Towerwall's InfoSec Blog

Content Type

See all

Save the Date: Information Security Summit 2017

Security Partners , network security , Fractional Chief Information Security Officer (CIS , Information Security , Application Security , Security , Information Security Summit , Compliance & Privacy , penetration testing , Events , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Click here for more information & to register! Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

5 Cybersecurity Trends to Watch for 2017

5 Cybersecurity Trends to Watch for 2017

Fractional Chief Information Security Officer (CIS , CISO , Phishing , Application Security , ransomware , Internet of Things , IT departments , third-party partners , DDoS attacks , cannabis , cybersecurity , trends , vCISO , Enterprise

Michelle Drolet

Fresh and familiar threats to concern IT departments. As we embark on 2017, it's time to reflect on a year where cybersecurity has played a major role. Even presidential campaigns haven’t been free from hacking scandals and data leaks. The average cost of a data breach for companies grew from $3.8 million last year to $4 million in 2016, according to the Ponemon Institute. Companies of all sizes have embraced the cloud and open source has become the standard for infrastructure software. Bothfalse

Save the Date: Information Security Summit 2016

Security Partners , network security , Fractional Chief Information Security Officer (CIS , Phishing , GDPR , Information Security , Application Security , Security , ransomware , Information Security Summit , HIPAA , Compliance & Privacy , penetration testing , Events , Compliance , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Click here for more information & to register! Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

5 Information Security Trends for 2016

DRIDEX botnet , Darkode , China hack , EMV credit cards , SIMDA botnet , Application Security , Google Wallet , mobile malware , ransomware , Internet of Things , smart-connected , RFID credit cards , IoT , cannabis , EU Data Protection , Enterprise , Apple Pay

Michelle Drolet

Online security trends continue to evolve. This year, online extortion will become more prevalent. We also expect that at least one consumer-grade IoT smart device failure will be lethal. Ransomware will make further inroads, since the majority go unreported. China will drive mobile malware growth to 20M, and cybercrime legislation will take a significant step towards becoming a truly global movement. Here are five information security trends on track for the New Year:

Applying more Critical Security Controls to your organization

Fractional Chief Information Security Officer (CIS , Application Security , Compliance & Privacy , vulnerability management , cannabis , Enterprise , Data Breach , Critical Security Controls (CSC)

Michelle Drolet

The last time we looked at how Critical Security Controls (CSC) can help you build your InfoSec framework, we covered getting a handle on your software and your hardware inventories. Today, we're going to discuss the importance of continually assessing and remediating vulnerabilities, keeping a tight control of administrative privileges, and monitoring your audit logs. These concepts are encapsulated in CSCs 4, 5, and 6. You should develop stringent policies, consider devoting resources tofalse

Another Successful Information Security Summit

passwords , Smart Device , Data Security , COSO Cube , IT Infrastructure , Government Compliance Regulations , Virtual CISO , Assessment , Mobile Devices , CISO , Information Security , Application Security , Mobile Apps , Information Security Summit , Hackers , cybercriminals , Compliance , cloud services , Big Data , Mobile Protection , Data Privacy , Mobile Security , cybersecurity , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

Once again, the Information Security Summit hosted by Towerwall and MassBay was a resounding success. Hundreds of attendees and vendors participated in diverse data security panels and networked with industry leaders and peers. The Summit opened with Michelle Drolet, CEO of Towerwall, and Shamsi Moussav, Computer Science Professor at MassBay Community College, presenting scholarships to MassBay students Kirk Barge and Julius Newton. Michelle Drolet said,

7 security threats that go ignored too often

Phishing , Application Security , malware , cannabis , Enterprise

Michelle Drolet

From unencrypted email to open Wi-Fi to faulty firewalls, some of the most common security threats could easily give away the entire farm. More threats emerge for IT departments every year. Cybersecurity is increasingly challenging as attacks get more sophisticated. But many core basics are still being ignored.

Secure Your Future with a Virtual CISO - Featured in Infosecurity Magazine

Budget , Virtual CISO , Fractional Chief Information Security Officer (CIS , CISO , Information Security , Application Security , Security , Cloud Security , cannabis , cybersecurity , vCISO , Enterprise , Gap Assessment

Michelle Drolet

Towerwall Founder and CEO Michelle Drolet's latest article "Secure Your Future with a Virtual CISO" is featured in the Infosecurity Magazine. Read more below: The enterprise is facing a dangerous combination of mounting cybersecurity threats of increasing subtlety and a widening gap in the skills required to identify and combat them. Knowing how to lead the charge in identifying and analyzing threats, creating strategic security plans, and ensuring compliance, requires the right level offalse

How to keep cybercriminals out of your apps

Application Security , penetration testing

Michelle Drolet

Four ways to implement and maintain security testing. Cybercriminals had a fantastic time in 2014 – breaching major retailers such as Home Depot and Kmart, major financial institutions (notably JPMorgan Chase), and a slew of smaller companies.

Data Privacy Alert Vol 13.83 – Anthem Healthcare Breach

ID Theft , Information Security , Application Security , Security , FBI , Hackers , Cloud Security , security policy , Security Alert , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

secuProvided by William Gallagher Associates Insurance Brokers, Inc. News broke last week that Anthem, the nation’s second-largest health insurance carrier, was the victim of a data breach by external hackers. This breach affects both current and potentially former clients of Anthem. WGA is monitoring the situation on an ongoing basis, and here is what we know at this point. Anthem is working with the FBI to determine the extent of the compromised data. To provide members with the most currentfalse