August 11, 2020

Introducing the Red Hat® Ansible® Automation Platform

We'd like to thank Red Hat® for this guest blog.

Read More
July 07, 2020

While the Healthcare Industry Focuses on COVID-19, Hackers Turn Relentless!

The past few months have played witness to a sharp rise in cybersecurity attacks against healthcare providers. Historically speaking, the healthcare industry has lagged behind other major

Read More
May 19, 2020

Cybersecurity Risks of Working from Home

Just as 2020 was getting underway, the entire world began entering various degrees of lockdown due to the spread of COVID-19. Social distancing was introduced as one of the key measures to slow

Read More
February 27, 2020

Stay Secure: Protect Your Organization from Ransomware

Ransomware gangs are aware that the best use of their resources is to target corporate networks where they can gain access to many PCs and valuable institutional data. After all, a business is

Read More
December 19, 2019

How to Improve on PCI Compliance Gaps

As we rapidly approach peak holiday shopping season, it’s time to assess your payment security procedures if you have not already done so. While Payment Card Industry Data Security Standard (PCI

Read More
December 05, 2019

Cybersecurity Statistics You Need to Know

The cybersecurity industry is rapidly developing. Even though a number of resources are deployed to mitigate cyber attacks each year, the industry still has a lot of catching up to do.

Read More
November 14, 2019

Cyber Risk Governance Responsibility is Enterprise-Wide

No matter what industry you fall under, you will agree that data is the lifeblood of your business. Any physical or digital data pertaining to your business, employees, customers, contractors and

Read More
August 21, 2019

The Biggest Data Breaches of 2019 So Far

When it comes to data breaches, 2019 has already seen more than its fair share. Coming off the heels of a particularly bad year for major data breaches, everyone from medical companies to

Read More
August 15, 2019

What is Cloud Access Security Broker (CASB)?

The term cloud access security broker (CASB) was first coined in 2011, when the majority of IT applications were hosted in data centres and very few companies trusted their information to the

Read More
July 17, 2019

How to Stay Protected from Unfamiliar Computer Viruses

You may already be aware of the standard forms of malware such as viruses, spyware and phishing scams. However, technological advancements have changed the way cybercriminals operate in today’s

Read More
1 2 3 4 5
August 11, 2020

Introducing the Red Hat® Ansible® Automation Platform

We'd like to thank Red Hat® for this guest blog.

Read More
July 07, 2020

While the Healthcare Industry Focuses on COVID-19, Hackers Turn Relentless!

The past few months have played witness to a sharp rise in cybersecurity attacks against healthcare providers. Historically speaking, the healthcare industry has lagged behind other major

Read More
May 19, 2020

Cybersecurity Risks of Working from Home

Just as 2020 was getting underway, the entire world began entering various degrees of lockdown due to the spread of COVID-19. Social distancing was introduced as one of the key measures to slow

Read More
February 27, 2020

Stay Secure: Protect Your Organization from Ransomware

Ransomware gangs are aware that the best use of their resources is to target corporate networks where they can gain access to many PCs and valuable institutional data. After all, a business is

Read More
December 19, 2019

How to Improve on PCI Compliance Gaps

As we rapidly approach peak holiday shopping season, it’s time to assess your payment security procedures if you have not already done so. While Payment Card Industry Data Security Standard (PCI

Read More
December 05, 2019

Cybersecurity Statistics You Need to Know

The cybersecurity industry is rapidly developing. Even though a number of resources are deployed to mitigate cyber attacks each year, the industry still has a lot of catching up to do.

Read More
November 14, 2019

Cyber Risk Governance Responsibility is Enterprise-Wide

No matter what industry you fall under, you will agree that data is the lifeblood of your business. Any physical or digital data pertaining to your business, employees, customers, contractors and

Read More
August 21, 2019

The Biggest Data Breaches of 2019 So Far

When it comes to data breaches, 2019 has already seen more than its fair share. Coming off the heels of a particularly bad year for major data breaches, everyone from medical companies to

Read More
August 15, 2019

What is Cloud Access Security Broker (CASB)?

The term cloud access security broker (CASB) was first coined in 2011, when the majority of IT applications were hosted in data centres and very few companies trusted their information to the

Read More
July 17, 2019

How to Stay Protected from Unfamiliar Computer Viruses

You may already be aware of the standard forms of malware such as viruses, spyware and phishing scams. However, technological advancements have changed the way cybercriminals operate in today’s

Read More
1 2 3 4 5

Introducing the Red Hat® Ansible® Automation Platform

Posted by GlassHouse Systems on Aug 11, 2020 1:36:35 PM

We'd like to thank Red Hat® for this guest blog.

Read More

Topics: Security, red hat

While the Healthcare Industry Focuses on COVID-19, Hackers Turn Relentless!

Posted by GlassHouse Systems on Jul 7, 2020 1:55:19 PM

The past few months have played witness to a sharp rise in cybersecurity attacks against healthcare providers. Historically speaking, the healthcare industry has lagged behind other major industries in terms of cybersecurity. This presents an easy target and a lucrative opportunity for hackers. Medical records and data are immensely valuable; it can be sold on the dark web and used to commit stealthy identity theft.

Read More

Topics: Security

Cybersecurity Risks of Working from Home

Posted by GlassHouse Systems on May 19, 2020 11:42:45 AM

Just as 2020 was getting underway, the entire world began entering various degrees of lockdown due to the spread of COVID-19. Social distancing was introduced as one of the key measures to slow down the spread and reduce community transmission and for many organizations, this meant encouraging, or even instructing staff, to begin working from home. While this move may have felt like a drastic measure to some managers, the reality is that remote work is the way of the future. However, regardless of how or why it happens, moving from a trusted office environment to working from home can present a variety of security risks.

Read More

Topics: Security

Stay Secure: Protect Your Organization from Ransomware

Posted by GlassHouse Systems on Feb 27, 2020 1:04:38 PM

Ransomware gangs are aware that the best use of their resources is to target corporate networks where they can gain access to many PCs and valuable institutional data. After all, a business is more likely to have the ability to pay off the weighty ransoms that these crooks demand in order to return the information they’ve gained access to.

Read More

Topics: Security

How to Improve on PCI Compliance Gaps

Posted by GlassHouse Systems on Dec 19, 2019 2:02:29 PM

As we rapidly approach peak holiday shopping season, it’s time to assess your payment security procedures if you have not already done so. While Payment Card Industry Data Security Standard (PCI DSS) is designed to ensure that all businesses that handle information related to credit cards maintain a secure environment, achieving compliance is not always an easy process. For instance, you may encounter compliance challenges if your business operates in a hybrid cloud environment. This can leave your business vulnerable to a number of security gaps that must be filled before you can reach the mandatory compliance level. 

Read More

Topics: Security

Cybersecurity Statistics You Need to Know

Posted by GlassHouse Systems on Dec 5, 2019 11:02:35 AM

The cybersecurity industry is rapidly developing. Even though a number of resources are deployed to mitigate cyber attacks each year, the industry still has a lot of catching up to do. Cybersecurity breaches remain a huge threat to businesses of all sizes and appear in the headlines around the world on a weekly basis. While no company is truly safe from cyber attacks, current cybersecurity statistics not only highlight the impact on your company’s bottom line but also reveal extremely valuable lessons that can help organizations improve IT security strategies.

Read More

Topics: Security

Cyber Risk Governance Responsibility is Enterprise-Wide

Posted by GlassHouse Systems on Nov 14, 2019 12:15:29 PM

No matter what industry you fall under, you will agree that data is the lifeblood of your business. Any physical or digital data pertaining to your business, employees, customers, contractors and other stakeholders is always under threat from unscrupulous elements. Essentially, risk has become the new normal for business. In fact:

Read More

Topics: Security

The Biggest Data Breaches of 2019 So Far

Posted by GlassHouse Systems on Aug 21, 2019 12:19:52 PM

When it comes to data breaches, 2019 has already seen more than its fair share. Coming off the heels of a particularly bad year for major data breaches, everyone from medical companies to financial firms, retailers and social media have been affected so far. This year, millions of consumer accounts have been compromised through the work of hackers or even plain carelessness. However, the number of hacked accounts does not always matter. For instance, one breach may affect a million users but the data could be rather generic, whereas a smaller breach could include highly sensitive information.

Read More

Topics: Security

What is Cloud Access Security Broker (CASB)?

Posted by GlassHouse Systems on Aug 15, 2019 11:42:40 AM

The term cloud access security broker (CASB) was first coined in 2011, when the majority of IT applications were hosted in data centres and very few companies trusted their information to the cloud. During this time, CASB products were designed to only provide visibility to Client IT and prevent employees from accessing unauthorized cloud services.

Read More

Topics: Security

How to Stay Protected from Unfamiliar Computer Viruses

Posted by GlassHouse Systems on Jul 17, 2019 11:16:14 AM

You may already be aware of the standard forms of malware such as viruses, spyware and phishing scams. However, technological advancements have changed the way cybercriminals operate in today’s internet landscape. They use tactics that allow them to fly even lower under the radar to retrieve your personal information. Consequently, you may be unfamiliar with newly emerging forms of malware, leaving you extremely vulnerable to a loss of critical data.

Read More

Topics: Security