Towerwall's InfoSec Blog

Content Type

See all
5 cybersecurity trends to watch for in 2016

5 cybersecurity trends to watch for in 2016

Phishing , malware , ransomware , Internet of Things , cloud services , Known vulnerabilities , cannabis , Enterprise

Michelle Drolet

As threats evolve and grow more sophisticated, securing IT systems is more important than ever. We may welcome in the New Year with open arms, but we must also prepare for the cybersecurity threats ahead of us. The 2015 Cost of Data Breach Study from IBM and the Ponemon Institute put the average cost of a data breach at $3.79 million, and that figure is expected to grow in the year ahead. With the right resolutions, you can drastically reduce your chances of falling prey to cybercriminals.

Another Successful Information Security Summit

passwords , Smart Device , Data Security , COSO Cube , IT Infrastructure , Government Compliance Regulations , Virtual CISO , Assessment , Mobile Devices , CISO , Information Security , Application Security , Mobile Apps , Information Security Summit , Hackers , cybercriminals , Compliance , cloud services , Big Data , Mobile Protection , Data Privacy , Mobile Security , cybersecurity , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

Once again, the Information Security Summit hosted by Towerwall and MassBay was a resounding success. Hundreds of attendees and vendors participated in diverse data security panels and networked with industry leaders and peers. The Summit opened with Michelle Drolet, CEO of Towerwall, and Shamsi Moussav, Computer Science Professor at MassBay Community College, presenting scholarships to MassBay students Kirk Barge and Julius Newton. Michelle Drolet said,

Debunking 5 Reasons Businesses Use to Not Invest In Computer Security

network security , Risk Management , Data Security , Security Regulations , Information Security , Application Security , Security , Mac , software systems , malware , iPhone , software updates , Hackers , Cloud Security , security policy , cybercriminals , cloud services , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

The rise of malware seems to have passed some people by. As the ranks of cybercriminals grow and they find new ways to exploit our systems and steal our data, a lot of computer users and small-business owners have convinced themselves that it won't happen to them. Here are five common excuses that explain why some people think they don't need computer security and the reasons why they do.

More Devices, More Problems.

Unsecured Wi-Fi , network security , Data Security , IT Infrastructure , BYOD , Towerwall , Mobile Devices , Security Threat , Smartphone , Information Security , Application Security , Security , Mac , malware , Encryption , Mobile Apps , Cloud Security , Tablets , cloud services , Mobile Protection , Mobile Security , Data Breach

Michelle Drolet

Check out this infographic for the numbers behind BYOD.

Towerwall listed among “20 Most Promising Security Consulting Companies”

Security Partners , network security , Security Services , security software , Data Security , credit card security , Security Threat , Security Program , Information Security , Application Security , Security , Cloud Security , security policy , information security tips , cloud services , Big Data , Data Privacy , security research , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Also named to CRN’s “Women in the Channel” and “The Power 50” BOSTON – May 12, 2014 – Towerwall (www.towerwall.com), an IT security services provider for small to mid-size businesses, today announced it was selected for inclusion in a list of the 20 “Most Promising Enterprise Security Consulting Companies.” The list was compiled by the editors of CIO Review, a magazine published in Fremont, Calif. “Presently, the time is apt to identify some of the right security players in the market. Wefalse

Successful Breakfast Event: From Zero to Data Governance Hero

network security , Security Services , security software , Security Regulations , Security Threat , Security Program , Information Security , Security , Cloud Security , security policy , Events , information security tips , cloud services

Michelle Drolet

Thanks for all that joined Towerwall at the From Zero to Data Governance Hero breakfast event! Towerwall and Varonis experts gave first-rate information on the importance of pressing data concerns of 2014. Also, Varonis’ speaker gave a great live demonstration on the Data Governance Suite! It was an event well spent!

Stay Secure in the Cloud with Sophos Cloud Endpoint

network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Information Security , Cloud Security , security policy , information security tips , Compliance , cloud services , Big Data , Data Privacy , cybersecurity , Data Breach

Michelle Drolet

Towerwall and Sophos, partnering to protect data integrity in the cloud.

Internet Explorer, .NET, IPv6 and Shockwave top the February 2014 Patch Tuesday list

network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security , Cloud Security , Shockwave. Internet Explorer , security policy , cybercriminals , Security Alert , cloud services , Data Privacy , cybersecurity , Enterprise , Data Breach

Michelle Drolet

For today's Patch Tuesday, Microsoft released seven bulletins (a surprise after only announcing five last week) and Adobe released one. There are four critical advisories, to me the most important of which is MS14-010 affecting Internet Explorer versions 6 through 10. This patch fixes 24 vulnerabilities, one of which has been publicly disclosed. Considering that 22 of these vulnerabilities can lead to remote code execution, this fix is priority one. MS14-007 is a flaw in the Direct2D graphicsfalse

3 Keys To Keep Enterprise Clouds Secure

3 Keys To Keep Enterprise Clouds Secure

network security , Security Services , security software , Data Security , Security Threat , Information Security , Cloud Security , security policy , financial security , information security tips , cloud services , Big Data , Data Privacy , security research , Enterprise , Data Breach

Michelle Drolet

3 Keys To Keep Enterprise Clouds Secure Outsourcing has won out over ownership, and the rush to the cloud continues to gather pace. Where security is concerned there are two major trends that threaten to expose your company to unnecessary risk. There’s a lack of planning and due diligence when choosing cloud providers, and there’s a murky grey area when it comes to responsibility. They can both be mitigated by building security planning into your system from the start, instead of trying tofalse

Views from the Inside: Is your data safe with free cloud services? (guest post)

Security Partners , network security , Security Services , security software , Data Security , threat landscape , Security Threat , Security Program , Security , Hackers , Cloud Security , cyber-attack , HIPAA , security policy , cybercriminals , Security Alert , cloud services , Mobile Security , cybersecurity , Enterprise

Michelle Drolet

The overwhelming advantages of cloud-based file storage are not in dispute. You have an automatic backup of your files, which can be accessed on any device, at any time. Small amounts of storage are generally free, and large swathes of server space are coming down in price all the time. They absolve your business from the headache of backup management, disaster recovery, and bandwidth for instant anytime access. Convenient? Yes, most definitely. Safe and suitable for the enterprise? Well ...false