Michelle Drolet

Content Type

See all

Do you have the right person for the job?

Fractional Chief Information Security Officer (CIS , cannabis , Enterprise

Michelle Drolet

According to Cisco’s 2015 Annual Security Report, 91 percent of companies have an executive with direct responsibility for security, but only 29 percent of them have a Chief Information Security Officer.

Save the Date: Information Security Summit 2016

Security Partners , network security , Fractional Chief Information Security Officer (CIS , Phishing , GDPR , Information Security , Application Security , Security , ransomware , Information Security Summit , HIPAA , Compliance & Privacy , penetration testing , Events , Compliance , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Click here for more information & to register! Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

Michelle Drolet

WASHINGTON - The Internal Revenue Service today issued an alert to payroll and human resources professionals to beware of an emerging phishing email scheme that purports to be from company executives and requests personal information on employees. The IRS has learned this scheme part of the surge in phishing emails seen this year already has claimed several victims as payroll and human resources offices mistakenly email payroll data including Forms W-2 that contain Social Security numbers andfalse

DROWN attack sinks security for millions of websites

SSLv2 server , NetworkWorld , DROWN , TLS

Michelle Drolet

Security researchers reveal new technique to break TLS using SSLv2 server. The war to close down security vulnerabilities is never-ending, but the new “DROWN” vulnerability is one of the biggest to rear its ugly head in recent months. A group of security researchers from a number of different universities and research institutes just unveiled this vulnerability, which they say could affect 33% of all HTTPS servers. That potentially exposes around 11.5 million HTTPS servers worldwide plusfalse

Create a data recovery plan and secure your network

routers , data recovery capability , cyberattacks , disaster recovery , data recovery plan , boundary defense , firewalls , switches , secure configurations

Michelle Drolet

Following the Center for Internet Security’s best practices. We discussed building malware defenses the last time out, but today we’re going to focus on Critical Security Controls 10, 11, and 12 covering data recovery, secure network configuration, and boundary defense. It’s unrealistic to think that you can completely avoid cyberattacks and data breaches, so it’s vital to have a proper data recovery plan in place. You can also tighten your defenses significantly by ensuring all of your networkfalse

2015 International Compendium of Data Privacy Laws

GDPR , HIPAA , Compliance , cannabis , Enterprise

Michelle Drolet

Privacy and data protection issues confront all organizations—whether you handle employee information, credit card data, sensitive financial information, or trade secrets. Securing data is a daunting task that is further complicated by cross-border transfer issues and the differences in privacy laws around the world. The team at BakerHostetler has developed a prompt and practical PDF to assist and inform your data protection policies. Download the 2015 International Compendium of Data Privacyfalse

10 Things I Know About...Hiring a vCISO

breach , Virtual CISO , Fractional Chief Information Security Officer (CIS , Compliance & Privacy , 10 Things I Know , Compliance , cannabis , vCISO , Enterprise , small and midsize businesses

Michelle Drolet

10. A hedge against a breach A virtual chief information security officer can serve as security consul or as an interim CISO to fill the gaps during a planned information-technology security policy review. Better to be safe than sorry.

5 cybersecurity trends to watch for in 2016

5 cybersecurity trends to watch for in 2016

Phishing , malware , ransomware , Internet of Things , cloud services , Known vulnerabilities , cannabis , Enterprise

Michelle Drolet

As threats evolve and grow more sophisticated, securing IT systems is more important than ever. We may welcome in the New Year with open arms, but we must also prepare for the cybersecurity threats ahead of us. The 2015 Cost of Data Breach Study from IBM and the Ponemon Institute put the average cost of a data breach at $3.79 million, and that figure is expected to grow in the year ahead. With the right resolutions, you can drastically reduce your chances of falling prey to cybercriminals.

Ransomware is only getting worse. How do you prepare for it?

Counterintelligence Program , ransomware , ransomware-as-a-service , CryptoWall v3 , cannabis , Enterprise

Michelle Drolet

Ransomware-as-a-service, help desks, third parties -- all point to a mature yet illegal enterprise undergoing serious growth. Here are tips to protect yourself and your company. Ransomware is big business. Over the last few years we've observed the steady rise of ransomware, with some trepidation. It is fast becoming a multi-billion dollar business, and it's getting surprisingly sophisticated. The ransomware industry is continually innovating, offering cybercriminals new technology, variousfalse

Join us for Security BSides Boston 2016

Join us for Security BSides Boston 2016

Sophos , Security BSides Boston 2016 , Microsoft NERD , BSides Boston , Events , Microsoft , Enterprise

Michelle Drolet

Friday, May 20 2016 (Training) Saturday, May 21 2016 (Conference) Follow BSidesBoston on Twitter: #BSidesBOS @BsidesBoston @MicrosoftNERD Questions: help@bsidesboston.org