Towerwall's InfoSec Blog

Content Type

See all

Critical fixes for Office, Outlook and IE in September Patch Tuesday

Security Services , Data Security , Office , threat landscape , Outlook , Security Threat , Security Program , Information Security , Security , Hackers , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Big Data , Data Privacy , IE , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Windows admins will have their hands full with the large number of security updates in this month's Patch Tuesday. There are fixes for 47 vulnerabilities in 13 bulletins for September's Patch Tuesday cycle. Four of this month's bulletins are critical. This year's total for bulletins is up to 79, a considerable increase from 62 at the same time last year. One critical bulletin this month addresses a remote code execution vulnerability in Microsoft Outlook, which can be exploited if users openfalse

Phone 5S Phishing Mail Arrives in time for launch.

Security Services , Data Security , infected phone , threat landscape , iOS update , Mobile Devices , Security Threat , Smartphone , Phishing , Information Security , Security , iPhone , Mobile Apps , cyber-attack , Apple , cybercriminals , Security Alert , information security tips , Big Data , Mobile Protection , Data Privacy , iOS , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

While millions of mobile users are anticipating the launch of the new iPhone (5S and 5C), cybercriminals are already making their move to distribute spam that promise to give away the said devices for free, in the guise of a contest. We saw samples of spammed messages that attempted to spoof an Apple Store email notification. The said message informs recipients that they won the latest iPhone 5S mobile phones and iPad. Figure 1. Fake Apple email To get these prizes, they are asked to go to afalse

Read the EDA's Report on Malware Infections

Security Partners , Security Services , Data Security , Security Threat , Information Security , malware , cyber-attack , cybercriminals , Security Alert , information security tips , Big Data , Data Privacy , security research , cybersecurity , Data Breach

Michelle Drolet

Read the EDA's Report on Malware Infections - Malware Infections on EDA’s Systems Were Overstated and the Disruption of IT Operations Was Unwarranted Click here to read.

Four Steps to Respond & Recover from Sophisticated Security Attacks

Security Partners , network security , security software , Data Security , BYOD , Security Regulations , credit card security , Mobile Devices , Security Threat , Security Program , Information Security , Mobile Apps , Hackers , endpoint security system , Cloud Security , cyber-attack , security policy , cybercriminals , financial security , Security Alert , information security tips , Compliance , Big Data , Mobile Protection , Data Privacy , security research , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Great information in SC Magazine’s latest whitepaper report, ‘Four steps to respond and recover from sophisticated security attacks’, it discusses the four proactive steps that you can – and should – take now to help keep your organization safe. Click here to view more details: http://bit.ly/131uu2J As we all know, cyber-attacks are becoming more sophisticated every year. At the same time, IT resources are moving outside the firewall and enterprises are distributing their applications and datafalse

Introducing Towewall's Alternative Cloud-based File Sharing Solutions

Security Partners , network security , Security Services , security software , Data Security , Towerwall , Security Regulations , threat landscape , Security Program , Information Security , Application Security , Security , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , information security tips , cloud services , Big Data , Data Privacy , cybersecurity , Data Breach

Michelle Drolet

Towerwall Security / Vulnerability Alert: Microsoft announces five Bulletins for Patch Tuesday, including Office for Mac

Security Services , Data Security , Office , Towerwall , Security Regulations , Security Threat , Security Program , Information Security , Security , Mac , security policy , Microsoft , Security Alert , information security tips , Big Data , Data Privacy , vulnerability management , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Midsummer Patch Tuesday (or midwinter, depending on your latitude) takes place on Tuesday 11 June 2013. As you probably already know, Microsoft publishes an official Advance Notification each month to give you early warning of what's coming. These early notifications generally don't give any details, summarizing only the basics, such as:

Views from the Inside: A successful BYOD policy is not just about security

security software , Data Security , BYOD , Security Regulations , threat landscape , Mobile Devices , Security Threat , Security Program , Information Security , infected computer , Mobile Apps , Hackers , cyber-attack , security policy , cybercriminals , Tablets , information security tips , Big Data , Mobile Protection , Data Privacy , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

The BYOD trend shows no sign of abating as more and more organizations recognize the potential benefits in terms of cost and convenience. According to a recent surveyby Good Technology, 76 percent of enterprises are now supporting BYOD and the majority of those that still don’t are planning to do so in the near future. When we look closer, we find that 75 percent of those supporting BYOD employ at least 2,000 people, and 46 percent have 10,000 or more employees. Large organizations andfalse

Verify the Security of your Mobile Apps

Security Partners , network security , Security Services , security software , Data Security , Mobile Devices , Security Threat , Security Program , Information Security , Application Security , Security , iPhone , Mobile Apps , T-Mobile , security policy , information security tips , Big Data , Mobile Protection , Data Privacy , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Network World - The enterprise is increasingly turning to mobile app developers for solutions to leverage interest in BYOD. Gartner estimates that 70% of mobile professionals will conduct their work on personal smart devices by 2018. The app development boom has fostered a competitive environment for developers and there is a focus on speed. But In the rush to deploy enterprise apps and start reaping the benefits, it is easy to overlook key security risks that could cause irreparable damage tofalse

How to ensure mobile apps are secure for the enterprise

Android , Security Services , security software , Data Security , Security Regulations , threat landscape , Mobile Devices , Security Threat , Security Program , Application Security , Security , malware , iPhone , Mobile Apps , T-Mobile , security policy , Big Data , Mobile Protection , Data Privacy , security research , Mobile Security , cannabis , Enterprise , Data Breach

Michelle Drolet

As the app revolution has gathered pace and smartphones and tablets have become ubiquitous, the importance of testing app security has grown. Many companies have embraced the BYOD trend. They may even have developed applications that enable employees to have 24/7 access to business data and tools. The benefits can be counted in productivity boosts and flexibility, but there is a real and present danger that is being ignored all too often. How many of these enterprise apps have undergonefalse

Warning: Java vulnerable to hackers, U.S. government says

Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Security , Hackers , cyber-attack , security policy , cybercriminals , Security Alert , Big Data , Data Privacy , security research , cybersecurity , Enterprise , Data Breach , Java

Michelle Drolet

Jan 11 (Reuters) - The U.S. Department of Homeland Security urged computer users to disable Oracle Corp's (ORCL:$34.8625,$-0.0475,-0.14%) Java software, amplifying security experts' prior warnings to hundreds of millions of consumers and businesses that use it to surf the Web.