Towerwall's InfoSec Blog

Content Type

See all

Towerwall Application Security Alert Vol 13.73

network security , passwords , Web Storage , Data Security , Security Regulations , Botnet , credit card security , Security Threat , bot-infected , two-factor authentification , Information Security , web server , Application Security , Security , Hackers , Cloud Security , Web Application Firewall , security policy , cybercriminals , penetration testing , Cryptolocker , Security Alert , Data Privacy , Web Browser , web users , cybersecurity , Enterprise , Data Breach

Michelle Drolet

1.2 billion logins scooped up by CyberVor hacking crew - what you need to do Hackers have amassed a vast collection of stolen data, including 1.2 billion unique username/password pairs, by compromising over 420,000 websites using SQL injection techniques. Researchers monitored the gang for over seven months, thought to be "fewer than a dozen men in their 20s who know one another personally" based in a small city in central Russia. They found that the group, working together since at least 2011,false

Cork That App or Face Attack

Cork That App or Face Attack

passwords , Data Security , Government Compliance Regulations , Assessment , Security Regulations , credit card security , Security Threat , Security Program , Information Security , Application Security , Mobile Apps , Hackers , endpoint security system , security policy , cybercriminals , penetration testing , information security tips , Compliance , Mobile Security , cybersecurity , Enterprise , Gap Assessment

Michelle Drolet

Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority also confess they have been hacked at least once in the last two years. While most large businesses have begun application vulnerability testing, there is still a long way to go. After all, you are only asfalse

10 things I know about preventing ID theft

network security , Security Services , Data Security , ID Theft , Gift Cards , credit card security , Security Threat , Information Security , Application Security , Security , PCI , endpoint security system , Cloud Security , security policy , financial security , Security Alert , information security tips , Compliance , Big Data , Data Privacy , Mobile Security , Cash , cybersecurity , Data Breach

Michelle Drolet

10. Use cash or gift cards The threat of identity theft is reduced dramatically if you don't use your credit card for all your purchases, so consider using cash or even gift cards to pay your way.

Towerwall listed among “20 Most Promising Security Consulting Companies”

Security Partners , network security , Security Services , security software , Data Security , credit card security , Security Threat , Security Program , Information Security , Application Security , Security , Cloud Security , security policy , information security tips , cloud services , Big Data , Data Privacy , security research , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Also named to CRN’s “Women in the Channel” and “The Power 50” BOSTON – May 12, 2014 – Towerwall (www.towerwall.com), an IT security services provider for small to mid-size businesses, today announced it was selected for inclusion in a list of the 20 “Most Promising Enterprise Security Consulting Companies.” The list was compiled by the editors of CIO Review, a magazine published in Fremont, Calif. “Presently, the time is apt to identify some of the right security players in the market. Wefalse

Is Blind Trust Making You Unsafe?

network security , security software , Data Security , Security Regulations , credit card security , Security Threat , Phishing , Security Program , Information Security , Application Security , Security , endpoint security system , Compliance , Big Data , Data Privacy , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Personal and business relationships rely on trust to function, but blind trust in the digital world is downright dangerous. We’re asked to trust companies all the time. We trust them with personal details and they promise to keep them safe. It’s the same story in the enterprise. One company will entrust another to backup and store data, keeping it accessible for employees, but shutting out criminals and spies. Sometimes that trust proves to be misplaced, with disastrous results. On a personalfalse

Towerwall Heartbleed Vulnerability Alert

network security , Data Security , Security Regulations , Heartbleed , credit card security , Security Threat , Information Security , Security , security policy , cybercriminals , penetration testing , Security Alert , information security tips , Big Data , Data Privacy , vulnerability management , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Good Afternoon: The IT infrastructure your organization may use for day-to-day business may be vulnerable because of the Heartbleed vulnerability. Sophos a Towerwall partner has prepared a podcast of the Heartbleed vulnerability, which addresses who is likely affected, workarounds and an offer to help determine if you are vulnerable. http://nakedsecurity.sophos.com/2014/04/10/sscc-142-heartbleed-explained-patches-evaluated-apple-chastised-podcast/ If you think you may be affected and don't knowfalse

Top 10 things to know about mobile security

Security Partners , Verizon , security software , Data Security , Security Regulations , iOS update , credit card security , Mobile Devices , Security Threat , Information Security , iPhone , AT&T , Mobile Apps , Information Security Summit , T-Mobile , Compliance & Privacy , Apple , Big Data , Mobile Protection , Data Privacy , security research , iOS , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

10. Malware is on the rise

Why wasn't healthcare.gov security properly tested?

security software , Security Regulations , credit card security , Security Threat , Security Program , Information Security , web server , Application Security , Security , software updates , Hackers , Web Application Firewall , HIPAA , security policy , cybercriminals , penetration testing , information security tips , web users , cybersecurity

Michelle Drolet

When the healthcare.gov website was launched on Oct. 1 it didn't take long for technical issues to hit the headlines. Americans trying to register for health care found the website unusable. There were glitches, extremely long loading times, and serious errors, but most worrying of all for anyone entrusting sensitive data to the system was the lack of security testing. Three white hat hackers, charged with exposing flaws in the security of online systems told a Congress hearing that thefalse

Introducing our Quarterly Newsletter: the Data Security Review

Security Partners , network security , Security Services , security software , Web Storage , Data Security , Government Compliance Regulations , Security Regulations , Heartbleed , credit card security , Mobile Devices , Security Threat , Security Program , Information Security , web server , Application Security , Security , malware , Mobile Apps , Hackers , endpoint security system , Cloud Security , T-Mobile , Web Application Firewall , Apple , Shockwave. Internet Explorer , security policy , cybercriminals , penetration testing , financial security , Security Alert , information security tips , Big Data , Mobile Protection , Data Privacy , Web Browser , security research , vulnerability management , Mobile Security , Third-party Vendor , web users , cybersecurity , Data Breach

Michelle Drolet

I am excited to announce the launch of our quarterly newsletter, the Data Security Review.

Please join us at the Information Security Summit 2014

Security Partners , network security , security software , Data Security , Security Regulations , credit card security , Mobile Devices , Security Threat , Information Security , Mobile Apps , Information Security Summit , Hackers , endpoint security system , Cloud Security , Compliance & Privacy , security policy , cybercriminals , financial security , Events , information security tips , Compliance , Mobile Protection , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!