June 07, 2018

Are Managed Security Services Right For Your Business?

Determine Whether Managed Security Systems Are Right for Your Business

Much of our business is being conducted remotely using online resources. This includes the transfer and storage of

Read More
June 01, 2018

Homeland Security Unveils Cyber Security Strategy

 

Security has become about much more than just protecting our credit card numbers or consumer information. It has progressed to encompass government agencies and information pertinent to the

Read More
May 22, 2018

Do You Need a SIEM for Your Security in 2018?

Exploring the Benefits of SIEM

Security Information and Event Management (SIEM) is a marriage of Security Information Management (SIM) and Security Event Management (SEM) designed to provide a

Read More
July 10, 2017

Petya Cyber Attack - How a MSSP Protects Against Security Threats

Partner with a MSSP to Effectively Enhance Your Security Program

Just a few short months following the WannaCry attack, major corporations around the globe were hit with another massive cyber attack

Read More
May 29, 2017

Managed Security - How to Hire a MSSP

Look for Expertise in Remote Infrastructure and Backup Management, Cloud and Security

With the right MSSP provider, you are well-equipped to refocus on growth rather than day-to-day operational

Read More
May 15, 2017

IoT and Security - What the Internet of Things Means to Your Security

Increased Connectivity Can Potentially Mean an Increased Risk of Attack

In 2013, there were approximately 9.9 million objects and/or devices connected to the Internet of Things (IoT), and by the year

Read More
April 17, 2017

How Cognitive Security Strengthens Your Overall Security Posture

Added Layer of Protection Can Be Critical in the Fight against Cyber Crime

It has been estimated that the costs associated with damage from cyber crime will soar to a staggering $6 trillion annually

Read More
April 05, 2017

Blockchain Security – What is it and Why Should You Care?

Anyone who has read or watched the news recently knows how serious the risk from a hacking attack can be. The threats from hacking are so severe that entire networks can be shut down, data can be

Read More
February 20, 2017

Top 5 Mistakes Users Make to Unknowingly Compromise their Security

Keep Your Information Private by Avoiding These Common Security  Blunders

Experts say that hacking and cyber attacks are becoming increasingly common, but the average internet user remains unconcerned

Read More
February 06, 2017

Top 5 Ways to Protect Your Family from Hackers

Protect Your Personal Data with These IT Security Tips from the Experts

As we spend an increasing number of hours connected online, the importance of information security and protection also

Read More
1 2
June 07, 2018

Are Managed Security Services Right For Your Business?

Determine Whether Managed Security Systems Are Right for Your Business

Much of our business is being conducted remotely using online resources. This includes the transfer and storage of

Read More
June 01, 2018

Homeland Security Unveils Cyber Security Strategy

 

Security has become about much more than just protecting our credit card numbers or consumer information. It has progressed to encompass government agencies and information pertinent to the

Read More
May 22, 2018

Do You Need a SIEM for Your Security in 2018?

Exploring the Benefits of SIEM

Security Information and Event Management (SIEM) is a marriage of Security Information Management (SIM) and Security Event Management (SEM) designed to provide a

Read More
July 10, 2017

Petya Cyber Attack - How a MSSP Protects Against Security Threats

Partner with a MSSP to Effectively Enhance Your Security Program

Just a few short months following the WannaCry attack, major corporations around the globe were hit with another massive cyber attack

Read More
May 29, 2017

Managed Security - How to Hire a MSSP

Look for Expertise in Remote Infrastructure and Backup Management, Cloud and Security

With the right MSSP provider, you are well-equipped to refocus on growth rather than day-to-day operational

Read More
May 15, 2017

IoT and Security - What the Internet of Things Means to Your Security

Increased Connectivity Can Potentially Mean an Increased Risk of Attack

In 2013, there were approximately 9.9 million objects and/or devices connected to the Internet of Things (IoT), and by the year

Read More
April 17, 2017

How Cognitive Security Strengthens Your Overall Security Posture

Added Layer of Protection Can Be Critical in the Fight against Cyber Crime

It has been estimated that the costs associated with damage from cyber crime will soar to a staggering $6 trillion annually

Read More
April 05, 2017

Blockchain Security – What is it and Why Should You Care?

Anyone who has read or watched the news recently knows how serious the risk from a hacking attack can be. The threats from hacking are so severe that entire networks can be shut down, data can be

Read More
February 20, 2017

Top 5 Mistakes Users Make to Unknowingly Compromise their Security

Keep Your Information Private by Avoiding These Common Security  Blunders

Experts say that hacking and cyber attacks are becoming increasingly common, but the average internet user remains unconcerned

Read More
February 06, 2017

Top 5 Ways to Protect Your Family from Hackers

Protect Your Personal Data with These IT Security Tips from the Experts

As we spend an increasing number of hours connected online, the importance of information security and protection also

Read More
1 2

Are Managed Security Services Right For Your Business?

Posted by GlassHouse Systems on Jun 7, 2018 1:36:46 PM

Determine Whether Managed Security Systems Are Right for Your Business

Much of our business is being conducted remotely using online resources. This includes the transfer and storage of confidential information that makes even the most established organizations susceptible to security breaches. We have seen historic hacks resulting in information leaks from companies like Equifax, and even the FBI. Finding a better way to protect sensitive data has generated interest in Managed Security System Providers (MSSP).

Read More

Topics: compliance, cyber security, exfiltration, guardium, IT security, malware, managed security, managed services, MSSP, online security, perimeter, power, protection, qradar, ransomware, risk, Security, threats, email scams, cyber attacks, data breach, Managed Security Services, SIEM

Homeland Security Unveils Cyber Security Strategy

Posted by GlassHouse Systems on Jun 1, 2018 2:14:25 PM

 

Security has become about much more than just protecting our credit card numbers or consumer information. It has progressed to encompass government agencies and information pertinent to the safety of nations as a whole. According to a May article released by Reuters, the Department of Homeland Security (DHS) has just announced its intention to use new strategies to combat the growing virtual threat to national security.

Read More

Topics: exfiltration, information protection, IT security, malware, managed security, managed services, MSSP, online security, perimeter, phishing, ransomware, risk, Security, threats, data breach, Managed Security Services, Ransomware Detection, pervasive encryption, SIEM

Do You Need a SIEM for Your Security in 2018?

Posted by GlassHouse Systems on May 22, 2018 2:18:20 PM

Exploring the Benefits of SIEM

Security Information and Event Management (SIEM) is a marriage of Security Information Management (SIM) and Security Event Management (SEM) designed to provide a technological bird’s eye view of potential security issues within a company. The SIEM system works by gathering flow data from all relevant areas and establishing normal patterns of use. It can then identify and alert the company to any abnormal activities that can indicate a breach of security. 

Read More

Topics: compliance, cyber security, endpoint, ibm, information protection, IT security, managed security, managed services, MSSP, online security, perimeter, phishing, qradar, ransomware, risk, Security, threats, Cognitive Security, email scams, hacking, cyber attacks, data breach, Managed Security Services, SIEM

Petya Cyber Attack - How a MSSP Protects Against Security Threats

Posted by GlassHouse Systems on Jul 10, 2017 12:00:00 PM
Partner with a MSSP to Effectively Enhance Your Security Program

Just a few short months following the WannaCry attack, major corporations around the globe were hit with another massive cyber attack called Petya. 

Read More

Topics: MSSP, ransomware, threats, cyber attacks, Petya

Managed Security - How to Hire a MSSP

Posted by GlassHouse Systems on May 29, 2017 11:15:09 AM
Look for Expertise in Remote Infrastructure and Backup Management, Cloud and Security

With the right MSSP provider, you are well-equipped to refocus on growth rather than day-to-day operational challenges. Your managed security services provider must be able to minimize your downtime through proactive system administration, control and documentation of change for improved compliance, and increase your company’s ROI on critical business applications.

Read More

Topics: IT security, MSSP, Private Cloud, risk, Security, threats, hacking

IoT and Security - What the Internet of Things Means to Your Security

Posted by GlassHouse Systems on May 15, 2017 1:38:06 PM
Increased Connectivity Can Potentially Mean an Increased Risk of Attack

In 2013, there were approximately 9.9 million objects and/or devices connected to the Internet of Things (IoT), and by the year 2020, that figure is expected to jump astronomically. According to the Spark Labs Global Ventures’ Internet of Things & Hardware Industry Report 2016, Verizon predicts that the number of B2B IoT connections will increase to 5.4 billion by 2020. According to Gartner, the overall number is predicted to be 20.8 billion by 2020. Virtually all the devices which we use around the home and in the work place to make life easier will be connected to the Internet, which will present some amazing opportunities for innovation and enhanced usability. On the other hand, it will also provide a plethora of targets for hacking by the criminal-minded, and open up a whole new area of risk for security systems.

Read More

Topics: cyber security, Internet of Things, IoT, MSSP, risk, Security, threats, analytics, hacking

How Cognitive Security Strengthens Your Overall Security Posture

Posted by GlassHouse Systems on Apr 17, 2017 11:08:39 AM

Added Layer of Protection Can Be Critical in the Fight against Cyber Crime

It has been estimated that the costs associated with damage from cyber crime will soar to a staggering $6 trillion annually by the year 2021, just four years away. 

Read More

Topics: risk, Security, threats, Cognitive Security, hacking

Blockchain Security – What is it and Why Should You Care?

Posted by GlassHouse Systems on Apr 5, 2017 11:52:26 AM

Anyone who has read or watched the news recently knows how serious the risk from a hacking attack can be. The threats from hacking are so severe that entire networks can be shut down, data can be altered and unsuspecting users can be fooled into clicking through to cybertraps where personal details are stolen.

Read More

Topics: risk, Security, threats, blockchain, hacking

Top 5 Mistakes Users Make to Unknowingly Compromise their Security

Posted by GlassHouse Systems on Feb 20, 2017 12:11:50 PM
Keep Your Information Private by Avoiding These Common Security Blunders

Experts say that hacking and cyber attacks are becoming increasingly common, but the average internet user remains unconcerned about security threats. The mindset is too often “it won’t happen to me,” and users neglect to take all the necessary precautions to protect their online personal information.

Read More

Topics: compliance, phishing, Security, threats, hacking

Top 5 Ways to Protect Your Family from Hackers

Posted by GlassHouse Systems on Feb 6, 2017 12:11:02 PM
Protect Your Personal Data with These IT Security Tips from the Experts

As we spend an increasing number of hours connected online, the importance of information security and protection also increases. For businesses and individuals alike, security measures and knowledge of threats, hacking trends, and phishing vulnerabilities can protect you and your information. Information is empowering and can help you differentiate between valid communications, error alerts, and scams that are designed to compromise your hardware and exploit your personal data.

Read More

Topics: compliance, IT security, phishing, protection, Security, threats, hacking