Towerwall's InfoSec Blog

Content Type

See all

Why You Need A Mobile Device Policy

Security Partners , network security , Security Services , security software , Data Security , BYOD , Security Regulations , Mobile Devices , Security Threat , cisco , Security Program , Information Security , Security , Mobile Apps , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Compliance , Mobile Protection , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Whether you choose to embrace it or try to resist it, the BYOD (Bring Your Own Device) trend is set to grow. A study by Cisco Systems found that 78 percent of white-collar workers in the U.S. use a mobile device for work and 41 percent indicated that most smartphones that connect to the company network are actually employee-owned. So, if you don't already have a BYOD policy, you need one. Employees will connect to your network and use their personal mobile devices for work, whether you allow itfalse

Symantec Update Causes Some XP Systems to BSOD

security software , Data Security , Security Threat , Information Security , Application Security , software updates , Security Alert , information security tips , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

Security firm Symantec released malware signature updates for it antivirus software that caused some Windows XP machines to crash into a Blue Screen Of Death — BSOD. The update was sent out to users of Symantec’s security products over about an eight hour period between July 11th and 12th. “The root cause of the issue,” writes Symantec’s Orla Cox, “was an incompatibility due to a three way interaction between some third party software that implements a file system driver using kernel stackfalse

The worst passwords you could ever choose

Security Partners , network security , Security Services , passwords , security software , Data Security , Security Regulations , credit card security , Security Threat , Security Program , Information Security , Cloud Security , security policy , penetration testing , financial security , Security Alert , information security tips , Compliance , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

For those on our Security Alert and Update list we just emailed this great article by Graham Cluley on the worst possible passwords you could ever choose. Many of you know this is something we preach to our clients on a regular basis and is part of our comprehensive 4E Program. Too many internet users are making poor decisions when choosing their passwords. We've spoken time and time again about the importance of choosing hard-to-crack, unguessable, unique passwords that (provided the websitefalse

Library file in certain Android Apps connects C&C servers

Android , network security , Data Security , Security Regulations , threat landscape , Security Threat , Security Program , Security , cyber-attack , security policy , cybercriminals , Security Alert , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

TrendMicro has uncovered certain Android apps (detected as ANDROIDOS_BOTPANDA.A) containing a malicious library file, which when executed, renders the infected device as a zombie device that connects to specific command and control (C&C) servers. What is also noteworthy about this file is that it hides its routines in the dynamic library, making it difficult to analyze. The malicious library libvadgo contained in ANDROIDOS_BOTPANDA.A was developed via NDK and loaded using Java Native Interface.false

Patch as Patch Can: All Software Is Flawed

Patch as Patch Can: All Software Is Flawed

network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Security , cyber-attack , security policy , cybercriminals , cybersecurity , Enterprise

Michelle Drolet

Many IT departments have weak patching processes - especially on the client-side. And it's no wonder - patching is tough. Across all industries and platforms, the Window of Exploit (WOE) - that is, the time lag between announced discovery and the availability of a patch - for web-based vulnerabilities is a whopping 233 days, according to WhiteHat Security. This leaves your organization exposed for an unacceptably long period of time. It may not be glamorous, but a meticulous patching program isfalse

Beware the wild west of Web applications

Security Partners , network security , Security Services , security software , Web Storage , Data Security , Security Regulations , Security Threat , Security Program , Information Security , web server , Application Security , Security , Cloud Security , Web Application Firewall , security policy , penetration testing , information security tips , Compliance , Web Browser , web users , cannabis , cybersecurity , Enterprise

Michelle Drolet

Web applications – particularly those facilitating collaboration and communication – are a boon to sales, marketing and productivity. Teams work together more effectively, salespeople enjoy better leads and marketing tools and customer service reps can more closely connect with those they serve. All of these gains, though, come at a cost: risk. By their very nature, Web applications circumvent many enterprise security controls. They are designed to enable communication, not security. A paper byfalse

U.S. Outgunned in Hacker War

network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Information Security , Application Security , Security , Hackers , cyber-attack , security policy , cybercriminals , penetration testing , financial security , information security tips , Compliance , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

There was a recent article in the Wall Street Journal in which the top cyber cop Shawn Henry, spoke how we are loosing the battle with the hackers. At times the hackers can keep up us all night worrying about our networks, employee actions whether intentional or not, we need to remain vigilant and on the offensive to prevent attacks. Government regulations are not going to control hackers in fact they probably will make companies less secure. Vigilance on the part of organizations will helpfalse

Event: Don't be a stooge when it comes to data security.

network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Information Security , Security , security policy , Events , Security Alert , information security tips , Compliance , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Join us for an unprecedented security event! Friday, April 13th, 8:00 am - AMC Movie Theatre Framingham, MA Join Towerwall, Trend Micro, Application Security Inc., Sophos, Varonis, Vormetric and WAVE for a brief presentation on data and network security followed by a free breakfast and screening of the world premiere movie: The Three Stooges. Click here to reserve your space today! For more information, contact Andrea at 774-204-0700 or email at - andreah@towerwall.com.

Recommended Reading for Every Entrepreneur

Security Services , security software , Data Security , credit card security , Security Threat , Security Program , Information Security , Security , security policy , financial security , Security Alert , information security tips , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

Boston Business Journal asked Towerwall for required reading for every entrepreneur. Michelle Drolet recommends “The Power of Nice” by Linda Kaplan Thaler and Robin Koval. Nice companies have lower turnover and higher productivity. Click here to read the article.

IP Wars: Who’s The Real Enemy?

Security Partners , network security , Security Services , security software , Data Security , Security Threat , Information Security , Security , security policy , information security tips , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Thanks to the blackout of Wikipedia and the efforts of Google and Facebook, the federal bills known as SOPA (Stop Online Piracy Act) and PIPA (Protect IP Act) have been put on the back burner for revision. The actions last month by the three websites generated millions of protest emails against the controversial legislation. But as unpopular as the bills are because of their perception as going against the spirit of keeping the Internet free and open, the problem of stolen goods continues to befalse