Towerwall's InfoSec Blog

Content Type

See all
Information Security Summit 2017 Recap: Ransomware, Application Security, Unstructured Data and the Cloud

Information Security Summit 2017 Recap: Ransomware, Application Security, Unstructured Data and the Cloud

spear phishing , Information Security Summit 2017 , BYOD , Government Compliance Regulations , Third Party Outsourcing , Phishing , GDPR , PCI , malware , ransomware , Unstructured Data , HIPAA , Compliance & Privacy , GRC , penetration testing , Events , Compliance , cannabis , Enterprise

Michelle Drolet

Thanks to all who attended and sponsored our 2017 Information Security Summit. It was a great turnout where we discussed a number of issues and threats facing InfoSec today. We were happy to see attendees share ideas and continue the discussion online with #summitbuzz17

7 Steps to Proactive Security

CEO , CFO , BYOD , CIO , Phishing , GDPR , malware , ransomware , Encryption , Breach Prevention , continuous data protection (CDP) , SnoopWall , Ponemon Institute Data Breach , cannabis , Enterprise

Michelle Drolet

The key to securing against this threat lies in a common metaphor—if a ship has a hole, it is better to patch the breach than bail the water Data breaches are increasingly becoming an expensive problem for more and more companies. According to the most recent Ponemon Institute Data Breach report, insecure data cost companies an average of $221 per compromised record in 2016, an increase of 7 percent from the previous year and an all-time high. The key to securing against this threat lies in afalse

Information Security Summit 2016 Review: Ransomware, Application Vulnerability, Hacking as an Industry Lead our Discussion

spear phishing , BYOD , Government Compliance Regulations , Information Security Summit 2016 , malware , ransomware , Compliance & Privacy , GRC , Compliance , cannabis , Enterprise

Michelle Drolet

Thanks to all who attended and sponsored our 2016 Information Security Summit. It was a great turnout where we discussed a number of issues and threats facing infosec today. We were happy to see attendees share ideas and continue the discussion online with #summitbuzz16 Here are some of the topics discussed at this year's summit:

8 Tips to Secure Those IoT Devices

smart TV , BYOD , password , smart fridge , UPnP , Wi-Fi , Internet of Things , IoT , cannabis , Enterprise

Michelle Drolet

Make sure the Internet of Things isn’t a route for hackers to get into your home or workplace As more and more Internet-connected devices find their way into our homes and businesses, it’s important to remember that they represent a security risk. The Internet of Things (IoT) is growing rapidly, and in the rush for convenience, our privacy and safety is often an afterthought. Leaving them unsecured is the digital equivalent of leaving the back door unlocked. There are 5.5 million new thingsfalse

7 Potential Security Concerns for Wearables

Wearables , third party applications , password protection , BYOD , Bluetooth , Wireless , NFC , Compliance , cannabis , Enterprise

Michelle Drolet

Is your organization safe from all these connected devices? Wearables are rapidly invading the workplace in much the same way that smartphones did. Fitness trackers, smartwatches, head-mounted displays and other new form factors are beginning to capture the public imagination. Sales of wearable electronic devices topped 232 million in 2015, and Gartner forecasts they’ll rise 18.4% this year, when another 274.6 million devices are sold.

Are Mobile Apps Putting Your Data at Risk?

BYOD , Mobile Devices , Information Security , Encryption , Mobile Apps , Cloud Security , Mobile Security

Michelle Drolet

Frequently, companies don’t realize that the mobile apps they use are reason for concern. Once their data is breached, they begin to investigate. However, there are telltale signs that indicate an insecure mobile app. If you know what to look for, you may be able to avoid a catastrophic data breach. Mobile apps are everywhere and their benefits are many, offering functionality, flexibility and increased productivity. These apps have altered the way we do business. Unfortunately, all of thesefalse

More Devices, More Problems.

Unsecured Wi-Fi , network security , Data Security , IT Infrastructure , BYOD , Towerwall , Mobile Devices , Security Threat , Smartphone , Information Security , Application Security , Security , Mac , malware , Encryption , Mobile Apps , Cloud Security , Tablets , cloud services , Mobile Protection , Mobile Security , Data Breach

Michelle Drolet

Check out this infographic for the numbers behind BYOD.

Four Steps to Respond & Recover from Sophisticated Security Attacks

Security Partners , network security , security software , Data Security , BYOD , Security Regulations , credit card security , Mobile Devices , Security Threat , Security Program , Information Security , Mobile Apps , Hackers , endpoint security system , Cloud Security , cyber-attack , security policy , cybercriminals , financial security , Security Alert , information security tips , Compliance , Big Data , Mobile Protection , Data Privacy , security research , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Great information in SC Magazine’s latest whitepaper report, ‘Four steps to respond and recover from sophisticated security attacks’, it discusses the four proactive steps that you can – and should – take now to help keep your organization safe. Click here to view more details: http://bit.ly/131uu2J As we all know, cyber-attacks are becoming more sophisticated every year. At the same time, IT resources are moving outside the firewall and enterprises are distributing their applications and datafalse

Views from the Inside: A successful BYOD policy is not just about security

security software , Data Security , BYOD , Security Regulations , threat landscape , Mobile Devices , Security Threat , Security Program , Information Security , infected computer , Mobile Apps , Hackers , cyber-attack , security policy , cybercriminals , Tablets , information security tips , Big Data , Mobile Protection , Data Privacy , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

The BYOD trend shows no sign of abating as more and more organizations recognize the potential benefits in terms of cost and convenience. According to a recent surveyby Good Technology, 76 percent of enterprises are now supporting BYOD and the majority of those that still don’t are planning to do so in the near future. When we look closer, we find that 75 percent of those supporting BYOD employ at least 2,000 people, and 46 percent have 10,000 or more employees. Large organizations andfalse

BYOD Brings on a War of Worry

BYOD Brings on a War of Worry

network security , Security Services , security software , Data Security , BYOD , Mobile Devices , Security Threat , Security Program , Information Security , Security , Mobile Apps , Hackers , T-Mobile , cyber-attack , security policy , cybercriminals , Tablets , Security Alert , information security tips , Mobile Protection , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

It appears that BYOD, “Bring Your Own Device” to work, is beyond just being a growing trend if not currently a sanctioned practice within the corporate walls. It may seem that bowing to this desire on the parts of employees would have a lot to offer, not the least of which is a reduction in costs for employee-issued hardware. Unfortunately that is not entirely the case.