Towerwall's InfoSec Blog

Content Type

See all

7 Steps to Proactive Security

CEO , CFO , BYOD , CIO , Phishing , GDPR , malware , ransomware , Encryption , Breach Prevention , continuous data protection (CDP) , SnoopWall , Ponemon Institute Data Breach , cannabis , Enterprise

Michelle Drolet

The key to securing against this threat lies in a common metaphor—if a ship has a hole, it is better to patch the breach than bail the water Data breaches are increasingly becoming an expensive problem for more and more companies. According to the most recent Ponemon Institute Data Breach report, insecure data cost companies an average of $221 per compromised record in 2016, an increase of 7 percent from the previous year and an all-time high. The key to securing against this threat lies in afalse

10 Things I Know About Business Security

Worcester Business Journal , ransomware , Encryption , 10 Things I Know , business security , cannabis , Enterprise

Michelle Drolet

10. Everything is connected. As the Internet of Things adds more and more devices to our networks, it creates more doors and windows for cyber criminals. Keep them locked.

Are Mobile Apps Putting Your Data at Risk?

BYOD , Mobile Devices , Information Security , Encryption , Mobile Apps , Cloud Security , Mobile Security

Michelle Drolet

Frequently, companies don’t realize that the mobile apps they use are reason for concern. Once their data is breached, they begin to investigate. However, there are telltale signs that indicate an insecure mobile app. If you know what to look for, you may be able to avoid a catastrophic data breach. Mobile apps are everywhere and their benefits are many, offering functionality, flexibility and increased productivity. These apps have altered the way we do business. Unfortunately, all of thesefalse

More Devices, More Problems.

Unsecured Wi-Fi , network security , Data Security , IT Infrastructure , BYOD , Towerwall , Mobile Devices , Security Threat , Smartphone , Information Security , Application Security , Security , Mac , malware , Encryption , Mobile Apps , Cloud Security , Tablets , cloud services , Mobile Protection , Mobile Security , Data Breach

Michelle Drolet

Check out this infographic for the numbers behind BYOD.

Sophos expert talks about Cryptolocker and bitcoin ransom on CNBC (Video)

Security Partners , Data Security , Information Security , Security , ransomware , Encryption , Hackers , cybercriminals , Cryptolocker , information security tips , CNBC , Big Data , Data Privacy , Data Breach

Michelle Drolet

And it keeps getting worse… A widespread outbreak of a sneaky, file-encrypting piece of ransomware called Cryptolocker has many people talking. One very important question raised by Cryptolocker’s success to date: Should you ever pay a ransom to a cybercriminal? Sophos security expert James Lyne, head of global security research at Sophos, went on cable network CNBC to explain how the criminal gang behind Cryptolocker is demanding a ransom in return for unlocking a victim’s files. In the videofalse