Towerwall's InfoSec Blog

Content Type

See all

Data Privacy Alert Vol 13.83 – Anthem Healthcare Breach

ID Theft , Information Security , Application Security , Security , FBI , Hackers , Cloud Security , security policy , Security Alert , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

secuProvided by William Gallagher Associates Insurance Brokers, Inc. News broke last week that Anthem, the nation’s second-largest health insurance carrier, was the victim of a data breach by external hackers. This breach affects both current and potentially former clients of Anthem. WGA is monitoring the situation on an ongoing basis, and here is what we know at this point. Anthem is working with the FBI to determine the extent of the compromised data. To provide members with the most currentfalse

Michelle Drolet published in NetworkWorld - Are mobile apps putting your data at risk?

Android , Information Security , Application Security , Mobile Apps , Cloud Security , Mobile Security , Data Breach , Gap Assessment

Michelle Drolet

Our Michelle Drolet is quoted in NetworkWorld's article "Are mobile apps putting your data at risk?". Read more below:

Data Privacy Alert Vol 13.81 – Massive breach at health care company Anthem Inc.

Information Security , Application Security , ransomware , Cloud Security , Compliance & Privacy , security policy , Security Alert , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Anthem, the nation's second-largest health insurance company, is the latest target of a security breach. Eighty million customers, including the company's own CEO, are at risk of having their personal information stolen. VPC SAN FRANCISCO - As many as 80 million customers of the nation's second-largest health insurance company, Anthem Inc., have had their account information stolen, the company said in a statement. "Anthem was the target of a very sophisticated external cyber-attack," Anthemfalse

Data Privacy Alert Vol 13.80 - CES 2015 Trends that Can Impact Data and Privacy

Wearables , 3D Printing , Smart Device , CES , Mobile Devices , Bluetooth , Smart Home , Wireless , Information Security , Mobile Apps , Cloud Security , Compliance & Privacy , ATM , Portables , Mobile Security , Data Breach

Michelle Drolet

As the International Consumer Electronice Show (CES) 2015 brings forth the next generation of devices to watch out for, it also opens issues of digital security. While new technologies and devices are always interesting, they also have the potential to burn consumers and vendors with risks to security and privacy. With these in mind, we picked out four tech trends from CES 2015 can impact your data and privacy.

Michelle Drolet published in NetworkWorld - Throw your vendor under the bus after a breach? Not quite so fast

Security Partners , network security , Security Regulations , Information Security , Application Security , Cloud Security , security policy , Compliance , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Our Michelle Drolet is quoted in NetworkWorld's article "Throw your vendor under the bus after a breach? Not quite so fast". Read more below:

Data Security Alert Vol 13.79 - The Top Hacks of the Year

Security Regulations , Security Program , Information Security , Application Security , Hackers , Cloud Security , security policy , Security Alert , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

As we approach the end of the year, let’s have a look back at the top hacking incidents of 2014. This year, we might have witnessed the most damaging attack of the decade. It will not be easy beating the Sony attack.

What You Need to Know About This New Bank Account Threat

Social Engineering , Phishing , Security Program , Information Security , Security , malware , Cloud Security , Security Alert , Mobile Security , cybersecurity

Michelle Drolet

Sophos Researcher James Wyke recently did an analysis of the malware Vawtrak. He found that Vawtrak has been targeting financial institutions, especially banks. Vawtrak injects a DLL code into the targeted bank’s website, which allows a bypass of the victim’s two-factor authentication and infects the victim with a mobile malware. The malware then automatically transfers money out of the victims account and hides any traces of the transfer. If you notice unusual activity in your bank account orfalse

The 4 Es of Enterprise Security

Security Partners , network security , Security Services , IT Infrastructure , Assessment , Security Regulations , Enforce , Establish , Security Program , Information Security , Evaluate , Application Security , Security , Cloud Security , security policy , 4E Methodology , Educate , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

Building a solid security program takes time. Every organization is different. It's very important to assess your technology, and consider both internal and external threats. An assessment will reveal vulnerabilities. The remediation process will help you take full advantage of your existing security assets and point you at any gaps that need filling. Even once your defenses are in place, vigilance is an ongoing requirement because new threats are emerging all the time. In the face of ourfalse

Debunking 5 Reasons Businesses Use to Not Invest In Computer Security

network security , Risk Management , Data Security , Security Regulations , Information Security , Application Security , Security , Mac , software systems , malware , iPhone , software updates , Hackers , Cloud Security , security policy , cybercriminals , cloud services , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

The rise of malware seems to have passed some people by. As the ranks of cybercriminals grow and they find new ways to exploit our systems and steal our data, a lot of computer users and small-business owners have convinced themselves that it won't happen to them. Here are five common excuses that explain why some people think they don't need computer security and the reasons why they do.

Towerwall Information Security Update Vol 13.78 - 3 ways to make your Outlook.com account safer

network security , Data Security , Security Regulations , Outlook , Security Threat , Security Program , Information Security , Security , Hackers , Cloud Security , security policy , cybercriminals , Security Alert , internal emails , Data Privacy , cybersecurity , Data Breach

Michelle Drolet

3 ways to make your Outlook.com account safer by John Hawes