Towerwall's InfoSec Blog

Content Type

See all

Securing Your Future with a Virtual CISO

Fractional Chief Information Security Officer (CIS , Compliance & Privacy , penetration testing , Compliance , cannabis , Enterprise

Michelle Drolet

The enterprise is facing a dangerous combination of mounting cybersecurity threats of increasing subtlety, and a widening gap in the skills required to identify and combat them. Having someone that knows how to lead the charge in identifying and analyzing threats, creating strategic security plans and ensuring compliance, requires the right level of expertise. Many businesses, especially small and medium businesses, simply don’t have it.

7 security threats that go ignored too often

Phishing , Application Security , malware , cannabis , Enterprise

Michelle Drolet

From unencrypted email to open Wi-Fi to faulty firewalls, some of the most common security threats could easily give away the entire farm. More threats emerge for IT departments every year. Cybersecurity is increasingly challenging as attacks get more sophisticated. But many core basics are still being ignored.

Secure Your Future with a Virtual CISO - Featured in Infosecurity Magazine

Budget , Virtual CISO , Fractional Chief Information Security Officer (CIS , CISO , Information Security , Application Security , Security , Cloud Security , cannabis , cybersecurity , vCISO , Enterprise , Gap Assessment

Michelle Drolet

Towerwall Founder and CEO Michelle Drolet's latest article "Secure Your Future with a Virtual CISO" is featured in the Infosecurity Magazine. Read more below: The enterprise is facing a dangerous combination of mounting cybersecurity threats of increasing subtlety and a widening gap in the skills required to identify and combat them. Knowing how to lead the charge in identifying and analyzing threats, creating strategic security plans, and ensuring compliance, requires the right level offalse

Towerwall's Latest Article "Secure Your Future with a Virtual CISO" Featured in Infosecurity Magazine

Virtual CISO , Fractional Chief Information Security Officer (CIS , Information Security , cannabis , cybersecurity , vCISO , Enterprise , Gap Assessment

Michelle Drolet

Towerwall Founder and CEO Michelle Drolet's latest article "Secure Your Future with a Virtual CISO" is featured in the Infosecurity Magazine. Read more below:

Data Privacy Alert Vol 13.82 – The GHOST vulnerability - what you need to know

network security , Linux , Security Program , Information Security , Hackers , GHOST , Security Alert , cannabis , Enterprise , Data Breach

Michelle Drolet

The funkily-named bug of the week is GHOST. Its official moniker is the less catchy CVE-2015-0235, and it's a vulnerability caused by a buffer overflow in a system library that is used in many, if not most, Linux distributions. A buffer overflow is where you assume, for example, that when you handle a four-byte network number written out as decimal digits, you will never get anything longer than 255. 255. 255. 255. That takes up 15 characters, so you may decide that you'll never need more thanfalse

The 4 Es of Enterprise Security

Security Partners , network security , Security Services , IT Infrastructure , Assessment , Security Regulations , Enforce , Establish , Security Program , Information Security , Evaluate , Application Security , Security , Cloud Security , security policy , 4E Methodology , Educate , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

Building a solid security program takes time. Every organization is different. It's very important to assess your technology, and consider both internal and external threats. An assessment will reveal vulnerabilities. The remediation process will help you take full advantage of your existing security assets and point you at any gaps that need filling. Even once your defenses are in place, vigilance is an ongoing requirement because new threats are emerging all the time. In the face of ourfalse

Debunking 5 Reasons Businesses Use to Not Invest In Computer Security

network security , Risk Management , Data Security , Security Regulations , Information Security , Application Security , Security , Mac , software systems , malware , iPhone , software updates , Hackers , Cloud Security , security policy , cybercriminals , cloud services , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

The rise of malware seems to have passed some people by. As the ranks of cybercriminals grow and they find new ways to exploit our systems and steal our data, a lot of computer users and small-business owners have convinced themselves that it won't happen to them. Here are five common excuses that explain why some people think they don't need computer security and the reasons why they do.

Shellshock , The Latest Mac OSX and Linux Vulnerabilty—

network security , Shellshock. Bash bug , passwords , security software , Data Security , Linux , iOS update , Security Threat , Information Security , web server , Bash , Mac , Mac OSX , Hackers , cybercriminals , Security Alert , Data Privacy , security research , iOS , GNU Bash Remote Code Execution Vulnerability , Unix , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

By: Solange_Desc1 Security researchers have discovered a new software bug known as the “Bash Bug” or “Shellshock,” or to those more technically “in-the-know” as GNU Bash Remote Code Execution Vulnerability (CVE-2014-6271)(link is external). This bug, more correctly termed, ‘vulnerability’, potentially allows attackers to gain control over targeted computers. The bug is present in a piece of computer software called, Bash, that is typically found on computers running an operating system calledfalse

Firefox 32.0 fixes holes, shakes out some old SSL certs, introduces certificate pinning

security software , Data Security , Twitter , certificates , Information Security , Application Security , Security , cybercriminals , Data Privacy , cannabis , cybersecurity , Firefox , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

by Paul Ducklin on September 3, 2014

10 Things I Know About Social Engineering

IT Support , Social Engineering , Uniforms , USB , Phishing , Information Security , Security , quid pro quo , endpoint security system , security policy , financial security , scammers , 4E Methodology , Educate , Secure Building , cannabis , Enterprise

Michelle Drolet

10. Don't trust uniforms. Wearing shirts with company logos on them can be enough to gain access to restricted areas. Verify that visitors really are who they say they are.