Towerwall's InfoSec Blog

Content Type

See all

Views from the Inside: A successful BYOD policy is not just about security

security software , Data Security , BYOD , Security Regulations , threat landscape , Mobile Devices , Security Threat , Security Program , Information Security , infected computer , Mobile Apps , Hackers , cyber-attack , security policy , cybercriminals , Tablets , information security tips , Big Data , Mobile Protection , Data Privacy , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

The BYOD trend shows no sign of abating as more and more organizations recognize the potential benefits in terms of cost and convenience. According to a recent surveyby Good Technology, 76 percent of enterprises are now supporting BYOD and the majority of those that still don’t are planning to do so in the near future. When we look closer, we find that 75 percent of those supporting BYOD employ at least 2,000 people, and 46 percent have 10,000 or more employees. Large organizations andfalse

Is Your Business Taking the Threat of Mobile Malware Seriously?

threat landscape , Mobile Devices , Security Threat , Security Program , Information Security , Application Security , malware , Mobile Apps , Hackers , cyber-attack , security policy , cybercriminals , information security tips , Mobile Protection , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Don’t underestimate the damage that malware proprietors can unleash if the right security policies aren’t in place. Bring-your-own-device (BYOD) programs and cloud computing — two of the biggest enterprise trends from the last couple of years — go hand in hand. Employees want to be given the latitude to use their smartphones for work, and they want to have round-the-clock access to data and applications. For businesses, there are obvious advantages to both cloud computing and BYOD programs infalse

Top Ten Malicious Lists

network security , security software , Data Security , Security Regulations , credit card security , Information Security , Application Security , Security , malware , endpoint security system , Cloud Security , cyber-attack , security policy , cybercriminals , financial security , information security tips , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Top Ten Malicious URLs Top 10 malicious URLs blocked by the Trend Micro™ Smart Protection Network™ infrastructure in 2012

Verify the Security of your Mobile Apps

Security Partners , network security , Security Services , security software , Data Security , Mobile Devices , Security Threat , Security Program , Information Security , Application Security , Security , iPhone , Mobile Apps , T-Mobile , security policy , information security tips , Big Data , Mobile Protection , Data Privacy , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Network World - The enterprise is increasingly turning to mobile app developers for solutions to leverage interest in BYOD. Gartner estimates that 70% of mobile professionals will conduct their work on personal smart devices by 2018. The app development boom has fostered a competitive environment for developers and there is a focus on speed. But In the rush to deploy enterprise apps and start reaping the benefits, it is easy to overlook key security risks that could cause irreparable damage tofalse

Mobile Devices Get Means For Tamper-Evident Forensic Auditing

security software , Data Security , Security Regulations , Mobile Devices , Security Threat , Security Program , Information Security , Security , iPhone , AT&T , Mobile Apps , T-Mobile , cyber-attack , security policy , cybercriminals , information security tips , Mobile Protection , Data Privacy , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

The convenience of mobile devices has led to their rapid proliferation in the work place. But along with that convenience come security and compliance issues contributing to the degeneration of trust. Risk management for mobile devices is of rising concern, particularly in highly regulated industries such as healthcare and finance. In order to detect security breaches and guarantee compliance, tamper “proofing” has not been sufficient. When it comes time for a forensic audit, the ability tofalse

Towerwall Security / Vulnerability Alert

Security Partners , Security Services , Data Security , Security Regulations , Security Threat , Security Program , Information Security , Application Security , Hackers , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , cannabis , cybersecurity , Enterprise

Michelle Drolet

Security researchers from the Vulnerability Lab have identified a serious security hole that could affect a number of companies which rely on Barracuda products. They’ve discovered a high severity validation filter and exception handling bypass vulnerability in Barracuda’s appliances. According to the experts, the input filter that’s designed to block out persistent input attacks is flawed, exposing all security appliances.

BYOD Brings on a War of Worry

BYOD Brings on a War of Worry

network security , Security Services , security software , Data Security , BYOD , Mobile Devices , Security Threat , Security Program , Information Security , Security , Mobile Apps , Hackers , T-Mobile , cyber-attack , security policy , cybercriminals , Tablets , Security Alert , information security tips , Mobile Protection , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

It appears that BYOD, “Bring Your Own Device” to work, is beyond just being a growing trend if not currently a sanctioned practice within the corporate walls. It may seem that bowing to this desire on the parts of employees would have a lot to offer, not the least of which is a reduction in costs for employee-issued hardware. Unfortunately that is not entirely the case.

Warning: Java vulnerable to hackers, U.S. government says

Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Security , Hackers , cyber-attack , security policy , cybercriminals , Security Alert , Big Data , Data Privacy , security research , cybersecurity , Enterprise , Data Breach , Java

Michelle Drolet

Jan 11 (Reuters) - The U.S. Department of Homeland Security urged computer users to disable Oracle Corp's (ORCL:$34.8625,$-0.0475,-0.14%) Java software, amplifying security experts' prior warnings to hundreds of millions of consumers and businesses that use it to surf the Web.

Towerwall Security Alert 2013

network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Information Security , Security , cyber-attack , security policy , cybercriminals , Security Alert , Data Privacy , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

As the year draws to a close, it's time for us to take a step back, absorb the lessons of 2012, and look at what 2013 and beyond will bring for users, the security industry, and even cybercriminals. We know this time of year is incredibly busy and as a trusted advisor, you expect Towerwall to stay on the cutting edge of security information and share our findings. To help you understand the impacts of threats to your business, we would like to share Trend Micro's 2013 forecast report, "Securityfalse

Beware of BYOD trend wreaking havoc

BYOD , Mobile Devices , Security Threat , GDPR , Information Security , Security , Mobile Apps , Hackers , cyber-attack , security policy , cybercriminals , Tablets , Security Alert , information security tips , Mobile Protection , COVID-19 , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Bringing mobile devices to work? Not so fast. Like it or not, the line between the workplace and the home is blurring. Work-at-home arrangements are becoming more common and cloud services make it easier to co-ordinate teams online. People are constantly on call, with the ability to check their emails and stay in touch wherever they are. The days of having a personal mobile and a work device are fast disappearing as the BYOD (Bring Your Own Device) trend continues to grow. A recent SkyDoxfalse