Towerwall's InfoSec Blog

Content Type

See all

Botnets: Is your network really protected?

ito , Michelle Drolet , Smart Home , NetworkWorld , Internet of Things , botnets , cannabis , Enterprise

Michelle Drolet

Security is taking a backseat as more and more devices connect to the internet The tech world moves at a tremendous pace, unleashing wave after wave of innovation intended to improve our everyday lives. Many new devices, from security cameras to fridges, or TVs to baby monitors, are now internet connected. This affords us remote access and facilitates the collection of data, which is ostensibly used to make our systems “smarter.” However, it also opens new doors into our offices and homesfalse

Great article: Fraud Speak — Learn the Lingo to Beat Scammers

hackings , Phishing , ransomware , lingo , cannabis , Enterprise

Michelle Drolet

In order to stay ahead of threats, you need to know what to watch out for. This great article:

InfoSec at Your Services Meetup: 7 Secrets of Offensive Security - Thursday, April 6, 2017

InfoSec at Your Services Meetup: 7 Secrets of Offensive Security - Thursday, April 6, 2017

Offensive Security , InfoSec at Your Services Meetup , InfoSec at Your Services , malware , Events , SnoopWall , meetup , Gary Miliefsky , cannabis , Enterprise

Michelle Drolet

Join us for our next InfoSec at Your Services Meetup: "7 Secrets of Offensive Security" by Gary Miliefsky

Michelle Drolet

Back when Apple was the plucky young upstart that dared to be different, the Mac was the machine for creative types and there was a perception that it wasn’t a target for hackers because of its cultural cool factor. You would expect the same rules to apply to the legalized marijuana market, but a major hack attack on a pot dispensary last month set that notion up in smoke. MJ Freeway, providers of popular medical marijuana tracking software, suffered a point-of-sale system hack that left overfalse

Hackers show no mercy—even for pot dispensaries

cannabis security , medical cannabis , cannabis compliance , point-of-sale breach , medical marijuana , pot dispensaries , MJ Freeway , cannabis

Michelle Drolet

Anatomy of a national point-of-sale breach and takedown of 1,000-plus marijuana dispensaries Back when Apple was the plucky young upstart that dared to be different, the Mac was the machine for creative types and there was a perception that it wasn’t a target for hackers because of its cultural cool factor. You would expect the same rules to apply to the legalized marijuana market, but a major hack attack on a pot dispensary last month set that notion up in smoke. MJ Freeway, providers offalse

10 Things I know about... Security Precautions

passwords , Worcester Business Journal , Wireless , Web Browser , third-party social media plug-ins , cannabis , Enterprise

Michelle Drolet

10) Change your password. If you've been using the same password for a long time, then it's time to change it. You should not only change your passwords regularly but not use the same one for every app or website. Try to use more than 13 characters.

Michelle Drolet to Speak at Cumberland County College's 2017 Business Leaders' Summit

Cumberland County College's 2017 Business Leaders' , Compliance & Privacy , Events , Compliance

Michelle Drolet

Cumberland County College invites regional decision-makers to hear Google's Executive Leadership Coach Steve Vinter and Towerwall's Michelle Drolet at the college's 2017 Business Leaders' Summit. Click here for more information >

6 Ways to Launch a Targeted Cyberattack

Spear phishing emails , Targeted Cyberattack , Cyberattack , penetration testing , cannabis , Enterprise

Michelle Drolet

What you need to know to defend against targeted attacks. The threat of a targeted attack for any business is real and substantial. It's vital to ensure that your organization can identify constantly evolving threats, find abnormal and suspicious activity, and take effective action to keep your data safe. Consider that, on average, attackers are in a network for more than 140 days before they're detected, and 60% of network intrusions are eventually traced back to credentials, according to false

Save the Date: Information Security Summit 2017

Security Partners , network security , Fractional Chief Information Security Officer (CIS , Information Security , Application Security , Security , Information Security Summit , Compliance & Privacy , penetration testing , Events , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Click here for more information & to register! Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

10 Things I Know About ... Legal weed

cannabis security , Worcester Business Journal , cannabis compliance , Compliance , Legal weed , cannabis

Michelle Drolet

10) Adult use A key legislative issue for both opponents and supporters. Only those 21 and over can legally consume, possess and grow marijuana. Some legislators are advocating for a higher age limit.