Michelle Drolet

Content Type

See all

Delivering Secure & Compliant Remote File Access with Decentralized Cloud Computing - 10/1/19

Phishing , GDPR , malware , ransomware , COVID-19 , cannabis , Enterprise

Michelle Drolet

How to secure remote file access, sharing and collaboration with decentralized cloud computing.

7 Best Practices for Securing the Public Cloud - 9/17/19

PCI , malware , ransomware , cannabis , Enterprise

Michelle Drolet

Workloads in the public cloud are the new pot of gold for savvy cybercriminals. Often misconfigured and under-secured, they’re an easy way for hackers to steal data and take advantage of your processing power. If you use Amazon Web Services, Microsoft Azure, or Google Cloud Platform, or are thinking about migrating to any of these, this webinar will provide essential insight for you. We’ll cover:

Top Social Media Scams And How To Avoid Them

Scams , Romance Scams , Hidden URLs , Phishing , Social Phishing , Social Media , malware , ransomware , Clickbait , Quizzes , Shortened URLs , cannabis , Enterprise , two-factor authentication

Michelle Drolet

Social media has completely changed the way humans interact. Our lives have become increasingly public as we all share a variety of personal information online on various social networks. 2019 has seen worldwide social media user numbers grow to almost 3.5 billion, with 288 million new users in the past 12 months, pushing the global social media penetration figure to 45% and close to 80% of the U.S. population. Facebook and YouTube have more than a staggering 2 billion active users, Instagramfalse

Seven Tips For A Successful Security Awareness Training Program

FISMA , SOX , Phishing , GDPR , PCI , malware , ransomware , HIPAA , Compliance , Security Awareness Training Program , COVID-19 , cannabis , cybersecurity , Enterprise

Michelle Drolet

When we hear the word “cybersecurity” a lot comes to mind — firewalls, antivirus, endpoint protection, email security, web security and much more. But how often do we think or talk about people? This is a central element in cybersecurity that is often ignored. ‘To err is human"— it’s obvious that as humans we often make mistakes. And we can’t be programmed either. As humans, our behavior is largely unpredictable, and failure to account for insider threats can result into costly securityfalse

Five Steps For Creating An Advanced Threat Detection And Vulnerability Management Plan

risk tolerance , Advanced Threat Detection , Incident Response Plan , Phishing , GDPR , PCI , malware , ransomware , HIPAA , COVID-19 , Vulnerability Management Plan , cannabis , Enterprise

Michelle Drolet

While much of cybersecurity is focused on prevention, the simple fact is that many attacks are successful. Even a sophisticated, expensive security system is going to be breached from time to time. Smart attackers try to fly under the radar, biding their time and extracting maximum value or causing maximum carnage, sometimes over a period of months or even years.

Passing The Cybersecurity Baton To A vCISO

GDPR , GRC , Compliance , cannabis , vCISO , Enterprise

Michelle Drolet

Businesses continue to face modern cyber attacks such as ransomware threats and data breach incidents. In the wake of a non-stop onslaught from advanced hackers, it seems that no matter what defensive measures organizations put in place, cyber adversaries and malware authors are able to circumvent them.

Operationalizing Cybersecurity: Evolution, Seamlessness And Holistic Thinking As Key Drivers

operationalizing cybersecurity , Phishing , PCI , vulnerability management , cannabis , Enterprise

Michelle Drolet

When we say "operationalizing cybersecurity," what we are essentially saying is the implementation of best practices that strengthen your cybersecurity infrastructure. This results in a strong security posture able to address advanced and continuously evolving cyberthreats leveled at any organization. A well-defined cybersecurity strategy lies at the very root of seamless operationalizing. Key stakeholders like the C-suite and board members must actively define this strategy and ensure that itfalse

Build A Strong Cybersecurity Posture With These 10 Best Practices

Forbes Technology Council , Phishing , GDPR , MaaS , PCI , malware , ransomware , HIPAA , Compliance , COVID-19 , cannabis , cybersecurity , Enterprise , Equifax

Michelle Drolet

The numerous high-profile data breaches that took place in 2018 illustrate that no organization, irrespective of size, scale or scope, is immune from cyberattacks. Last year witnessed a 350% increase in ransomware attacks and a 70% increase in spear-phishing attacks.

7th Annual Information Security Summit - 6/6/19

MassBay Community College , IoT security , #summitbuzz19 , Phishing , GDPR , PCI , malware , ransomware , General Data Protection Regulation (GDPR) , Information Security Summit , HIPAA , Events , cannabis , Enterprise

Michelle Drolet

7th Annual Information Security Summit Presented by MassBay Community College and Towerwall, Inc.

Trends in Advanced Threat Detection & Vulnerability Management - 4/16/19

Phishing , GDPR , PCI , malware , ransomware , HIPAA , cannabis , Enterprise

Michelle Drolet

As cyber attacks become increasingly common, it is vital for organizations to be armed with the most effective tools and knowledge to prevent, detect and respond to cyber threats. Join this interactive Q&A panel with top security experts across the ecosystem to learn more about: