Towerwall's InfoSec Blog

Content Type

See all

The Rise of Targeted Ransomware

Webinar , Business Continuity , Michelle Drolet , Phishing , BrightTalk , malware , ransomware , COVID-19 , cannabis , cybersecurity , Breach Response , Enterprise , Data Breach

Michelle Drolet

The Rise of Targeted Ransomware What is targeted ransomware? Are you susceptible? What can you do to defend against it? Presented by: Michelle Drolet, CEO, Towerwall

The 7 Deadly Sins of Endpoint Detection & Response

Data breaches , EDR , endpoint detection , cannabis , Enterprise , endpoint visibility

Michelle Drolet

Breaches often take weeks or even months to uncover, but the right strategy combined with strong endpoint detection & response (EDR) tools can make all the difference. We examine seven vital factors to consider. Many different elements need to come together for an organization to secure its data properly. Most companies adopt a security strategy that focuses on prevention, but the idea that you can completely lock down your systems and prevent all incursions is a fallacy. Data breaches arefalse

Mindset Entrepreneur featuring Michelle Drolet

Mindset Entrepreneur featuring Michelle Drolet

Business Continuity , CCPA , Phishing , GDPR , PCI , malware , ransomware , HIPAA , Compliance & Privacy , Compliance , cannabis , Enterprise

Michelle Drolet

Michelle Drolet sits down with Mindset Entrepreneur. Click the image below to watch now:

4 Dangerous Security Assumptions to Avoid

CCPA , GDPR , PCI , security assumptions , HIPAA , Compliance & Privacy , Compliance , cannabis , Enterprise

Michelle Drolet

Many organizations take steps to guard against data breaches, employing new policies, tools and strategies that make them feel protected, but their defenses may not be as strong as they think. Unfortunately, this false sense of security is all-too-easy to come by. Data breaches are commonplace now and there’s a growing realization that organizations need to do more to combat them and to deal with the aftermath. The potential cost of stolen data extends beyond cleanup operations to potentialfalse

10 Things I Know About ... Cloud security

Business Continuity , Worcester Business Journal , Cloud Security , 10 Things I Know , cannabis , Enterprise

Michelle Drolet

10) Got cloud? According to Cloud Security Alliance, more than 70 percent of the world's businesses now operate in some capacity on the cloud.

5 Open Source Intrusion Detection Tools That Are Too Good to Ignore

Android , OSSEC , Open DLP , Phishing , Data Loss Prevention (DLP) , Application Security , Snort , malware , Bro , Windows , Kismet , iOS , cannabis , Enterprise , Open Source

Michelle Drolet

Everyone should employ an intrusion detection system (IDS) to monitor their network and flag any suspicious activity or automatically shut down potentially malicious traffic. We look at five of the best open source options. As cybersecurity professionals, we try to prevent attackers from gaining access to our networks but protecting perimeters that have grown exponentially with the rise of mobile devices, distributed teams, and the internet of things (IoT) is not easy. The unpalatable truth isfalse

Michelle Drolet Discusses Sophos Intercept X on CRNtv

Sophos , Business Continuity , Michelle Drolet , Sophos Intercept X , cybercriminals , CRNtv , cannabis , Enterprise

Michelle Drolet

As long there is money to be made, cybercriminals will continue to take advantage of our security weakness to pick our pockets! And hackers are a dime a dozen, with lots of tools at their disposal. Check out this Cyber Threat Report, brought to you by Sophos, to learn more about the capitalistic cybercriminal and the money behind malware.

Trends in Data Breaches and Comprehensive Response

Social Engineering , Webinar , Business Continuity , Michelle Drolet , CCPA , GDPR , Application Security , BrightTalk , PCI , malware , ransomware , HIPAA , Compliance & Privacy , penetration testing , Compliance , cannabis , cybersecurity , Breach Response , Enterprise , Data Breach

Michelle Drolet

Trends in Data Breaches and Comprehensive Responses Does your organization have a data breach response plan? Join Michelle Drolet and a team of industry experts for an interactive Q&A panel and discover the best practices for breach response and how to strengthen your organization's cyber resilience.

5 tips for better cloud security

Business Continuity , Cloud Security , cannabis , phishing attack , Enterprise , Data Breach

Michelle Drolet

As cloud adoption soars to new heights, security standards have failed to keep pace. Organizations need to start taking responsibility for their own cloud security and these five practical tips will help. There’s no doubt that widespread adoption of the cloud has enabled collaboration on a much greater scale, driving innovation and creativity. Distributed workforces can work harmoniously, IT departments can offload expensive hardware and maintenance costs, and organizations can benefitfalse

Trends in Data Breaches and Comprehensive Response - 9/19/18

Webinar , Business Continuity , Michelle Drolet , BrightTalk , PCI , malware , ransomware , Compliance , COVID-19 , cannabis , cybersecurity , Breach Response , Enterprise , Data Breach

Michelle Drolet

Trends in Data Breaches and Comprehensive Responses Does your organization have a data breach response plan? Join Michelle Drolet and a team of industry experts for an interactive Q&A panel and discover the best practices for breach response and how to strengthen your organization's cyber resilience.