technology offers users high-speed, electronically programmable memory that eliminates rotational

Read More
July 07, 2020

While the Healthcare Industry Focuses on COVID-19, Hackers Turn Relentless!

The past few months have played witness to a sharp rise in cybersecurity attacks against healthcare providers. Historically speaking, the healthcare industry has lagged behind other major

Read More
June 18, 2020

The Impact of COVID-19 on Cybersecurity

In a few short months, the Coronavirus (COVID-19) pandemic has forced massive change across the world. While governments are grappling with how to repair health and economic systems,

Read More
May 19, 2020

Cybersecurity Risks of Working from Home

Just as 2020 was getting underway, the entire world began entering various degrees of lockdown due to the spread of COVID-19. Social distancing was introduced as one of the key measures to slow

Read More
February 27, 2020

Stay Secure: Protect Your Organization from Ransomware

Ransomware gangs are aware that the best use of their resources is to target corporate networks where they can gain access to many PCs and valuable institutional data. After all, a business is

Read More
February 20, 2020

Why Your Business Needs Multi-Factor Authentication

Business has been vastly affected by mobility, the adoption of Bring Your Own Device (BYOD) practices, the rise of the Internet of Things (IoT), and various other digital shifts. This has changed,

Read More
January 23, 2020

Can Zero Trust Architecture Really Keep Your Data Safe?

If you are searching for a more reliable way of preventing modern-day cyber attacks, it’s time to consider adopting the Zero Trust approach to IT security. Just like “AI” and “machine learning”,

Read More
December 19, 2019

How to Improve on PCI Compliance Gaps

As we rapidly approach peak holiday shopping season, it’s time to assess your payment security procedures if you have not already done so. While Payment Card Industry Data Security Standard (PCI

Read More
1 2 3 4 5

GlassHouse Systems

Recent Posts

August 19, 2020

5G IoT and Cybersecurity: High Risk, High Reward

According to a new study from Juniper Research, the advent of 5G will cause an explosion in ubiquity and profitability for IoT devices: total operator-billed revenue is predicted to rise

Read More
August 11, 2020

Introducing the Red Hat® Ansible® Automation Platform

We'd like to thank Red Hat® for this guest blog.

Read More
July 14, 2020

Flash Storage: The Benefits for Business Users

Flash storage is a storage media technology that is designed to electronically secure data. Flash technology offers users high-speed, electronically programmable memory that eliminates rotational

Read More
July 07, 2020

While the Healthcare Industry Focuses on COVID-19, Hackers Turn Relentless!

The past few months have played witness to a sharp rise in cybersecurity attacks against healthcare providers. Historically speaking, the healthcare industry has lagged behind other major

Read More
June 18, 2020

The Impact of COVID-19 on Cybersecurity

In a few short months, the Coronavirus (COVID-19) pandemic has forced massive change across the world. While governments are grappling with how to repair health and economic systems,

Read More
May 19, 2020

Cybersecurity Risks of Working from Home

Just as 2020 was getting underway, the entire world began entering various degrees of lockdown due to the spread of COVID-19. Social distancing was introduced as one of the key measures to slow

Read More
February 27, 2020

Stay Secure: Protect Your Organization from Ransomware

Ransomware gangs are aware that the best use of their resources is to target corporate networks where they can gain access to many PCs and valuable institutional data. After all, a business is

Read More
February 20, 2020

Why Your Business Needs Multi-Factor Authentication

Business has been vastly affected by mobility, the adoption of Bring Your Own Device (BYOD) practices, the rise of the Internet of Things (IoT), and various other digital shifts. This has changed,

Read More
January 23, 2020

Can Zero Trust Architecture Really Keep Your Data Safe?

If you are searching for a more reliable way of preventing modern-day cyber attacks, it’s time to consider adopting the Zero Trust approach to IT security. Just like “AI” and “machine learning”,

Read More
December 19, 2019

How to Improve on PCI Compliance Gaps

As we rapidly approach peak holiday shopping season, it’s time to assess your payment security procedures if you have not already done so. While Payment Card Industry Data Security Standard (PCI

Read More
1 2 3 4 5

GlassHouse Systems

Recent Posts

5G IoT and Cybersecurity: High Risk, High Reward

Posted by GlassHouse Systems on Aug 19, 2020 10:07:16 AM

According to a new study from Juniper Research, the advent of 5G will cause an explosion in ubiquity and profitability for IoT devices: total operator-billed revenue is predicted to rise dramatically, from $525 million in 2020 to $8 billion in 2024.

Read More

Introducing the Red Hat® Ansible® Automation Platform

Posted by GlassHouse Systems on Aug 11, 2020 1:36:35 PM

We'd like to thank Red Hat® for this guest blog.

Read More

Topics: Security, red hat

Flash Storage: The Benefits for Business Users

Posted by GlassHouse Systems on Jul 14, 2020 10:53:04 AM

Flash storage is a storage media technology that is designed to electronically secure data. Flash technology offers users high-speed, electronically programmable memory that eliminates rotational delays and seek times to provide responses that are significantly faster than traditional spinning disks. As a result, Flash Storage represents a breakthrough in computing and storage operations, while providing a solid foundation that will enable the next technological wave of the future.

Read More

Topics: storage

While the Healthcare Industry Focuses on COVID-19, Hackers Turn Relentless!

Posted by GlassHouse Systems on Jul 7, 2020 1:55:19 PM

The past few months have played witness to a sharp rise in cybersecurity attacks against healthcare providers. Historically speaking, the healthcare industry has lagged behind other major industries in terms of cybersecurity. This presents an easy target and a lucrative opportunity for hackers. Medical records and data are immensely valuable; it can be sold on the dark web and used to commit stealthy identity theft.

Read More

Topics: Security

The Impact of COVID-19 on Cybersecurity

Posted by GlassHouse Systems on Jun 18, 2020 2:18:39 PM

In a few short months, the Coronavirus (COVID-19) pandemic has forced massive change across the world. While governments are grappling with how to repair health and economic systems, cybercriminals have undoubtedly been taking advantage of this crisis. With the majority of organizations and individuals now working remotely from home, cybersecurity procedures may not be as straightforward as they once were.

Read More

Topics: cyber security

Cybersecurity Risks of Working from Home

Posted by GlassHouse Systems on May 19, 2020 11:42:45 AM

Just as 2020 was getting underway, the entire world began entering various degrees of lockdown due to the spread of COVID-19. Social distancing was introduced as one of the key measures to slow down the spread and reduce community transmission and for many organizations, this meant encouraging, or even instructing staff, to begin working from home. While this move may have felt like a drastic measure to some managers, the reality is that remote work is the way of the future. However, regardless of how or why it happens, moving from a trusted office environment to working from home can present a variety of security risks.

Read More

Topics: Security

Stay Secure: Protect Your Organization from Ransomware

Posted by GlassHouse Systems on Feb 27, 2020 1:04:38 PM

Ransomware gangs are aware that the best use of their resources is to target corporate networks where they can gain access to many PCs and valuable institutional data. After all, a business is more likely to have the ability to pay off the weighty ransoms that these crooks demand in order to return the information they’ve gained access to.

Read More

Topics: Security

Why Your Business Needs Multi-Factor Authentication

Posted by GlassHouse Systems on Feb 20, 2020 1:47:33 PM

Business has been vastly affected by mobility, the adoption of Bring Your Own Device (BYOD) practices, the rise of the Internet of Things (IoT), and various other digital shifts. This has changed, but not diminished, the methods that cyber attackers use to target company data. No company is ever completely free of the threat that hackers pose but, maintaining multiple levels of security can be a highly effective IT practice. As early as 2016, sources such as NetworkWorld reported that two-factor authentication could prevent 80% of data breaches. 

Read More

Can Zero Trust Architecture Really Keep Your Data Safe?

Posted by GlassHouse Systems on Jan 23, 2020 9:16:24 AM

If you are searching for a more reliable way of preventing modern-day cyber attacks, it’s time to consider adopting the Zero Trust approach to IT security. Just like “AI” and “machine learning”, the term, “Zero Trust” has recently emerged as the latest buzzword in the world of cybersecurity. Zero Trust Architecture is strategically designed to protect your business from potential security threats by eliminating the idea of trust within your network in addition to the perimeters of your infrastructure.  

Read More

How to Improve on PCI Compliance Gaps

Posted by GlassHouse Systems on Dec 19, 2019 2:02:29 PM

As we rapidly approach peak holiday shopping season, it’s time to assess your payment security procedures if you have not already done so. While Payment Card Industry Data Security Standard (PCI DSS) is designed to ensure that all businesses that handle information related to credit cards maintain a secure environment, achieving compliance is not always an easy process. For instance, you may encounter compliance challenges if your business operates in a hybrid cloud environment. This can leave your business vulnerable to a number of security gaps that must be filled before you can reach the mandatory compliance level. 

Read More

Topics: Security