Towerwall's InfoSec Blog

Content Type

See all

Phishing is the worst thing for your business. Just ask Colonial Pipeline.

ransomware , Compliance & Privacy , penetration testing , cannabis , Enterprise

Michelle Drolet

For Georgia, Virgina, the Carolinas and other states, it was Jimmy Carter revisited as long lines and price spikes awaited motorists at the gas pumps. Some stations as far south as St. Petersburg, Fla. ran out entirely, worrying travelers making plans for Memorial Day weekend.

SOC 2 Compliance: Why You Should Care

Compliance & Privacy , Compliance

Michelle Drolet

While Service Organization Control (SOC) 2 compliance isn’t mandatory, it can bring a range of benefits for your organization. Created by the AICPA (American Institute of Certified Public Accountants), this auditing process helps you to assess your data privacy and security standards. Once achieved, you will have a comprehensive set of security policies that will clearly show your commitment to information security.

Important Steps to Protect you from the SolarWinds Hack Attack

Compliance & Privacy , penetration testing , cannabis , Enterprise

Michelle Drolet

I wanted to reach out to provide you with important information on the recent hack that has impacted nearly 20,000 of SolarWinds customers. The attack, which dates back to October 2019, has impacted many sectors including government, hospitals, educational and technology organizations. Over 80% of the Fortune 500 companies have uncovered a breach in their systems.

5 Cybersecurity Events that Keep CEOs up at Night

ransomware , Compliance & Privacy , penetration testing , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

With ransomware and phishing attacks on the rise, companies must continuously focus on cyber risks to protect assets and customers. Covid-19 forced organizations to evolve their business models overnight. The demand for digital infrastructure has skyrocketed and industries are seeing large-scale adoption of work from home.

6 Steps to Building a Strong Breach Response Plan

Business Continuity , CCPA , Phishing , GDPR , phishing attacks , PCI , ransomware , HIPAA , Compliance & Privacy , Compliance , COVID-19 , Breach Response Plan , cannabis , Enterprise

Michelle Drolet

Cybersecurity resilience depends on having a detailed, thorough, and tested breach response plan in place. Here's how to get started. No matter how secure your business, data breaches are an unfortunate fact of life. Whether an attack is the result of a determined cybercriminal, a disgruntled insider, or simple human error, you can limit the damage with a carefully crafted response strategy. There’s a lot of groundwork to cover to begin building an effective strategy for coping with a breach:false

Three Crucial Keys to Understanding HIPAA Compliance

CCPA , GDPR , PCI , HIPAA , Compliance & Privacy , Compliance , cannabis

Michelle Drolet

asellus molestie hendrerit bibendum. Proin suscipit, justo non porttitor fringilla, nulla mauris accumsan diam, non mattis enim nibh nec ipsum. Ut arcu urna, fermentum et nulla sit amet, auctor porta metus. Aenean vitae dictum nulla. Proin sit amet lorem id ligula pulvinar egestas. Proin tincidunt lacinia turpis a vestibulum. Cras sollicitudin, risus sed eleifend ullamcorper, odio ligula dignissim dui, in iaculis magna metus a lacus. Donec sed dui et quam vehicula ullamcorper quis ac dui.false

Harness the NIST CSF to Boost your Security and Compliance

CSF , Business Continuity , NIST , CCPA , GDPR , PCI , NIST Cybersecurity Framework (CSF) , HIPAA , Compliance & Privacy , Compliance , cannabis , Enterprise

Michelle Drolet

The NIST Cybersecurity Framework (CSF) is a crowdsourced set of best practices to help you analyze your cyber risk posture and work towards improving it. Learn what it can do for your business, how to tailor and implement it, and how to manage it to work towards your desired security posture. The cybersecurity threat and the need to ensure compliance continue to loom large in the business world. Boards and management want to know the current status of their cybersecurity posture, but it canfalse

Mindset Entrepreneur featuring Michelle Drolet

Mindset Entrepreneur featuring Michelle Drolet

Business Continuity , CCPA , Phishing , GDPR , PCI , malware , ransomware , HIPAA , Compliance & Privacy , Compliance , cannabis , Enterprise

Michelle Drolet

Michelle Drolet sits down with Mindset Entrepreneur. Click the image below to watch now:

4 Dangerous Security Assumptions to Avoid

CCPA , GDPR , PCI , security assumptions , HIPAA , Compliance & Privacy , Compliance , cannabis , Enterprise

Michelle Drolet

Many organizations take steps to guard against data breaches, employing new policies, tools and strategies that make them feel protected, but their defenses may not be as strong as they think. Unfortunately, this false sense of security is all-too-easy to come by. Data breaches are commonplace now and there’s a growing realization that organizations need to do more to combat them and to deal with the aftermath. The potential cost of stolen data extends beyond cleanup operations to potentialfalse

Trends in Data Breaches and Comprehensive Response

Social Engineering , Webinar , Business Continuity , Michelle Drolet , CCPA , GDPR , Application Security , BrightTalk , PCI , malware , ransomware , HIPAA , Compliance & Privacy , penetration testing , Compliance , cannabis , cybersecurity , Breach Response , Enterprise , Data Breach

Michelle Drolet

Trends in Data Breaches and Comprehensive Responses Does your organization have a data breach response plan? Join Michelle Drolet and a team of industry experts for an interactive Q&A panel and discover the best practices for breach response and how to strengthen your organization's cyber resilience.