Towerwall's InfoSec Blog

Content Type

See all

6 Steps to Building a Strong Breach Response Plan

Business Continuity , CCPA , Phishing , GDPR , phishing attacks , PCI , ransomware , HIPAA , Compliance & Privacy , Compliance , COVID-19 , Breach Response Plan , cannabis , Enterprise

Michelle Drolet

Cybersecurity resilience depends on having a detailed, thorough, and tested breach response plan in place. Here's how to get started. No matter how secure your business, data breaches are an unfortunate fact of life. Whether an attack is the result of a determined cybercriminal, a disgruntled insider, or simple human error, you can limit the damage with a carefully crafted response strategy. There’s a lot of groundwork to cover to begin building an effective strategy for coping with a breach:false

10 Things I know about ... Working from home

Business Continuity , Worcester Business Journal , Phishing , ransomware , 10 Things I Know , Remote Workforce , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

10) Zooming out. Video conferencing is a two-edged sword; while a boon to nurture group discussion, the degree of focus paid to a small screen while feeling self-conscious (how’s my hair?) can oversaturate users. People are now reporting Zoom fatigue, citing anxiety. Identify mental health and grief counsellors who can step in during these COVID-19 times.

Five Things To Keep In Mind Before Adopting A Zero Trust Security Approach

Business Continuity , Phishing , Zero Trust , ransomware , COVID-19 , cannabis , Enterprise

Michelle Drolet

The COVID-19 pandemic has brought about a seismic shift in how the world goes to work. Apart from essential services, remote work is the new normal, mandated everywhere — even in organizations that never previously offered remote work options.

Securing Your Remote Workforce In The New Norm

Business Continuity , Phishing , Coronavirus , ransomware , Remote Workforce , COVID-19 , cannabis , Enterprise

Michelle Drolet

These are unprecedented times. As companies scramble for business continuity, millions of workers around the world are forced to adapt to a workplace culture dubbed as the world's largest work-from-home experiment. But there is a steep price to be paid for this change — weakened cybersecurity. With more and more people working from home, the attack surface has never been wider for attackers to take advantage of.

What Exactly Is Automated Penetration Testing? - 2/27/19

Business Continuity , malware , ransomware , penetration testing , cannabis , Enterprise

Michelle Drolet

What Exactly Is Automated Penetration Testing? Software-based penetration testing is here! Learn how leading companies are taking advantage of this new technology to drive cost-effective remediation.

Best Practices for Protecting Your Business from Cybercrime

Business Continuity , ransomware , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Best Practices for Protecting Your Business from Cybercrime Cybercrime has evolved from random activities being carried out by individuals into a billion dollar illegal industry that continues to grow. How is cybersecurity keeping up with the rise of cybercrime?

Battling Ransomware: How To Prevent A Ransomware Incident

security software , Social Engineering , Business Continuity , Phishing , PCI , malware , ransomware , cannabis , Enterprise

Michelle Drolet

Ransomware attacks can prove extremely disruptive and expensive to remedy. Prevention is better than finding a cure, and ransomware incidents are easily preventable with the right action. A few high-profile ransomware incidents have spread awareness, and many individuals and organizations have likely taken strides to protect themselves, which may have diminished the success rate of ransomware and prompted attackers to employ other means. A Kaspersky report shows a 30% decline in ransomwarefalse

Harness the NIST CSF to Boost your Security and Compliance

CSF , Business Continuity , NIST , CCPA , GDPR , PCI , NIST Cybersecurity Framework (CSF) , HIPAA , Compliance & Privacy , Compliance , cannabis , Enterprise

Michelle Drolet

The NIST Cybersecurity Framework (CSF) is a crowdsourced set of best practices to help you analyze your cyber risk posture and work towards improving it. Learn what it can do for your business, how to tailor and implement it, and how to manage it to work towards your desired security posture. The cybersecurity threat and the need to ensure compliance continue to loom large in the business world. Boards and management want to know the current status of their cybersecurity posture, but it canfalse

The Rise of Targeted Ransomware

Webinar , Business Continuity , Michelle Drolet , Phishing , BrightTalk , malware , ransomware , COVID-19 , cannabis , cybersecurity , Breach Response , Enterprise , Data Breach

Michelle Drolet

The Rise of Targeted Ransomware What is targeted ransomware? Are you susceptible? What can you do to defend against it? Presented by: Michelle Drolet, CEO, Towerwall

Mindset Entrepreneur featuring Michelle Drolet

Mindset Entrepreneur featuring Michelle Drolet

Business Continuity , CCPA , Phishing , GDPR , PCI , malware , ransomware , HIPAA , Compliance & Privacy , Compliance , cannabis , Enterprise

Michelle Drolet

Michelle Drolet sits down with Mindset Entrepreneur. Click the image below to watch now: