Towerwall's InfoSec Blog

Content Type

See all

5 Open Source Intrusion Detection Systems for SMBs

Intrusion Detection Systems , malware , penetration testing , COVID-19 , cannabis , Enterprise

Michelle Drolet

If you don’t have a lot of budget at your disposal, these open-source intrusion detection tools are worth a look. As businesses grapple with the pandemic, millions of workers are no longer working in the traditional office behind the traditional perimeter. They are working from home, accessing data and network resources using unauthorized devices, unauthorized software and unsecured WiFi.

5 Cybersecurity Events that Keep CEOs up at Night

ransomware , Compliance & Privacy , penetration testing , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

With ransomware and phishing attacks on the rise, companies must continuously focus on cyber risks to protect assets and customers. Covid-19 forced organizations to evolve their business models overnight. The demand for digital infrastructure has skyrocketed and industries are seeing large-scale adoption of work from home.

A Cybersecurity Checklist For The New Norm

Phishing , ransomware , COVID-19 , cannabis , Enterprise

Michelle Drolet

Unauthorized software and devices and stressed and distracted workers have expanded the attack surface and left businesses exposed to a number of cyber-risks. Small and medium-sized businesses in particular are most vulnerable since a majority of them run legacy or outdated systems.

6 Steps to Building a Strong Breach Response Plan

Business Continuity , CCPA , Phishing , GDPR , phishing attacks , PCI , ransomware , HIPAA , Compliance & Privacy , Compliance , COVID-19 , Breach Response Plan , cannabis , Enterprise

Michelle Drolet

Cybersecurity resilience depends on having a detailed, thorough, and tested breach response plan in place. Here's how to get started. No matter how secure your business, data breaches are an unfortunate fact of life. Whether an attack is the result of a determined cybercriminal, a disgruntled insider, or simple human error, you can limit the damage with a carefully crafted response strategy. There’s a lot of groundwork to cover to begin building an effective strategy for coping with a breach:false

VCISO: A Pragmatic Path To Cybersecurity In Pandemic Times And Beyond

Social Engineering , Phishing , COVID-19 , cannabis , Enterprise

Michelle Drolet

Covid-19 has disrupted our lives and caused a lot of stress and panic globally. Even though lockdowns may be relaxing, cyber-attacks are showing no signs of slowing down. The pandemic has created the perfect environment for hacktivists to strike with a high degree of success. Let’s understand the top five reasons for this:

Michelle Drolet

As the average monetary cost of a malware attack continues to increase and currently costs an organization an average of $3.86 M, it is vital to be up to date on detection and prevention best practices. No level of investment prevents or blocks 100% of attacks. You will learn how to continuously identify and address breaches or gaps before they cause real damage. Join leading industry experts as they discuss the use of Deep Learning, AI and MDR solutions.

Don't Let Attackers Weaponize Fear: Use These Cyber Resilience Recommendations

cloud application security , Cyber Resilience , security information and event management (SIEM) , Application Security , Endpoint Protection , ransomware , multifactor authentication (MFA) , COVID-19 , endpoint detection , cannabis , Enterprise

Michelle Drolet

Per a recent analysis from Microsoft (via The Interpreter), every country in the world has fallen prey to at least one COVID-19-related attack. Homeland Security and the Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory back in April relating to heavy exploitation of Covid-19 by malicious cyber actors.

Michelle Drolet Shares Tech Tips on How to Get Devs Thinking About InfoSec

Secure Development Life Cycle Plan (SDLC) , Application Security , Enterprise

Michelle Drolet

In a recent article, "New Tech Project? Get Your Devs On Board Fast with These 16 Tips" published on Forbes Technology Council, Michelle Drolet shares how a Solid Secure Development Lifecycle can help:

10 (More) Free Security Tools Worth a Look

Sophos Intercept X for Mobile , Sophos XG Firewall Home Edition , Have I Been Pwned? , Phishing , GDPR , Application Security , PCI , AT&T Alien Labs Open Threat Exchange (OTX) , ransomware , HIPAA , KnowBe4 Phish-prone , Qualys Cloud Platform Community Edition , Compliance , KnowBe4 RanSim , Imperva Scuba Database Vulnerability Scanner , LogRhythm NetMon Freemium , COVID-19 , Kali Linux , cannabis , Free Security Tools , Enterprise

Michelle Drolet

Security pros have a lot to juggle, but look in the right places and you can find invaluable assistance for free. Maintaining security is a never-ending business. There’s so much to worry about, from misconfigured software to phishing attacks to a rapidly expanding inventory of devices with their own vulnerabilities and update requirements. We could all use a little help to stay on top of things, as we strive to assess where issues lie, protect data effectively, and test the defenses we havefalse

Michelle Drolet to Join Offit Kurman for a Cannabis InfoSec Webinar

Webinar , Zero Trust , Application Security , ransomware , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Live online Friday, July 10th 12:00 – 1:00 p.m. EST Panelist include: Michelle Drolet, Towerwall & Jason Klein, Offit Kurman The threats are real and increasing daily. Learn how you can protect yourself and your cannabis company from unauthorized access to confidential files and proprietary data. By now, we are all too familiar with the real threats that cybercrime present to all businesses.. Cannabis businesses are not immune – in fact they may be more vulnerable in many ways. This talk withfalse