Towerwall's InfoSec Blog

Content Type

See all

Towerwall Security/Vulnerability Alert Vol 13.62

Data Security , Security Threat , Information Security , Application Security , Security , Hackers , cybercriminals , Security Alert , information security tips , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

Recent vulnerabilities for which exploits are available compiled by the Qualys Vulnerability Research Team. This is a list of recent vulnerabilities for which exploits are available. System administrators can use this list to help in prioritization of their remediation activities. The Qualys Vulnerability Research Team compiles this information based on various exploit frameworks, exploit databases, exploit kits and monitoring of internet activity.

Establishing Security Goals

network security , Security Services , security software , Data Security , Security Threat , Security Program , Information Security , Application Security , Security , Hackers , endpoint security system , Cloud Security , security policy , cybercriminals , penetration testing , information security tips , Compliance , security research , vulnerability management , Mobile Security , cybersecurity

Michelle Drolet

Implementing security practices in your organization’s employees’ daily work habits, and ensuring the integrity and confidentiality of information security, the goals of the Security Awareness Program are:

10 Things I Know About ... Passwords

passwords , security software , Data Security , Security Regulations , credit card security , Security Threat , Security Program , Information Security , Application Security , Security , Hackers , Cloud Security , security policy , cybercriminals , information security tips , Big Data , Data Privacy , security research , cybersecurity , Data Breach

Michelle Drolet

MetroWest Chamber of Commerce: 118th Annual Meeting

Data Security , Towerwall , Security Threat , Information Security , Security , Hackers , cybercriminals , Events , cybersecurity

Michelle Drolet

Well, it was certainly a night to remember and much to celebrate With over 325+ people coming to celebrate the 118th MetroWest Chamber of Commerce Annual Meeting! It was a great night with much money raised for United Way’s Feed a Family and our hero's - Military Veterans. Watch some of the fun we had:

Sophos expert talks about Cryptolocker and bitcoin ransom on CNBC (Video)

Security Partners , Data Security , Information Security , Security , ransomware , Encryption , Hackers , cybercriminals , Cryptolocker , information security tips , CNBC , Big Data , Data Privacy , Data Breach

Michelle Drolet

And it keeps getting worse… A widespread outbreak of a sneaky, file-encrypting piece of ransomware called Cryptolocker has many people talking. One very important question raised by Cryptolocker’s success to date: Should you ever pay a ransom to a cybercriminal? Sophos security expert James Lyne, head of global security research at Sophos, went on cable network CNBC to explain how the criminal gang behind Cryptolocker is demanding a ransom in return for unlocking a victim’s files. In the videofalse

Join us for Sophos' Upcoming Event: Today’s Threat Landscape – How to Stay Safe

Security Partners , security software , Data Security , threat landscape , Security Threat , Security Program , Information Security , Security , Hackers , cybercriminals , Events , information security tips , cybersecurity , Enterprise

Michelle Drolet

Join us for Sophos' upcoming event:

How to Expose Cyber-Attacks and Combat Threats

Security Partners , network security , security software , Data Security , Security Threat , Security Program , Information Security , Security , endpoint security system , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Published by Michele Drolet, CEO of Towerwall Proper analysis will flag suspicious behavior and allow the IT department to assess the threat and take action to close it down Cybercriminals are employing more sophisticated techniques all the time and far too many companies and organizations still don't have the protection they really need to safeguard their systems. The prevalence of targeted attacks and advanced persistent threats (APTs) is disturbing. The risk is that security is breached,false

Towerwall Information Security Alert Vol 13.50 - Making phishing more complex - on purpose

Data Security , Security Regulations , Security Threat , Phishing , Security Program , Security , Hackers , cyber-attack , security policy , cybercriminals , Security Alert , security research , cybersecurity , Data Breach

Michelle Drolet

Earlier this week a colleague pointed out an intriguing phishing sample that he had come across. It was interesting not because of any great sophistication or complexity, but rather that it illustrated the reuse of an old social engineering trick. The brand being targeted in the phish campaign is Poste Italiane, a well-known Italian group that includes financial and payment services in its product portfolio. We see numerous phishing attacks targeting this group each month, with attackers keenfalse

Towerwall's Michelle Drolet on Fox 25 to Present MassBay Scholarship Foundation with $10,000 Donation

Security Partners , Data Security , Towerwall , Michelle Drolet , MassBay , Security Program , Information Security , Security , Information Security Summit , cybercriminals , Events , information security tips , Fox 25 , Data Privacy , Scholarship , cybersecurity , Data Breach

Michelle Drolet

Boston News, Weather, Sports | FOX 25 | MyFoxBoston We are delighted to provide $10,000 to the MassBay Scholarship Foundation so the next generation can become cyber security experts. To learn more about the MassBay Foundation and the Information Security Summit Scholarship, click here.

Could Syria Launch a Major Cyberattack Against the U.S.?

network security , Data Security , Towerwall , Syria , Security Regulations , Information Security , Security , Hackers , cyber-attack , cybercriminals , Security Alert , cybersecurity , Data Breach

Michelle Drolet

Cyber-attacks take many forms, from cybercrime, to hacktivism, to cyber warfare, and espionage. We’re all used to hearing about phishing attacks and the threat of malware, but organized cyber-attacks perpetrated by groups with political motivations, and sometimes affiliated with foreign governments, are on the rise, and they could represent a much graver threat. Major concerns about the threat of state-sponsored cyber-attacks on U.S. military and infrastructure have been raised repeatedly longfalse