Towerwall's InfoSec Blog

Content Type

See all
Information Security Summit 2017 Recap: Ransomware, Application Security, Unstructured Data and the Cloud

Information Security Summit 2017 Recap: Ransomware, Application Security, Unstructured Data and the Cloud

spear phishing , Information Security Summit 2017 , BYOD , Government Compliance Regulations , Third Party Outsourcing , Phishing , GDPR , PCI , malware , ransomware , Unstructured Data , HIPAA , Compliance & Privacy , GRC , penetration testing , Events , Compliance , cannabis , Enterprise

Michelle Drolet

Thanks to all who attended and sponsored our 2017 Information Security Summit. It was a great turnout where we discussed a number of issues and threats facing InfoSec today. We were happy to see attendees share ideas and continue the discussion online with #summitbuzz17

10 things I know about... Securing mobile devices

password protection , password , Mobile Devices , Worcester Business Journal , Phishing , 10 Things I Know , cannabis , Enterprise

Michelle Drolet

10) Always lock your screen. Unlocked phones are always going to dangerously accessible. The first line of defense is a PIN, password, pattern or a biometric measure like your fingerprint.

Join us for the ISSA New England August 2017 Sponsor Expo

Cyber Security Career Lifecycle ( CSCL ) , Webinar , Information Systems Security Association (ISSA) , Cyber Security , ISSA New England , cannabis , Enterprise

Michelle Drolet

Please join us for the The ISSA New England Chapter's 2017 Sponsor Expo Wednesday, August 2, 2017 from 8:00 AM to 4:30 PM EDT Verizon Labs 60 Sylvan Rd Waltham, MA 02451 You are invited to ISSA, New England Chapter's Annual Sponsor Expo and Chapter Meeting. Compete in the Security Bee (questions from the CISSP exam) and bring home a cash prize and award (win and place), fame and your place in history.

When It Comes to Cyber Security, The Weakest Link is Still Employees

Training , employee , cannabis , Enterprise , Gap Assessment

Michelle Drolet

We need to make sure the highly regulated world of cannabis business knows how to protect its data, customer and otherwise, yet also control access to it without too much hassle. As an insurgent breed, hackers are savvy and will seek out the path of least resistance. When your defenses are good, the weak link is often your employees. Data breaches are most likely to be the result of employee error or an inside job, says the ACC Foundation: State of Cybersecurity Report. Of course you want tofalse

Join Towerwall & Sophos for "The End of Ransomware" Webinar

Sophos , Towerwall , Webinar , ransomware , Compliance & Privacy , penetration testing , Events , cannabis , Enterprise

Michelle Drolet

"Those within cyber security circles know ransomware has become a lucrative billion dollar business for an army of cybercriminals…It’s time you learn about the tricks and trade of cybercriminals and how their threats are constantly evolving."- John Shaw, Vice President, Enduser Security Group, Sophos Please join Towerwall and Sophos for an exclusive lunch and learn. You'll find out about:

Michelle Drolet interviewed on the WannaCry Ransomware Attack

ransomware , Compliance & Privacy , penetration testing , WannaCry , cannabis , Enterprise

Michelle Drolet

After the recent wave of WannaCry ransomware attacks, managed service providers said the key takeaway they are bringing to customers going forward is the importance of proactive security. "Our whole stance is around proactive security. When you have proactive [security], WannaCry is not going to have an impact," said Michelle Drolet, CEO of Framingham, Mass.-based Towerwall. Drolet said that proactive approach includes an integrated, layered approach to security to protect the different levelsfalse

The End of Ransomware

ransomware , Compliance & Privacy , penetration testing , cannabis , Enterprise

Michelle Drolet

Everything you need to know to stop ransomware. Please join Towerwall and Sophos for an exclusive lunch and learn to learn how to stop ransomware cold. You’ll find out about:

Michelle Drolet interviewed on "Today's security challenges" in recent TechTarget E-Handbook

TechTarget , Data Security , Fractional Chief Information Security Officer (CIS , Channel Partners , cannabis , vCISO , Enterprise

Michelle Drolet

Channel partners can make arguments for the integrated security suite and the best-in-class point product method, but the decision ultimately rests on a customer's specific needs.

10 things I know about... Public Wi-Fi

Hack , Social Engineering , Worcester Business Journal , Public Wi-Fi , VPN , 10 Things I Know , SSL , cannabis , Enterprise

Michelle Drolet

10. Freely hackable Free public Wi-Fi connections are treated like a public utility, but they can be making you vulnerable to hackers.

Protect your unstructured data with user behavior analytics

Yahoo , Varonis , NetworkWorld , CIA , behavior analytics , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

User behavior analytics sniffs out anomalies in users' actions and alerts IT security teams of suspicious behavior The theft of unstructured data is extremely common. It can be very difficult to safeguard emails and files when a lot of people have access. Even the CIA is not immune, judging by the recent exposure of its hacking tools via WikiLeaks. It’s ironic that the CIA’s hacking guides have been hacked, but it just goes to show how difficult it can be to prevent. Carelessly handledfalse