Towerwall's InfoSec Blog

Content Type

See all

Michelle Drolet published in NetworkWorld - Throw your vendor under the bus after a breach? Not quite so fast

Security Partners , network security , Security Regulations , Information Security , Application Security , Cloud Security , security policy , Compliance , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Our Michelle Drolet is quoted in NetworkWorld's article "Throw your vendor under the bus after a breach? Not quite so fast". Read more below:

Cork That App or Face Attack

Cork That App or Face Attack

passwords , Data Security , Government Compliance Regulations , Assessment , Security Regulations , credit card security , Security Threat , Security Program , Information Security , Application Security , Mobile Apps , Hackers , endpoint security system , security policy , cybercriminals , penetration testing , information security tips , Compliance , Mobile Security , cybersecurity , Enterprise , Gap Assessment

Michelle Drolet

Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority also confess they have been hacked at least once in the last two years. While most large businesses have begun application vulnerability testing, there is still a long way to go. After all, you are only asfalse

Test All Apps to Keep Hackers from Penetrating Castle Walls

Test All Apps to Keep Hackers from Penetrating Castle Walls

security software , Data Security , Security Regulations , Mobile Devices , Security Threat , Security Program , Information Security , Application Security , Security , Mobile Apps , Hackers , Cloud Security , security policy , cybercriminals , Tablets , information security tips , Compliance , Mobile Protection , Mobile Security , cybersecurity

Michelle Drolet

Four major challenges when protecting apps and how to solve them Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority also confess they have been hacked at least once in the last two years. While most large businesses have begun application vulnerability testing,false

Towerwall and MassBay Host Another Successful Information Security Summit

Security Partners , Security Services , security software , Data Security , Government Compliance Regulations , Security Regulations , Security Threat , Information Security , Security , Compliance & Privacy , Events , Compliance , Big Data , Data Privacy , security research , Data Breach

Michelle Drolet

Towerwall teamed up with MassBay Community College on May 29 to present the second annual Information Security Summit at MassBay’s Wellesley Hills campus from 8 a.m. to 1 p.m. Over 250 individuals attended the Summit where they interacted with industry experts and participated in various security panel discussions. After a presentation on the "Anatomy of a Malware Attack" by Sophos, and the keynote by Chris Logan of Care New England Health Systems, the Summit offered a number of breakoutfalse

10 things I know about preventing ID theft

network security , Security Services , Data Security , ID Theft , Gift Cards , credit card security , Security Threat , Information Security , Application Security , Security , PCI , endpoint security system , Cloud Security , security policy , financial security , Security Alert , information security tips , Compliance , Big Data , Data Privacy , Mobile Security , Cash , cybersecurity , Data Breach

Michelle Drolet

10. Use cash or gift cards The threat of identity theft is reduced dramatically if you don't use your credit card for all your purchases, so consider using cash or even gift cards to pay your way.

Reminder: Please join us at the Information Security Summit 2014

Security Partners , network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Information Security , Application Security , Information Security Summit , Hackers , endpoint security system , Cloud Security , Compliance & Privacy , security policy , cybercriminals , financial security , Events , information security tips , Compliance , Big Data , Data Privacy , security research , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

Is Blind Trust Making You Unsafe?

network security , security software , Data Security , Security Regulations , credit card security , Security Threat , Phishing , Security Program , Information Security , Application Security , Security , endpoint security system , Compliance , Big Data , Data Privacy , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Personal and business relationships rely on trust to function, but blind trust in the digital world is downright dangerous. We’re asked to trust companies all the time. We trust them with personal details and they promise to keep them safe. It’s the same story in the enterprise. One company will entrust another to backup and store data, keeping it accessible for employees, but shutting out criminals and spies. Sometimes that trust proves to be misplaced, with disastrous results. On a personalfalse

Stay Secure in the Cloud with Sophos Cloud Endpoint

network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Information Security , Cloud Security , security policy , information security tips , Compliance , cloud services , Big Data , Data Privacy , cybersecurity , Data Breach

Michelle Drolet

Towerwall and Sophos, partnering to protect data integrity in the cloud.

Please join us at the Information Security Summit 2014

Security Partners , network security , security software , Data Security , Security Regulations , credit card security , Mobile Devices , Security Threat , Information Security , Mobile Apps , Information Security Summit , Hackers , endpoint security system , Cloud Security , Compliance & Privacy , security policy , cybercriminals , financial security , Events , information security tips , Compliance , Mobile Protection , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

Establishing Security Goals

network security , Security Services , security software , Data Security , Security Threat , Security Program , Information Security , Application Security , Security , Hackers , endpoint security system , Cloud Security , security policy , cybercriminals , penetration testing , information security tips , Compliance , security research , vulnerability management , Mobile Security , cybersecurity

Michelle Drolet

Implementing security practices in your organization’s employees’ daily work habits, and ensuring the integrity and confidentiality of information security, the goals of the Security Awareness Program are: