May 22, 2018

Do You Need a SIEM for Your Security in 2018?

Exploring the Benefits of SIEM

Security Information and Event Management (SIEM) is a marriage of Security Information Management (SIM) and Security Event Management (SEM) designed to provide a

Read More
May 29, 2017

Managed Security - How to Hire a MSSP

Look for Expertise in Remote Infrastructure and Backup Management, Cloud and Security

With the right MSSP provider, you are well-equipped to refocus on growth rather than day-to-day operational

Read More
May 15, 2017

IoT and Security - What the Internet of Things Means to Your Security

Increased Connectivity Can Potentially Mean an Increased Risk of Attack

In 2013, there were approximately 9.9 million objects and/or devices connected to the Internet of Things (IoT), and by the year

Read More
April 17, 2017

How Cognitive Security Strengthens Your Overall Security Posture

Added Layer of Protection Can Be Critical in the Fight against Cyber Crime

It has been estimated that the costs associated with damage from cyber crime will soar to a staggering $6 trillion annually

Read More
April 05, 2017

Blockchain Security – What is it and Why Should You Care?

Anyone who has read or watched the news recently knows how serious the risk from a hacking attack can be. The threats from hacking are so severe that entire networks can be shut down, data can be

Read More
March 20, 2017

5 More of the Greatest Security Breaches across the Globe in 2016

Online Security Breaches that Shook Up Mega Corporations

2016 may well go down in history as one of the most significant for online security breaches. Some of the world’s biggest companies,

Read More
March 06, 2017

5 of the Greatest Cyber Security Breaches across the Globe in 2016

Top Online Security Breaches that Hit the Headlines 

With millions of accounts breached, accusations that Russia meddled in the US election vote and access denied to major sites that we rely on for

Read More
February 20, 2017

Top 5 Mistakes Users Make to Unknowingly Compromise their Security

Keep Your Information Private by Avoiding These Common Security  Blunders

Experts say that hacking and cyber attacks are becoming increasingly common, but the average internet user remains unconcerned

Read More
February 06, 2017

Top 5 Ways to Protect Your Family from Hackers

Protect Your Personal Data with These IT Security Tips from the Experts

As we spend an increasing number of hours connected online, the importance of information security and protection also

Read More
1
May 22, 2018

Do You Need a SIEM for Your Security in 2018?

Exploring the Benefits of SIEM

Security Information and Event Management (SIEM) is a marriage of Security Information Management (SIM) and Security Event Management (SEM) designed to provide a

Read More
May 29, 2017

Managed Security - How to Hire a MSSP

Look for Expertise in Remote Infrastructure and Backup Management, Cloud and Security

With the right MSSP provider, you are well-equipped to refocus on growth rather than day-to-day operational

Read More
May 15, 2017

IoT and Security - What the Internet of Things Means to Your Security

Increased Connectivity Can Potentially Mean an Increased Risk of Attack

In 2013, there were approximately 9.9 million objects and/or devices connected to the Internet of Things (IoT), and by the year

Read More
April 17, 2017

How Cognitive Security Strengthens Your Overall Security Posture

Added Layer of Protection Can Be Critical in the Fight against Cyber Crime

It has been estimated that the costs associated with damage from cyber crime will soar to a staggering $6 trillion annually

Read More
April 05, 2017

Blockchain Security – What is it and Why Should You Care?

Anyone who has read or watched the news recently knows how serious the risk from a hacking attack can be. The threats from hacking are so severe that entire networks can be shut down, data can be

Read More
March 20, 2017

5 More of the Greatest Security Breaches across the Globe in 2016

Online Security Breaches that Shook Up Mega Corporations

2016 may well go down in history as one of the most significant for online security breaches. Some of the world’s biggest companies,

Read More
March 06, 2017

5 of the Greatest Cyber Security Breaches across the Globe in 2016

Top Online Security Breaches that Hit the Headlines 

With millions of accounts breached, accusations that Russia meddled in the US election vote and access denied to major sites that we rely on for

Read More
February 20, 2017

Top 5 Mistakes Users Make to Unknowingly Compromise their Security

Keep Your Information Private by Avoiding These Common Security  Blunders

Experts say that hacking and cyber attacks are becoming increasingly common, but the average internet user remains unconcerned

Read More
February 06, 2017

Top 5 Ways to Protect Your Family from Hackers

Protect Your Personal Data with These IT Security Tips from the Experts

As we spend an increasing number of hours connected online, the importance of information security and protection also

Read More
1

Do You Need a SIEM for Your Security in 2018?

Posted by GlassHouse Systems on May 22, 2018 2:18:20 PM

Exploring the Benefits of SIEM

Security Information and Event Management (SIEM) is a marriage of Security Information Management (SIM) and Security Event Management (SEM) designed to provide a technological bird’s eye view of potential security issues within a company. The SIEM system works by gathering flow data from all relevant areas and establishing normal patterns of use. It can then identify and alert the company to any abnormal activities that can indicate a breach of security. 

Read More

Topics: compliance, cyber security, endpoint, ibm, information protection, IT security, managed security, managed services, MSSP, online security, perimeter, phishing, qradar, ransomware, risk, Security, threats, Cognitive Security, email scams, hacking, cyber attacks, data breach, Managed Security Services, SIEM

Managed Security - How to Hire a MSSP

Posted by GlassHouse Systems on May 29, 2017 11:15:09 AM
Look for Expertise in Remote Infrastructure and Backup Management, Cloud and Security

With the right MSSP provider, you are well-equipped to refocus on growth rather than day-to-day operational challenges. Your managed security services provider must be able to minimize your downtime through proactive system administration, control and documentation of change for improved compliance, and increase your company’s ROI on critical business applications.

Read More

Topics: IT security, MSSP, Private Cloud, risk, Security, threats, hacking

IoT and Security - What the Internet of Things Means to Your Security

Posted by GlassHouse Systems on May 15, 2017 1:38:06 PM
Increased Connectivity Can Potentially Mean an Increased Risk of Attack

In 2013, there were approximately 9.9 million objects and/or devices connected to the Internet of Things (IoT), and by the year 2020, that figure is expected to jump astronomically. According to the Spark Labs Global Ventures’ Internet of Things & Hardware Industry Report 2016, Verizon predicts that the number of B2B IoT connections will increase to 5.4 billion by 2020. According to Gartner, the overall number is predicted to be 20.8 billion by 2020. Virtually all the devices which we use around the home and in the work place to make life easier will be connected to the Internet, which will present some amazing opportunities for innovation and enhanced usability. On the other hand, it will also provide a plethora of targets for hacking by the criminal-minded, and open up a whole new area of risk for security systems.

Read More

Topics: cyber security, Internet of Things, IoT, MSSP, risk, Security, threats, analytics, hacking

How Cognitive Security Strengthens Your Overall Security Posture

Posted by GlassHouse Systems on Apr 17, 2017 11:08:39 AM

Added Layer of Protection Can Be Critical in the Fight against Cyber Crime

It has been estimated that the costs associated with damage from cyber crime will soar to a staggering $6 trillion annually by the year 2021, just four years away. 

Read More

Topics: risk, Security, threats, Cognitive Security, hacking

Blockchain Security – What is it and Why Should You Care?

Posted by GlassHouse Systems on Apr 5, 2017 11:52:26 AM

Anyone who has read or watched the news recently knows how serious the risk from a hacking attack can be. The threats from hacking are so severe that entire networks can be shut down, data can be altered and unsuspecting users can be fooled into clicking through to cybertraps where personal details are stolen.

Read More

Topics: risk, Security, threats, blockchain, hacking

5 More of the Greatest Security Breaches across the Globe in 2016

Posted by GlassHouse Systems on Mar 20, 2017 1:13:09 PM
Online Security Breaches that Shook Up Mega Corporations

2016 may well go down in history as one of the most significant for online security breaches. Some of the world’s biggest companies, organizations and political parties have either been hacked, denied access to their own systems or fallen victim to sophisticated phishing scams. It’s little wonder then that improving online security is high on everyone’s agenda.

Read More

Topics: cyber security, malware, online security, phishing, Security, hacking

5 of the Greatest Cyber Security Breaches across the Globe in 2016

Posted by GlassHouse Systems on Mar 6, 2017 12:12:31 PM
Top Online Security Breaches that Hit the Headlines 

With millions of accounts breached, accusations that Russia meddled in the US election vote and access denied to major sites that we rely on for day-to-day life, it’s no wonder so many of us are worried about our online security.

Read More

Topics: cyber security, malware, online security, phishing, Security, hacking

Top 5 Mistakes Users Make to Unknowingly Compromise their Security

Posted by GlassHouse Systems on Feb 20, 2017 12:11:50 PM
Keep Your Information Private by Avoiding These Common Security Blunders

Experts say that hacking and cyber attacks are becoming increasingly common, but the average internet user remains unconcerned about security threats. The mindset is too often “it won’t happen to me,” and users neglect to take all the necessary precautions to protect their online personal information.

Read More

Topics: compliance, phishing, Security, threats, hacking

Top 5 Ways to Protect Your Family from Hackers

Posted by GlassHouse Systems on Feb 6, 2017 12:11:02 PM
Protect Your Personal Data with These IT Security Tips from the Experts

As we spend an increasing number of hours connected online, the importance of information security and protection also increases. For businesses and individuals alike, security measures and knowledge of threats, hacking trends, and phishing vulnerabilities can protect you and your information. Information is empowering and can help you differentiate between valid communications, error alerts, and scams that are designed to compromise your hardware and exploit your personal data.

Read More

Topics: compliance, IT security, phishing, protection, Security, threats, hacking