Towerwall's InfoSec Blog

Content Type

See all
Introducing

Introducing "Lunch with a vCISO" A Webinar Series from Towerwall

Fractional Chief Information Security Officer (CIS , cannabis , Enterprise

Michelle Drolet

Each session will provide unprecedented access to the industry’s top Virtual Chief Information Security Officers and cover critical issues in the field. The interactive series will cover a variety of topics, such as aligning information security policies with your firm’s culture and how to prepare for an audit. Attendees will be given the opportunity to ask questions of these experts during each session. Sessions will be held every other month and are designed to fit into your lunch hour.

Build it right with NIST’s Cybersecurity Framework

NIST , Cybersecurity Framework , Compliance & Privacy , Compliance , Special Publication 800-53 , cannabis , vCISO , Enterprise

Michelle Drolet

Diving into NIST Special Publication 800-53 for practical advice. We’ve already laid out a broad overview of what NIST’s cybersecurity framework can do for you, so today we’re going to drill into Special Publication 800-53. Published by the National Institute of Standards and Technology, and based on important research from the Information Technology Laboratory, this publication offers a comprehensive set of security controls to help you protect your data. The document refers to Federalfalse

Medical Marijuana Dispensaries: Take Care of Patient Health Information or Pay The Price

cannabis compliance , Banking Cannabis , HIPAA , Compliance & Privacy , Compliance , medical marijuana , SSL , cannabis

Michelle Drolet

Medical marijuana, like any controlled substance, requires a strong system of identifying patients properly. As the industry matures, the federal government has increasingly been more involved in enforcing ever more stringent laws and regulations on medical marijuana dispensaries. While it is easy to dismiss this if you’re running your business on a strictly cash-only basis, the future could change and possibly require you to do this. Why not prepare now, so that you can avoid possible problemsfalse

What NIST’s Cybersecurity Framework is and why it matters

Framework , NIST , Compliance & Privacy , Compliance , cannabis , Enterprise

Michelle Drolet

Practical advice to help you build a solid InfoSec plan The risk of your business falling victim to cybercrime has never been higher. Despite a seemingly endless parade of high profile data breaches, ransomware attacks, and phishing scams, many organizations still lack the necessary defenses to identify, prevent, or recover from an attack. The trouble is that it has become increasingly easy for would-be attackers. Anyone can hire a botnet or buy off-the-shelf malware, complete with technicalfalse

Tips to Protect Your Business From Ransomware

CYBER , CryptoWall , ransomware , FBI , cybercriminals , CryptoWall v3 , cannabis , Enterprise

Michelle Drolet

Over the last few years we’ve observed the steady rise of ransomware with some trepidation. It is fast becoming a multi-million dollar business, and it’s getting surprisingly sophisticated. The ransomware industry is continually innovating, offering cybercriminals new technology, various business models, and all the support they need to conduct successful attacks on unsuspecting individuals and companies.

Customer Case Study: Canna Care

cannabis security , case study , medical cannabis , cannabis compliance , Banking Cannabis , Compliance & Privacy , Compliance , cannabis , canna care

Michelle Drolet

Canna Care Docs is a dynamic company specializing in cannabinoid therapies. Canna Care Docs hired Towerwall to assess their effectiveness in protecting sensitive information such as patient health information and employee personal information from security breaches.

Information Security Summit 2017 Recap: Ransomware, Application Security, Unstructured Data and the Cloud

Information Security Summit 2017 Recap: Ransomware, Application Security, Unstructured Data and the Cloud

spear phishing , Information Security Summit 2017 , BYOD , Government Compliance Regulations , Third Party Outsourcing , Phishing , GDPR , PCI , malware , ransomware , Unstructured Data , HIPAA , Compliance & Privacy , GRC , penetration testing , Events , Compliance , cannabis , Enterprise

Michelle Drolet

Thanks to all who attended and sponsored our 2017 Information Security Summit. It was a great turnout where we discussed a number of issues and threats facing InfoSec today. We were happy to see attendees share ideas and continue the discussion online with #summitbuzz17

10 things I know about... Securing mobile devices

password protection , password , Mobile Devices , Worcester Business Journal , Phishing , 10 Things I Know , cannabis , Enterprise

Michelle Drolet

10) Always lock your screen. Unlocked phones are always going to dangerously accessible. The first line of defense is a PIN, password, pattern or a biometric measure like your fingerprint.

Join us for the ISSA New England August 2017 Sponsor Expo

Cyber Security Career Lifecycle ( CSCL ) , Webinar , Information Systems Security Association (ISSA) , Cyber Security , ISSA New England , cannabis , Enterprise

Michelle Drolet

Please join us for the The ISSA New England Chapter's 2017 Sponsor Expo Wednesday, August 2, 2017 from 8:00 AM to 4:30 PM EDT Verizon Labs 60 Sylvan Rd Waltham, MA 02451 You are invited to ISSA, New England Chapter's Annual Sponsor Expo and Chapter Meeting. Compete in the Security Bee (questions from the CISSP exam) and bring home a cash prize and award (win and place), fame and your place in history.

When It Comes to Cyber Security, The Weakest Link is Still Employees

Training , employee , cannabis , Enterprise , Gap Assessment

Michelle Drolet

We need to make sure the highly regulated world of cannabis business knows how to protect its data, customer and otherwise, yet also control access to it without too much hassle. As an insurgent breed, hackers are savvy and will seek out the path of least resistance. When your defenses are good, the weak link is often your employees. Data breaches are most likely to be the result of employee error or an inside job, says the ACC Foundation: State of Cybersecurity Report. Of course you want tofalse