Towerwall's InfoSec Blog

Content Type

See all

5 Steps To Develop An Incident Response Plan

NIST framework , ISO 27001/2 , Penetration Tests , Incident Response Plan , Phishing , GDPR , IBM , PCI , Consumer Privacy Rights and Enforcement Act , malware , ransomware , HIPAA , Compliance , COVID-19 , cannabis , cybersecurity , Enterprise

Michelle Drolet

It’s almost a no-brainer that all organizations, regardless of their size, need some form of cybersecurity. Cybersecurity not only means that you protect your digital assets against a cyberattack, but it also means that you must plan for the inevitable. What if your data is breached or your systems are attacked? Seems pretty obvious, doesn't it? Data however, seems to tell another story. A recent survey by the U.K. government has revealed that only 16% of all U.K. businesses have formalfalse

5 cloud security basics and best practices

Phishing , GDPR , PCI , malware , ransomware , Cloud Security , HIPAA , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Companies that move to the cloud have to assume new responsibilities, develop new skill sets and implement new processes. The first step to better cloud security is to assume you have no security. Cloud computing has transformed the way businesses work and continues to disrupt traditional business models. IDC predicts that by 2023 public cloud spending will more than double, growing from $229 billion this year to nearly $500 billion. It’s no secret that migrating to the cloud can deliverfalse

Edge Computing Association Webinar How to Use the Decentralized Edge Cloud to Protect Your Data

Qnext/FileFlex , edge-cloud architecture , malware , ransomware , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Expert panelists Michelle Drolet of Towerwall and Tom Ward of Qnext/FileFlex joined participants online on October 1st 2019 to speak about how to use a decentralized edge-cloud architecture to secure your company's files & data and prevent cybersecurity threats and ransomware attacks. Watch the full webinar below:

7th Annual Information Security Summit Recap

MassBay Community College , IoT security , #summitbuzz19 , GDPR , malware , ransomware , General Data Protection Regulation (GDPR) , Information Security Summit , HIPAA , Events , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Thank you to all who attended this year’s Information Security Summit! Please see the video recap below. Looking forward to seeing everyone next year!

Seven Tips For A Successful Security Awareness Training Program

FISMA , SOX , Phishing , GDPR , PCI , malware , ransomware , HIPAA , Compliance , Security Awareness Training Program , COVID-19 , cannabis , cybersecurity , Enterprise

Michelle Drolet

When we hear the word “cybersecurity” a lot comes to mind — firewalls, antivirus, endpoint protection, email security, web security and much more. But how often do we think or talk about people? This is a central element in cybersecurity that is often ignored. ‘To err is human"— it’s obvious that as humans we often make mistakes. And we can’t be programmed either. As humans, our behavior is largely unpredictable, and failure to account for insider threats can result into costly securityfalse

Passing The Cybersecurity Baton To A vCISO

GDPR , GRC , Compliance , cannabis , vCISO , Enterprise

Michelle Drolet

Businesses continue to face modern cyber attacks such as ransomware threats and data breach incidents. In the wake of a non-stop onslaught from advanced hackers, it seems that no matter what defensive measures organizations put in place, cyber adversaries and malware authors are able to circumvent them.

Build A Strong Cybersecurity Posture With These 10 Best Practices

Forbes Technology Council , Phishing , GDPR , MaaS , PCI , malware , ransomware , HIPAA , Compliance , COVID-19 , cannabis , cybersecurity , Enterprise , Equifax

Michelle Drolet

The numerous high-profile data breaches that took place in 2018 illustrate that no organization, irrespective of size, scale or scope, is immune from cyberattacks. Last year witnessed a 350% increase in ransomware attacks and a 70% increase in spear-phishing attacks.

How Organizations Use Threat Intelligence To Boost Security - 4/15/19

GDPR , PCI , malware , ransomware , HIPAA , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

What is cyber threat intelligence, and how can organizations leverage it to identify threats and potential malicious activity in advance? Discover the best ways organizations can arm themselves with actionable threat intelligence to block cyber attacks or mitigate their impact. Join this panel of experts to learn more about:

Best Practices for Protecting Your Business from Cybercrime

Business Continuity , ransomware , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Best Practices for Protecting Your Business from Cybercrime Cybercrime has evolved from random activities being carried out by individuals into a billion dollar illegal industry that continues to grow. How is cybersecurity keeping up with the rise of cybercrime?

Harness the NIST CSF to Boost your Security and Compliance

CSF , Business Continuity , NIST , CCPA , GDPR , PCI , NIST Cybersecurity Framework (CSF) , HIPAA , Compliance & Privacy , Compliance , cannabis , Enterprise

Michelle Drolet

The NIST Cybersecurity Framework (CSF) is a crowdsourced set of best practices to help you analyze your cyber risk posture and work towards improving it. Learn what it can do for your business, how to tailor and implement it, and how to manage it to work towards your desired security posture. The cybersecurity threat and the need to ensure compliance continue to loom large in the business world. Boards and management want to know the current status of their cybersecurity posture, but it canfalse