Towerwall's InfoSec Blog

Content Type

See all

10 Things to Know Before Creating BYOD Policy

Security Services , Data Security , BYOD , Security Threat , Security Program , Security , software updates , Cloud Security , security policy , penetration testing , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

In recent years, the work place has become more mobile than ever, and the mobile worker revolution is, in large part, the reason for the rise in Bring Your Own Device (BYOD) policies. The big idea is that through the use of cloud computing-based collaboration platforms, enterprise-class companies can save a great deal of money in IT, security and overall operational costs. While this would seem like a no-brainer, more companies are learning that the opposite is true. Both executives andfalse

Introducing our Security Training Toolkit

Security Partners , Security Services , Data Security , Security Regulations , Security Program , Information Security , Security , vulnerability scanning , Hackers , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Compliance , cannabis , cybersecurity , Enterprise

Michelle Drolet

A customizable security training program for your review. We're giving you all the tools you need to keep your employees out of trouble. Whether you’re starting a program from scratch, or just in need of some refresher materials, we’ve got you covered. Here’s whats included in the Towerwall Security Training Toolkit:

Michelle Drolet Named One of the Most Powerful Women Of The Channel for 2012

network security , security software , Data Security , Towerwall , Security Regulations , Michelle Drolet , Security Program , Information Security , Security , security policy , information security tips , cannabis , cybersecurity , Enterprise

Michelle Drolet

Michelle Drolet, CEO of Towerwall came in at number 32 for the most powerful women for the Channel Reseller Network (CRN). The following 100 are pulled from those ranks as executives who have proven themselves exceptional during the past year. CRN is proud to highlight their achievements. For more information Visit CRN online

Why You Need A Mobile Device Policy

Security Partners , network security , Security Services , security software , Data Security , BYOD , Security Regulations , Mobile Devices , Security Threat , cisco , Security Program , Information Security , Security , Mobile Apps , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Compliance , Mobile Protection , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Whether you choose to embrace it or try to resist it, the BYOD (Bring Your Own Device) trend is set to grow. A study by Cisco Systems found that 78 percent of white-collar workers in the U.S. use a mobile device for work and 41 percent indicated that most smartphones that connect to the company network are actually employee-owned. So, if you don't already have a BYOD policy, you need one. Employees will connect to your network and use their personal mobile devices for work, whether you allow itfalse

Apple iCloud breach proves Wozniak's point about cloud risks

network security , passwords , Mobile Devices , Application Security , software updates , cybercriminals , penetration testing , cloud services , cannabis , Enterprise

Michelle Drolet

In a great article by Ted Samson at InfoWorld, that not even a complex, 16-character password guarantees that your cloud-based data and devices are secure. Here is what Ted had to say: This past weekend, Apple co-founder Steve Wozniak predicted that cloud computing would yield "horrible problems" in coming years. By extraordinary coincidence, Wired reporter Mat Honan experienced firsthand a series of horrible, cloud-related problems, all of which reportedly started when an unnamed Applefalse

Fake Groupon discount emails carry malware

network security , Social Engineering , Phishing , malware , security policy , cybercriminals , cannabis , Enterprise

Michelle Drolet

Cybercriminals have spammed out malware, attached to emails claiming to be related to discounts for offers on Groupon. The emails, which have the poorly spelt subject line of "Groupon discount gifts" (in itself something which should ring alarm bells), pretend to come from Groupon, and claim that one of your friends has found a deal on the website. The website says that your friend has decided to share the deal with you, and that you are receiving a discount code as a result. Part of the emailfalse

Malware attack spread as email from your office's HP scanner

network security , Phishing , Application Security , malware , software updates , penetration testing , cannabis , Enterprise

Michelle Drolet

For those on our Security Alert and Update list we just emailed an article by Graham Cluley on how a malware attack spread as email from your office's HP scanner, yes that's right a scanner! In these high-tech times, scanners and photocopiers aren't just dumb machines sitting in the corner of the office. They are usually connected to the corporate network, and - in some cases - can even email you at your desk to save you having to wear out your shoe leather. And it's precisely thisfalse

Symantec Update Causes Some XP Systems to BSOD

security software , Data Security , Security Threat , Information Security , Application Security , software updates , Security Alert , information security tips , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

Security firm Symantec released malware signature updates for it antivirus software that caused some Windows XP machines to crash into a Blue Screen Of Death — BSOD. The update was sent out to users of Symantec’s security products over about an eight hour period between July 11th and 12th. “The root cause of the issue,” writes Symantec’s Orla Cox, “was an incompatibility due to a three way interaction between some third party software that implements a file system driver using kernel stackfalse

The worst passwords you could ever choose

Security Partners , network security , Security Services , passwords , security software , Data Security , Security Regulations , credit card security , Security Threat , Security Program , Information Security , Cloud Security , security policy , penetration testing , financial security , Security Alert , information security tips , Compliance , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

For those on our Security Alert and Update list we just emailed this great article by Graham Cluley on the worst possible passwords you could ever choose. Many of you know this is something we preach to our clients on a regular basis and is part of our comprehensive 4E Program. Too many internet users are making poor decisions when choosing their passwords. We've spoken time and time again about the importance of choosing hard-to-crack, unguessable, unique passwords that (provided the websitefalse

The BYOD - Trend Continues to Grow

network security , Mobile Devices , security policy , cloud services , cannabis , Enterprise

Michelle Drolet

Like it or not, the line between the workplace and the home is blurring. Work-at-home arrangements are becoming more common and cloud services make it easier to coordinate teams online. People are constantly on call, with the ability to check their emails and stay in touch wherever they are. The days of having a personal mobile and a work device are fast disappearing as the BYOD (Bring Your Own Device) trend continues to grow. A recent SkyDox survey survey found that 77 percent of informationfalse