Towerwall's InfoSec Blog

Content Type

See all

Five Steps For Creating An Advanced Threat Detection And Vulnerability Management Plan

risk tolerance , Advanced Threat Detection , Incident Response Plan , Phishing , GDPR , PCI , malware , ransomware , HIPAA , COVID-19 , Vulnerability Management Plan , cannabis , Enterprise

Michelle Drolet

While much of cybersecurity is focused on prevention, the simple fact is that many attacks are successful. Even a sophisticated, expensive security system is going to be breached from time to time. Smart attackers try to fly under the radar, biding their time and extracting maximum value or causing maximum carnage, sometimes over a period of months or even years.

Build A Strong Cybersecurity Posture With These 10 Best Practices

Forbes Technology Council , Phishing , GDPR , MaaS , PCI , malware , ransomware , HIPAA , Compliance , COVID-19 , cannabis , cybersecurity , Enterprise , Equifax

Michelle Drolet

The numerous high-profile data breaches that took place in 2018 illustrate that no organization, irrespective of size, scale or scope, is immune from cyberattacks. Last year witnessed a 350% increase in ransomware attacks and a 70% increase in spear-phishing attacks.

How Organizations Use Threat Intelligence To Boost Security - 4/15/19

GDPR , PCI , malware , ransomware , HIPAA , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

What is cyber threat intelligence, and how can organizations leverage it to identify threats and potential malicious activity in advance? Discover the best ways organizations can arm themselves with actionable threat intelligence to block cyber attacks or mitigate their impact. Join this panel of experts to learn more about:

Watch Now: Operationalizing Cybersecurity - 3/19/19

Social Engineering , Phishing , malware , ransomware , COVID-19 , cannabis , Enterprise

Michelle Drolet

Cybersecurity, much like safety, cannot be achieved - it is an ongoing process that changes and adjusts to respond to the threat landscape, business needs and resources. As essential a cybersecurity strategy is to the enterprise, so is the implementation of it.

Best Practices for Protecting Your Business from Cybercrime

Business Continuity , ransomware , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Best Practices for Protecting Your Business from Cybercrime Cybercrime has evolved from random activities being carried out by individuals into a billion dollar illegal industry that continues to grow. How is cybersecurity keeping up with the rise of cybercrime?

The Rise of Targeted Ransomware

Webinar , Business Continuity , Michelle Drolet , Phishing , BrightTalk , malware , ransomware , COVID-19 , cannabis , cybersecurity , Breach Response , Enterprise , Data Breach

Michelle Drolet

The Rise of Targeted Ransomware What is targeted ransomware? Are you susceptible? What can you do to defend against it? Presented by: Michelle Drolet, CEO, Towerwall

Trends in Data Breaches and Comprehensive Response - 9/19/18

Webinar , Business Continuity , Michelle Drolet , BrightTalk , PCI , malware , ransomware , Compliance , COVID-19 , cannabis , cybersecurity , Breach Response , Enterprise , Data Breach

Michelle Drolet

Trends in Data Breaches and Comprehensive Responses Does your organization have a data breach response plan? Join Michelle Drolet and a team of industry experts for an interactive Q&A panel and discover the best practices for breach response and how to strengthen your organization's cyber resilience.

Meetup: GDPR Context and Myth Busters by Our Resident Expert Greg Albertyn - Thursday, September 6, 2018

Meetup: GDPR Context and Myth Busters by Our Resident Expert Greg Albertyn - Thursday, September 6, 2018

Armis , InfoSec at Your Services Meetup , CCPA , InfoSec at Your Services , Phishing , GDPR , PCI , malware , ransomware , Internet of Things , HIPAA , Compliance & Privacy , Events , Compliance , COVID-19 , meetup , cannabis , Enterprise

Michelle Drolet

Join us for our next InfoSec at Your Services Meetup: "GDPR Context and Myth Busters by Our Resident Expert Greg Albertyn" Hosted by Michelle Drolet and Greg Albertyn

Towerwall Named Cyber Security Leader for 2016

Cyber Security Leader for 2016 , Mass Bay Community College , Outstanding Women in Business , Phishing , GDPR , PCI , malware , ransomware , Information Security Summit , HIPAA , Compliance & Privacy , penetration testing , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Company among top 20 recognized for their IT security leadership and innovation BOSTON – November 15, 2016 – Towerwall (www.towerwall.com), a data security services provider for small to mid-size businesses, today announced that Cyber Defense Magazine has named Towerwall a “Cyber Security Leader for 2016.” Towerwall was among the top 20 companies to receive the recognition for exceptional information security (InfoSec) products and services. “The personal relationship Towerwall extends is veryfalse

Beware of BYOD trend wreaking havoc

BYOD , Mobile Devices , Security Threat , GDPR , Information Security , Security , Mobile Apps , Hackers , cyber-attack , security policy , cybercriminals , Tablets , Security Alert , information security tips , Mobile Protection , COVID-19 , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Bringing mobile devices to work? Not so fast. Like it or not, the line between the workplace and the home is blurring. Work-at-home arrangements are becoming more common and cloud services make it easier to co-ordinate teams online. People are constantly on call, with the ability to check their emails and stay in touch wherever they are. The days of having a personal mobile and a work device are fast disappearing as the BYOD (Bring Your Own Device) trend continues to grow. A recent SkyDoxfalse