Towerwall's InfoSec Blog

Content Type

See all

More Devices, More Problems.

Unsecured Wi-Fi , network security , Data Security , IT Infrastructure , BYOD , Towerwall , Mobile Devices , Security Threat , Smartphone , Information Security , Application Security , Security , Mac , malware , Encryption , Mobile Apps , Cloud Security , Tablets , cloud services , Mobile Protection , Mobile Security , Data Breach

Michelle Drolet

Check out this infographic for the numbers behind BYOD.

1.2 billion logins scooped up by CyberVor hacking crew - what you need to do

passwords , Cache , Heartbleed , infected phone , Botnet , bot-infected , two-factor authentification , SQL injection , Information Security , web server , infected computer , Hackers , Cloud Security , Web Application Firewall , cybercriminals , Cryptolocker , Web Browser , web users , cybersecurity

Michelle Drolet

Towerwall Application Security Alert Vol 13.73 Hackers have amassed a vast collection of stolen data, including 1.2 billion unique username/password pairs, by compromising over 420,000 websites using SQL injection techniques. Researchers monitored the gang for over seven months, thought to be "fewer than a dozen men in their 20s who know one another personally" based in a small city in central Russia. They found that the group, working together since at least 2011, had rented time on false

Towerwall Application Security Alert Vol 13.73

network security , passwords , Web Storage , Data Security , Security Regulations , Botnet , credit card security , Security Threat , bot-infected , two-factor authentification , Information Security , web server , Application Security , Security , Hackers , Cloud Security , Web Application Firewall , security policy , cybercriminals , penetration testing , Cryptolocker , Security Alert , Data Privacy , Web Browser , web users , cybersecurity , Enterprise , Data Breach

Michelle Drolet

1.2 billion logins scooped up by CyberVor hacking crew - what you need to do Hackers have amassed a vast collection of stolen data, including 1.2 billion unique username/password pairs, by compromising over 420,000 websites using SQL injection techniques. Researchers monitored the gang for over seven months, thought to be "fewer than a dozen men in their 20s who know one another personally" based in a small city in central Russia. They found that the group, working together since at least 2011,false

Test All Apps to Keep Hackers from Penetrating Castle Walls

Test All Apps to Keep Hackers from Penetrating Castle Walls

security software , Data Security , Security Regulations , Mobile Devices , Security Threat , Security Program , Information Security , Application Security , Security , Mobile Apps , Hackers , Cloud Security , security policy , cybercriminals , Tablets , information security tips , Compliance , Mobile Protection , Mobile Security , cybersecurity

Michelle Drolet

Four major challenges when protecting apps and how to solve them Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority also confess they have been hacked at least once in the last two years. While most large businesses have begun application vulnerability testing,false

10 things I know about preventing ID theft

network security , Security Services , Data Security , ID Theft , Gift Cards , credit card security , Security Threat , Information Security , Application Security , Security , PCI , endpoint security system , Cloud Security , security policy , financial security , Security Alert , information security tips , Compliance , Big Data , Data Privacy , Mobile Security , Cash , cybersecurity , Data Breach

Michelle Drolet

10. Use cash or gift cards The threat of identity theft is reduced dramatically if you don't use your credit card for all your purchases, so consider using cash or even gift cards to pay your way.

Towerwall listed among “20 Most Promising Security Consulting Companies”

Security Partners , network security , Security Services , security software , Data Security , credit card security , Security Threat , Security Program , Information Security , Application Security , Security , Cloud Security , security policy , information security tips , cloud services , Big Data , Data Privacy , security research , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Also named to CRN’s “Women in the Channel” and “The Power 50” BOSTON – May 12, 2014 – Towerwall (www.towerwall.com), an IT security services provider for small to mid-size businesses, today announced it was selected for inclusion in a list of the 20 “Most Promising Enterprise Security Consulting Companies.” The list was compiled by the editors of CIO Review, a magazine published in Fremont, Calif. “Presently, the time is apt to identify some of the right security players in the market. Wefalse

Reminder: Please join us at the Information Security Summit 2014

Security Partners , network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Information Security , Application Security , Information Security Summit , Hackers , endpoint security system , Cloud Security , Compliance & Privacy , security policy , cybercriminals , financial security , Events , information security tips , Compliance , Big Data , Data Privacy , security research , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

Why security professionals need to get more creative with penetration testing (and how to do it)

network security , Security Services , security software , Data Security , Security Regulations , Social Engineering , Security Threat , Cloud Security , penetration testing , Big Data , Data Privacy , vulnerability management , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Criminals are evolving with their techniques for hacking and breaching corporate assets, so security managers need to as well. Here are some ways companies are going beyond standard pen testing in order to increase awareness By Maria Korolov Security professionals have long been running penetration tests against their firewalls and other security systems to find weaknesses that need to be addressed. The Common Vulnerability Scoring System is an industry standard, but has been around for afalse

Successful Breakfast Event: From Zero to Data Governance Hero

network security , Security Services , security software , Security Regulations , Security Threat , Security Program , Information Security , Security , Cloud Security , security policy , Events , information security tips , cloud services

Michelle Drolet

Thanks for all that joined Towerwall at the From Zero to Data Governance Hero breakfast event! Towerwall and Varonis experts gave first-rate information on the importance of pressing data concerns of 2014. Also, Varonis’ speaker gave a great live demonstration on the Data Governance Suite! It was an event well spent!

Stay Secure in the Cloud with Sophos Cloud Endpoint

network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Information Security , Cloud Security , security policy , information security tips , Compliance , cloud services , Big Data , Data Privacy , cybersecurity , Data Breach

Michelle Drolet

Towerwall and Sophos, partnering to protect data integrity in the cloud.