Towerwall's InfoSec Blog

Content Type

See all

Securing Your Future with a Virtual CISO

Fractional Chief Information Security Officer (CIS , Compliance & Privacy , penetration testing , Compliance , cannabis , Enterprise

Michelle Drolet

The enterprise is facing a dangerous combination of mounting cybersecurity threats of increasing subtlety, and a widening gap in the skills required to identify and combat them. Having someone that knows how to lead the charge in identifying and analyzing threats, creating strategic security plans and ensuring compliance, requires the right level of expertise. Many businesses, especially small and medium businesses, simply don’t have it.

Data Privacy Alert Vol 13.81 – Massive breach at health care company Anthem Inc.

Information Security , Application Security , ransomware , Cloud Security , Compliance & Privacy , security policy , Security Alert , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Anthem, the nation's second-largest health insurance company, is the latest target of a security breach. Eighty million customers, including the company's own CEO, are at risk of having their personal information stolen. VPC SAN FRANCISCO - As many as 80 million customers of the nation's second-largest health insurance company, Anthem Inc., have had their account information stolen, the company said in a statement. "Anthem was the target of a very sophisticated external cyber-attack," Anthemfalse

Data Privacy Alert Vol 13.80 - CES 2015 Trends that Can Impact Data and Privacy

Wearables , 3D Printing , Smart Device , CES , Mobile Devices , Bluetooth , Smart Home , Wireless , Information Security , Mobile Apps , Cloud Security , Compliance & Privacy , ATM , Portables , Mobile Security , Data Breach

Michelle Drolet

As the International Consumer Electronice Show (CES) 2015 brings forth the next generation of devices to watch out for, it also opens issues of digital security. While new technologies and devices are always interesting, they also have the potential to burn consumers and vendors with risks to security and privacy. With these in mind, we picked out four tech trends from CES 2015 can impact your data and privacy.

Towerwall and MassBay Host Another Successful Information Security Summit

Security Partners , Security Services , security software , Data Security , Government Compliance Regulations , Security Regulations , Security Threat , Information Security , Security , Compliance & Privacy , Events , Compliance , Big Data , Data Privacy , security research , Data Breach

Michelle Drolet

Towerwall teamed up with MassBay Community College on May 29 to present the second annual Information Security Summit at MassBay’s Wellesley Hills campus from 8 a.m. to 1 p.m. Over 250 individuals attended the Summit where they interacted with industry experts and participated in various security panel discussions. After a presentation on the "Anatomy of a Malware Attack" by Sophos, and the keynote by Chris Logan of Care New England Health Systems, the Summit offered a number of breakoutfalse

Reminder: Please join us at the Information Security Summit 2014

Security Partners , network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Information Security , Application Security , Information Security Summit , Hackers , endpoint security system , Cloud Security , Compliance & Privacy , security policy , cybercriminals , financial security , Events , information security tips , Compliance , Big Data , Data Privacy , security research , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

Towerwall Information Security/Malware Alert Vol 13.67 - Notorious "Gameover" malware gets itself a kernel-mode rootkit...

Data Security , Security Regulations , Security Threat , Information Security , Security , malware , Hackers , Compliance & Privacy , cybercriminals , Security Alert , information security tips , Data Privacy , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Zeus, also known as Zbot, is a malware family that we have written about many times on Naked Security. We've covered it as plain old Zbot. We've covered the Citadel variant, which appeared when the original Zbot code was leaked online. We've even written about the time it pretended to be a Microsoft fix for CryptoLocker, a completely different strain of malware. Currently, the most widespread Zbot derivative is the Gameover bot, also known as Zeus P2P because of its use of peer-to-peer networkfalse

Top 10 things to know about mobile security

Security Partners , Verizon , security software , Data Security , Security Regulations , iOS update , credit card security , Mobile Devices , Security Threat , Information Security , iPhone , AT&T , Mobile Apps , Information Security Summit , T-Mobile , Compliance & Privacy , Apple , Big Data , Mobile Protection , Data Privacy , security research , iOS , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

10. Malware is on the rise

Please join us at the Information Security Summit 2014

Security Partners , network security , security software , Data Security , Security Regulations , credit card security , Mobile Devices , Security Threat , Information Security , Mobile Apps , Information Security Summit , Hackers , endpoint security system , Cloud Security , Compliance & Privacy , security policy , cybercriminals , financial security , Events , information security tips , Compliance , Mobile Protection , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

Hackers leak 1 million Apple device IDs

Security Partners , Security Services , security software , Data Security , ID Theft , Security Regulations , Mobile Devices , Security Threat , Security Program , Information Security , Security , Mobile Apps , Hackers , cyber-attack , Compliance & Privacy , Apple , cybercriminals , Security Alert , information security tips , Mobile Protection , security research , Mobile Security , cybersecurity , Enterprise

Michelle Drolet

To cap off a summer of devastating corporate data breaches, hackers yesterday posted online what might be the crown jewel of 2012 data dumps: 1 million identification numbers for Apple iPhones, iPads and iPod Touch's, all purportedly stolen from the FBI. There may also be an additional 11 million Apple device IDs yet to be released, many with users' full names, addresses and telephone numbers attached.

Loss Of Customer Personal Information Damages Banks’ Credibility

network security , Security Services , security software , Data Security , ID Theft , Security Regulations , credit card security , Security Threat , Security Program , Information Security , Security , Hackers , Cloud Security , cyber-attack , Compliance & Privacy , cybercriminals , Security Alert , information security tips , Compliance , security research , cybersecurity , Enterprise

Michelle Drolet

On Jan. 5, federal law enforcement seized several automobiles worth about $100,000 in value. They had belonged to the former president of the Massachusetts Bank and Trust Company and were taken as restitution for his defrauding the bank in 1997. It seems that not a day passes by when news of banking-related fraud, money laundering, or a privacy violation is reported. Last year in May, Bank of America sustained a $10-million loss when an insider sold the bank’s customer data to organizedfalse