Towerwall's InfoSec Blog

Content Type

See all

Hackers show no mercy—even for pot dispensaries

cannabis security , medical cannabis , cannabis compliance , point-of-sale breach , medical marijuana , pot dispensaries , MJ Freeway , cannabis

Michelle Drolet

Anatomy of a national point-of-sale breach and takedown of 1,000-plus marijuana dispensaries Back when Apple was the plucky young upstart that dared to be different, the Mac was the machine for creative types and there was a perception that it wasn’t a target for hackers because of its cultural cool factor. You would expect the same rules to apply to the legalized marijuana market, but a major hack attack on a pot dispensary last month set that notion up in smoke. MJ Freeway, providers offalse

10 Things I know about... Security Precautions

passwords , Worcester Business Journal , Wireless , Web Browser , third-party social media plug-ins , cannabis , Enterprise

Michelle Drolet

10) Change your password. If you've been using the same password for a long time, then it's time to change it. You should not only change your passwords regularly but not use the same one for every app or website. Try to use more than 13 characters.

6 Ways to Launch a Targeted Cyberattack

Spear phishing emails , Targeted Cyberattack , Cyberattack , penetration testing , cannabis , Enterprise

Michelle Drolet

What you need to know to defend against targeted attacks. The threat of a targeted attack for any business is real and substantial. It's vital to ensure that your organization can identify constantly evolving threats, find abnormal and suspicious activity, and take effective action to keep your data safe. Consider that, on average, attackers are in a network for more than 140 days before they're detected, and 60% of network intrusions are eventually traced back to credentials, according to false

Save the Date: Information Security Summit 2017

Security Partners , network security , Fractional Chief Information Security Officer (CIS , Information Security , Application Security , Security , Information Security Summit , Compliance & Privacy , penetration testing , Events , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Click here for more information & to register! Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

10 Things I Know About ... Legal weed

cannabis security , Worcester Business Journal , cannabis compliance , Compliance , Legal weed , cannabis

Michelle Drolet

10) Adult use A key legislative issue for both opponents and supporters. Only those 21 and over can legally consume, possess and grow marijuana. Some legislators are advocating for a higher age limit.

5 Cybersecurity Trends to Watch for 2017

5 Cybersecurity Trends to Watch for 2017

Fractional Chief Information Security Officer (CIS , CISO , Phishing , Application Security , ransomware , Internet of Things , IT departments , third-party partners , DDoS attacks , cannabis , cybersecurity , trends , vCISO , Enterprise

Michelle Drolet

Fresh and familiar threats to concern IT departments. As we embark on 2017, it's time to reflect on a year where cybersecurity has played a major role. Even presidential campaigns haven’t been free from hacking scandals and data leaks. The average cost of a data breach for companies grew from $3.8 million last year to $4 million in 2016, according to the Ponemon Institute. Companies of all sizes have embraced the cloud and open source has become the standard for infrastructure software. Bothfalse

Michelle Drolet Talks to tED Magazine about How Companies Can Prepare for a Security Breach

Michelle Drolet , Corporate Security , cannabis , tED Magazine , Enterprise

Michelle Drolet

Our own Michelle Drolet sits down with tED Magazine to discuss what security measures companies can take to protect their data. Read the full article >

IoT Could Be Our Downfall

IoT security , Gartner , Department of Consumer Affairs , Phishing , malware , ransomware , Internet of Things , cybercriminals , cannabis , Enterprise , Data Breach

Michelle Drolet

We need to secure the internet of things. The internet of things (IoT) is all about connecting devices to the internet so that they can talk to each other and to us, to make life more convenient. That might mean turning on the lights when we get up, or allowing us to use our phones to see who’s at the front door, even when we're at the office. The potential applications are endless. There are already more than 6 billion connected "things," and that's set to rise to more than 20 billion byfalse

Congratulations to our Partner Snoopwall for Being Named One of the 50 Fastest Growing Tech Companies for 2016

Silicon Review , Phishing , small to medium size enterprises (SMEs) , ransomware , SnoopWall , cannabis , Enterprise

Michelle Drolet

The Silicon Review has declared SnoopWall is One of the 50 Fastest Growing Tech Companies for 2016. SnoopWall, Inc. delivers breach prevention technology that helps small to medium size enterprises (SMEs) get one step ahead of the next cyber-criminal, malicious insider, phishing attacks, ransomware or zero-day malware behind the corporate firewall. Customer adoption and growth metrics determine which companies receive this award. Snoopwall's yearly 300% growth rate is in part because of thefalse

What is the General Data Protection Regulation and why should you care?

ata protection officer , DPO , GDPR , Compliance & Privacy , EU legislation , General Data Protection Regulation , cannabis , Enterprise , Data Breach , Penalties

Michelle Drolet

Find out how to prepare for new EU legislation on data collection and security In 2012, the European Commission proposed new regulations on data protection that would supersede the national laws of the 28 EU member states. It was formally approved in April this year, and it will go into effect May 25, 2018. This General Data Protection Regulation (GDPR) introduces several major changes that will impact many organizations worldwide. The smart move is to familiarize yourself with the incomingfalse