Towerwall's InfoSec Blog

Content Type

See all

10 Things I Know About ... Passwords

passwords , security software , Data Security , Security Regulations , credit card security , Security Threat , Security Program , Information Security , Application Security , Security , Hackers , Cloud Security , security policy , cybercriminals , information security tips , Big Data , Data Privacy , security research , cybersecurity , Data Breach

Michelle Drolet

Four Steps to Respond & Recover from Sophisticated Security Attacks

Security Partners , network security , security software , Data Security , BYOD , Security Regulations , credit card security , Mobile Devices , Security Threat , Security Program , Information Security , Mobile Apps , Hackers , endpoint security system , Cloud Security , cyber-attack , security policy , cybercriminals , financial security , Security Alert , information security tips , Compliance , Big Data , Mobile Protection , Data Privacy , security research , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Great information in SC Magazine’s latest whitepaper report, ‘Four steps to respond and recover from sophisticated security attacks’, it discusses the four proactive steps that you can – and should – take now to help keep your organization safe. Click here to view more details: http://bit.ly/131uu2J As we all know, cyber-attacks are becoming more sophisticated every year. At the same time, IT resources are moving outside the firewall and enterprises are distributing their applications and datafalse

New LinkedIn E-Mail Scam

Linkedin , security software , Security Regulations , Social Engineering , credit card security , Security Threat , Information Security , web server , Security , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Web Browser , security research , Mobile Security , web users , email scam , cybersecurity , Enterprise

Michelle Drolet

Hi all, there is an e-mail scam doing the rounds. The message is an invite from some random person you won’t know with a link (how original). If you get such a message don’t use the link, check your LinkedIn account as if it’s a legit request it will be there waiting for approval. Even if it is legit, make sure you vet all invite requests carefully. I have had several dodgy requests from what I believe to be bogus profiles who are likely up to no good. LinkedIn is about the quality of yourfalse

Facebook leaks are a lot leakier than Facebook is letting on

Security Partners , network security , Security Services , Web Storage , threat landscape , credit card security , Security Threat , Security Program , Information Security , Security , Facebook , Cloud Security , Web Application Firewall , cyber-attack , cybercriminals , information security tips , Web Browser , security research , web users , cybersecurity , Enterprise

Michelle Drolet

Remember last week, Facebook leaked email addresses and phone numbers for 6 million users, but that it was really kind of a modest leak, given that it's a billion-user service? OK, scratch the "modest" part. The researchers who originally found out that Facebook is actually creating secret dossiers for users are now saying the numbers don't quite match up. The number of affected users Facebook noted in a posting on its security blog is far less than what they themselves found, and Facebook isfalse

Towerwall and the Information Security Summit highlighted in SearchSecurity.com Article

Security Partners , network security , Security Services , security software , Data Security , Towerwall , Security Regulations , threat landscape , credit card security , Mobile Devices , Security Threat , Information Security , Application Security , Security , Mobile Apps , Information Security Summit , endpoint security system , Cloud Security , HIPAA , penetration testing , financial security , information security tips , Compliance , Mobile Protection , vulnerability management , Mobile Security

Michelle Drolet

Check out Search Security's article - "HIPAA Omnibus Rule, PPACA challenge enterprise compliance management", where our own Natalie Kmit and the Information Security Summit 2013 are highlighted:

Top Ten Malicious Lists

network security , security software , Data Security , Security Regulations , credit card security , Information Security , Application Security , Security , malware , endpoint security system , Cloud Security , cyber-attack , security policy , cybercriminals , financial security , information security tips , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Top Ten Malicious URLs Top 10 malicious URLs blocked by the Trend Micro™ Smart Protection Network™ infrastructure in 2012

Introducing Towerwall's VOIP Assessment Services

Security Services , security software , Data Security , Assessment , credit card security , Security Threat , Phishing , Security Program , Information Security , Security , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , financial security , information security tips , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Introducing Towerwall's Threat Spotlight

Security Partners , Security Services , security software , Data Security , Towerwall , Security Regulations , threat landscape , credit card security , Security Threat , Information Security , Security , Information Security Summit , Hackers , cyber-attack , security policy , cybercriminals , information security tips , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

We are proud to announce our Threat Spotlight, sign up for our Twitter feed and get the latest threats and how to protect against them.

The worst passwords you could ever choose

Security Partners , network security , Security Services , passwords , security software , Data Security , Security Regulations , credit card security , Security Threat , Security Program , Information Security , Cloud Security , security policy , penetration testing , financial security , Security Alert , information security tips , Compliance , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

For those on our Security Alert and Update list we just emailed this great article by Graham Cluley on the worst possible passwords you could ever choose. Many of you know this is something we preach to our clients on a regular basis and is part of our comprehensive 4E Program. Too many internet users are making poor decisions when choosing their passwords. We've spoken time and time again about the importance of choosing hard-to-crack, unguessable, unique passwords that (provided the websitefalse

Recommended Reading for Every Entrepreneur

Security Services , security software , Data Security , credit card security , Security Threat , Security Program , Information Security , Security , security policy , financial security , Security Alert , information security tips , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

Boston Business Journal asked Towerwall for required reading for every entrepreneur. Michelle Drolet recommends “The Power of Nice” by Linda Kaplan Thaler and Robin Koval. Nice companies have lower turnover and higher productivity. Click here to read the article.