Towerwall's InfoSec Blog

Content Type

See all

Four Steps to Respond & Recover from Sophisticated Security Attacks

Security Partners , network security , security software , Data Security , BYOD , Security Regulations , credit card security , Mobile Devices , Security Threat , Security Program , Information Security , Mobile Apps , Hackers , endpoint security system , Cloud Security , cyber-attack , security policy , cybercriminals , financial security , Security Alert , information security tips , Compliance , Big Data , Mobile Protection , Data Privacy , security research , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Great information in SC Magazine’s latest whitepaper report, ‘Four steps to respond and recover from sophisticated security attacks’, it discusses the four proactive steps that you can – and should – take now to help keep your organization safe. Click here to view more details: http://bit.ly/131uu2J As we all know, cyber-attacks are becoming more sophisticated every year. At the same time, IT resources are moving outside the firewall and enterprises are distributing their applications and datafalse

Towerwall and the Information Security Summit highlighted in SearchSecurity.com Article

Security Partners , network security , Security Services , security software , Data Security , Towerwall , Security Regulations , threat landscape , credit card security , Mobile Devices , Security Threat , Information Security , Application Security , Security , Mobile Apps , Information Security Summit , endpoint security system , Cloud Security , HIPAA , penetration testing , financial security , information security tips , Compliance , Mobile Protection , vulnerability management , Mobile Security

Michelle Drolet

Check out Search Security's article - "HIPAA Omnibus Rule, PPACA challenge enterprise compliance management", where our own Natalie Kmit and the Information Security Summit 2013 are highlighted:

Please Join Towerwall at the Information Security Summit 2013

Application Security , Events , Compliance , cannabis , Enterprise

Michelle Drolet

Please join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

Compliance Combines with Vulnerability Scanning to Create Aegify

network security , Security Services , security software , Data Security , GDPR , Security Program , Information Security , Application Security , vulnerability scanning , Hackers , cyber-attack , security policy , cybercriminals , penetration testing , information security tips , Compliance , vulnerability management , cannabis , cybersecurity , Enterprise

Michelle Drolet

Two security firms, the established Rapid7 vulnerability manager and eGestalt, a cloud-based compliance management provider, have signed an OEM deal that will do something for the IT security industry that hasn’t been done before: a combination security and compliance posture management offering called Aegify SPM. The SPM stands for Security Posture Management, and eGestalt of Santa Clara defines SPM as “the art and science of monitoring and managing business security status by orchestratingfalse

Mobile Devices Get Means for Tamper-evident Forensic Auditing

Verizon , security software , Data Security , Security Regulations , Mobile Devices , Security Program , Information Security , Application Security , Security , iPhone , AT&T , Mobile Apps , Hackers , Cloud Security , T-Mobile , cyber-attack , security policy , cybercriminals , information security tips , Compliance , Mobile Protection , Data Privacy , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Providing early evidence of tampering can shorten investigation times for breaches and audits. The convenience of mobile devices has led to their rapid proliferation in the workplace. But along with that convenience comes security and compliance issues contributing to the degeneration of trust. Risk management for mobile devices is of rising concern, particularly in highly regulated industries such as healthcare and finance. In order to detect security breaches and guarantee compliance,false

Trust Your Third-Party Applications? Think Again….

security software , Data Security , Security Threat , Security Program , Information Security , Security , Mobile Apps , Hackers , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Compliance , security research , Mobile Security , Third-party Vendor , cannabis , cybersecurity , Enterprise

Michelle Drolet

Don’t assume those third-party apps you buy are fully secure. Despite the promise of cloud computing, companies are still buying software. And it is more cost effective to buy an application and plug it into your system than it is to develop anew. How many third-party applications has your company bought off the shelf? How secure are they? Have you conducted any actual testing? Too many organizations are oblivious to the need for stringent security testing. Many third-party apps are purchasedfalse

Towerwall is proud to be named a Trend Micro Platinum Partner

Security Partners , Data Security , Towerwall , Business Continuity , Information Security , Application Security , Trend Mico , Compliance , cybersecurity , Enterprise

Michelle Drolet

Towerwall is proud to be named a Trend Micro Platinum Partner . Towerwall has aligned itself with industry-leading security application and policy management solution providers.

Introducing our Security Training Toolkit

Security Partners , Security Services , Data Security , Security Regulations , Security Program , Information Security , Security , vulnerability scanning , Hackers , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Compliance , cannabis , cybersecurity , Enterprise

Michelle Drolet

A customizable security training program for your review. We're giving you all the tools you need to keep your employees out of trouble. Whether you’re starting a program from scratch, or just in need of some refresher materials, we’ve got you covered. Here’s whats included in the Towerwall Security Training Toolkit:

Why You Need A Mobile Device Policy

Security Partners , network security , Security Services , security software , Data Security , BYOD , Security Regulations , Mobile Devices , Security Threat , cisco , Security Program , Information Security , Security , Mobile Apps , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Compliance , Mobile Protection , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Whether you choose to embrace it or try to resist it, the BYOD (Bring Your Own Device) trend is set to grow. A study by Cisco Systems found that 78 percent of white-collar workers in the U.S. use a mobile device for work and 41 percent indicated that most smartphones that connect to the company network are actually employee-owned. So, if you don't already have a BYOD policy, you need one. Employees will connect to your network and use their personal mobile devices for work, whether you allow itfalse

The worst passwords you could ever choose

Security Partners , network security , Security Services , passwords , security software , Data Security , Security Regulations , credit card security , Security Threat , Security Program , Information Security , Cloud Security , security policy , penetration testing , financial security , Security Alert , information security tips , Compliance , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

For those on our Security Alert and Update list we just emailed this great article by Graham Cluley on the worst possible passwords you could ever choose. Many of you know this is something we preach to our clients on a regular basis and is part of our comprehensive 4E Program. Too many internet users are making poor decisions when choosing their passwords. We've spoken time and time again about the importance of choosing hard-to-crack, unguessable, unique passwords that (provided the websitefalse