October 11, 2018

Protect Yourself and Your Business from Targeted Phishing

It is no surprise that if you have unsecured or poorly secured digital information, it may be stolen, hacked or breached at some point. Cyber criminals are always on the lookout for data that they

Read More
June 01, 2018

Homeland Security Unveils Cyber Security Strategy

 

Security has become about much more than just protecting our credit card numbers or consumer information. It has progressed to encompass government agencies and information pertinent to the

Read More
May 22, 2018

Do You Need a SIEM for Your Security in 2018?

Exploring the Benefits of SIEM

Security Information and Event Management (SIEM) is a marriage of Security Information Management (SIM) and Security Event Management (SEM) designed to provide a

Read More
May 03, 2018

Retail Security Breaches — Top Brands and How They Were Attacked

The term “data breach” has become an all too familiar headline in today’s news. More companies than ever have experienced an unwanted technological infiltration that has exposed the personal

Read More
June 26, 2017

How to Protect Yourself against Phishing and Email Scams - Take Control of Your Cyber Security

Summer is quickly approaching and it is the perfect season to get outdoors and enjoy all the warm weather activities. From hiking on back country trails to picnics in the park, canoeing down the

Read More
March 20, 2017

5 More of the Greatest Security Breaches across the Globe in 2016

Online Security Breaches that Shook Up Mega Corporations

2016 may well go down in history as one of the most significant for online security breaches. Some of the world’s biggest companies,

Read More
March 06, 2017

5 of the Greatest Cyber Security Breaches across the Globe in 2016

Top Online Security Breaches that Hit the Headlines 

With millions of accounts breached, accusations that Russia meddled in the US election vote and access denied to major sites that we rely on for

Read More
February 20, 2017

Top 5 Mistakes Users Make to Unknowingly Compromise their Security

Keep Your Information Private by Avoiding These Common Security  Blunders

Experts say that hacking and cyber attacks are becoming increasingly common, but the average internet user remains unconcerned

Read More
February 06, 2017

Top 5 Ways to Protect Your Family from Hackers

Protect Your Personal Data with These IT Security Tips from the Experts

As we spend an increasing number of hours connected online, the importance of information security and protection also

Read More
January 23, 2017

Go Beyond Compliance for Your IT Security

Secure Your Information Protection with Managed Security

You have a solid IT security system in place. You are compliant with the necessary regulations and requirements and you trust in your security

Read More
1
October 11, 2018

Protect Yourself and Your Business from Targeted Phishing

It is no surprise that if you have unsecured or poorly secured digital information, it may be stolen, hacked or breached at some point. Cyber criminals are always on the lookout for data that they

Read More
June 01, 2018

Homeland Security Unveils Cyber Security Strategy

 

Security has become about much more than just protecting our credit card numbers or consumer information. It has progressed to encompass government agencies and information pertinent to the

Read More
May 22, 2018

Do You Need a SIEM for Your Security in 2018?

Exploring the Benefits of SIEM

Security Information and Event Management (SIEM) is a marriage of Security Information Management (SIM) and Security Event Management (SEM) designed to provide a

Read More
May 03, 2018

Retail Security Breaches — Top Brands and How They Were Attacked

The term “data breach” has become an all too familiar headline in today’s news. More companies than ever have experienced an unwanted technological infiltration that has exposed the personal

Read More
June 26, 2017

How to Protect Yourself against Phishing and Email Scams - Take Control of Your Cyber Security

Summer is quickly approaching and it is the perfect season to get outdoors and enjoy all the warm weather activities. From hiking on back country trails to picnics in the park, canoeing down the

Read More
March 20, 2017

5 More of the Greatest Security Breaches across the Globe in 2016

Online Security Breaches that Shook Up Mega Corporations

2016 may well go down in history as one of the most significant for online security breaches. Some of the world’s biggest companies,

Read More
March 06, 2017

5 of the Greatest Cyber Security Breaches across the Globe in 2016

Top Online Security Breaches that Hit the Headlines 

With millions of accounts breached, accusations that Russia meddled in the US election vote and access denied to major sites that we rely on for

Read More
February 20, 2017

Top 5 Mistakes Users Make to Unknowingly Compromise their Security

Keep Your Information Private by Avoiding These Common Security  Blunders

Experts say that hacking and cyber attacks are becoming increasingly common, but the average internet user remains unconcerned

Read More
February 06, 2017

Top 5 Ways to Protect Your Family from Hackers

Protect Your Personal Data with These IT Security Tips from the Experts

As we spend an increasing number of hours connected online, the importance of information security and protection also

Read More
January 23, 2017

Go Beyond Compliance for Your IT Security

Secure Your Information Protection with Managed Security

You have a solid IT security system in place. You are compliant with the necessary regulations and requirements and you trust in your security

Read More
1

Protect Yourself and Your Business from Targeted Phishing

Posted by GlassHouse Systems on Oct 11, 2018 10:54:38 AM

It is no surprise that if you have unsecured or poorly secured digital information, it may be stolen, hacked or breached at some point. Cyber criminals are always on the lookout for data that they can use for personal, unlawful, gains. In recent years, the number of extortion scams that have come to light, and the sheer volume of data hacks that have occurred, suggest that targeted phishing has gone mainstream. Fraudsters have been continually evolving their methods of deceit, launching scams on a global level and masking their attacks with greater authenticity, creativity and sophistication.

Read More

Topics: cyber security, phishing, Security, Managed Security Services

Homeland Security Unveils Cyber Security Strategy

Posted by GlassHouse Systems on Jun 1, 2018 2:14:25 PM

 

Security has become about much more than just protecting our credit card numbers or consumer information. It has progressed to encompass government agencies and information pertinent to the safety of nations as a whole. According to a May article released by Reuters, the Department of Homeland Security (DHS) has just announced its intention to use new strategies to combat the growing virtual threat to national security.

Read More

Topics: exfiltration, information protection, IT security, malware, managed security, managed services, MSSP, online security, perimeter, phishing, ransomware, risk, Security, threats, data breach, Managed Security Services, Ransomware Detection, pervasive encryption, SIEM

Do You Need a SIEM for Your Security in 2018?

Posted by GlassHouse Systems on May 22, 2018 2:18:20 PM

Exploring the Benefits of SIEM

Security Information and Event Management (SIEM) is a marriage of Security Information Management (SIM) and Security Event Management (SEM) designed to provide a technological bird’s eye view of potential security issues within a company. The SIEM system works by gathering flow data from all relevant areas and establishing normal patterns of use. It can then identify and alert the company to any abnormal activities that can indicate a breach of security. 

Read More

Topics: compliance, cyber security, endpoint, ibm, information protection, IT security, managed security, managed services, MSSP, online security, perimeter, phishing, qradar, ransomware, risk, Security, threats, Cognitive Security, email scams, hacking, cyber attacks, data breach, Managed Security Services, SIEM

Retail Security Breaches — Top Brands and How They Were Attacked

Posted by GlassHouse Systems on May 3, 2018 11:12:12 AM

The term “data breach” has become an all too familiar headline in today’s news. More companies than ever have experienced an unwanted technological infiltration that has exposed the personal information of consumers. Not only does this harm a company’s relationship with its target market, it also exposes an extreme weakness in the electronic transference of data.

Read More

Topics: cyber security, IT security, managed security, MSSP, online security, phishing, ransomware, Security, data breach, Managed Security Services, Ransomware Detection

How to Protect Yourself against Phishing and Email Scams - Take Control of Your Cyber Security

Posted by GlassHouse Systems on Jun 26, 2017 7:00:47 AM

Summer is quickly approaching and it is the perfect season to get outdoors and enjoy all the warm weather activities. From hiking on back country trails to picnics in the park, canoeing down the river and fishing in the lake, there is plenty to do with family and friends. There is something special about this time of year that makes it easy to let your guard down but when it comes to cyber safety, online risks, and email scams, you should always remain vigilant. For cybercriminals, it is always phishing season, so bolster your online security all through the year.

Read More

Topics: cyber security, online security, phishing, risk, Security, email scams

5 More of the Greatest Security Breaches across the Globe in 2016

Posted by GlassHouse Systems on Mar 20, 2017 1:13:09 PM
Online Security Breaches that Shook Up Mega Corporations

2016 may well go down in history as one of the most significant for online security breaches. Some of the world’s biggest companies, organizations and political parties have either been hacked, denied access to their own systems or fallen victim to sophisticated phishing scams. It’s little wonder then that improving online security is high on everyone’s agenda.

Read More

Topics: cyber security, malware, online security, phishing, Security, hacking

5 of the Greatest Cyber Security Breaches across the Globe in 2016

Posted by GlassHouse Systems on Mar 6, 2017 12:12:31 PM
Top Online Security Breaches that Hit the Headlines 

With millions of accounts breached, accusations that Russia meddled in the US election vote and access denied to major sites that we rely on for day-to-day life, it’s no wonder so many of us are worried about our online security.

Read More

Topics: cyber security, malware, online security, phishing, Security, hacking

Top 5 Mistakes Users Make to Unknowingly Compromise their Security

Posted by GlassHouse Systems on Feb 20, 2017 12:11:50 PM
Keep Your Information Private by Avoiding These Common Security Blunders

Experts say that hacking and cyber attacks are becoming increasingly common, but the average internet user remains unconcerned about security threats. The mindset is too often “it won’t happen to me,” and users neglect to take all the necessary precautions to protect their online personal information.

Read More

Topics: compliance, phishing, Security, threats, hacking

Top 5 Ways to Protect Your Family from Hackers

Posted by GlassHouse Systems on Feb 6, 2017 12:11:02 PM
Protect Your Personal Data with These IT Security Tips from the Experts

As we spend an increasing number of hours connected online, the importance of information security and protection also increases. For businesses and individuals alike, security measures and knowledge of threats, hacking trends, and phishing vulnerabilities can protect you and your information. Information is empowering and can help you differentiate between valid communications, error alerts, and scams that are designed to compromise your hardware and exploit your personal data.

Read More

Topics: compliance, IT security, phishing, protection, Security, threats, hacking

Go Beyond Compliance for Your IT Security

Posted by GlassHouse Systems on Jan 23, 2017 12:10:25 PM
Secure Your Information Protection with Managed Security

You have a solid IT security system in place. You are compliant with the necessary regulations and requirements and you trust in your security provider.

Read More

Topics: compliance, cyber security, endpoint, exfiltration, guardium, ibm, information protection, IT security, logs, managed security, mdm, perimeter, phishing, qradar, Security, threats, bigfix