Towerwall's InfoSec Blog

Content Type

See all

Join Towerwall at the New England Bank Technology & Retail Banking Conference

cannabis security , cannabis compliance , Compliance & Privacy , financial security , medical marijuana

Michelle Drolet

Michelle Drolet and the Towerwall team will be attending the 36th Annual New England Bank Technology + Retail Banking Conference and Exhibit, on Friday, May 19th at the DoubleTree in Danvers, MA. Stop by Booth 27 where we will be discussing:

10 Things I Know About Social Engineering

IT Support , Social Engineering , Uniforms , USB , Phishing , Information Security , Security , quid pro quo , endpoint security system , security policy , financial security , scammers , 4E Methodology , Educate , Secure Building , cannabis , Enterprise

Michelle Drolet

10. Don't trust uniforms. Wearing shirts with company logos on them can be enough to gain access to restricted areas. Verify that visitors really are who they say they are.

10 things I know about preventing ID theft

network security , Security Services , Data Security , ID Theft , Gift Cards , credit card security , Security Threat , Information Security , Application Security , Security , PCI , endpoint security system , Cloud Security , security policy , financial security , Security Alert , information security tips , Compliance , Big Data , Data Privacy , Mobile Security , Cash , cybersecurity , Data Breach

Michelle Drolet

10. Use cash or gift cards The threat of identity theft is reduced dramatically if you don't use your credit card for all your purchases, so consider using cash or even gift cards to pay your way.

Reminder: Please join us at the Information Security Summit 2014

Security Partners , network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Information Security , Application Security , Information Security Summit , Hackers , endpoint security system , Cloud Security , Compliance & Privacy , security policy , cybercriminals , financial security , Events , information security tips , Compliance , Big Data , Data Privacy , security research , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

Introducing our Quarterly Newsletter: the Data Security Review

Security Partners , network security , Security Services , security software , Web Storage , Data Security , Government Compliance Regulations , Security Regulations , Heartbleed , credit card security , Mobile Devices , Security Threat , Security Program , Information Security , web server , Application Security , Security , malware , Mobile Apps , Hackers , endpoint security system , Cloud Security , T-Mobile , Web Application Firewall , Apple , Shockwave. Internet Explorer , security policy , cybercriminals , penetration testing , financial security , Security Alert , information security tips , Big Data , Mobile Protection , Data Privacy , Web Browser , security research , vulnerability management , Mobile Security , Third-party Vendor , web users , cybersecurity , Data Breach

Michelle Drolet

I am excited to announce the launch of our quarterly newsletter, the Data Security Review.

Please join us at the Information Security Summit 2014

Security Partners , network security , security software , Data Security , Security Regulations , credit card security , Mobile Devices , Security Threat , Information Security , Mobile Apps , Information Security Summit , Hackers , endpoint security system , Cloud Security , Compliance & Privacy , security policy , cybercriminals , financial security , Events , information security tips , Compliance , Mobile Protection , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

3 Keys To Keep Enterprise Clouds Secure

3 Keys To Keep Enterprise Clouds Secure

network security , Security Services , security software , Data Security , Security Threat , Information Security , Cloud Security , security policy , financial security , information security tips , cloud services , Big Data , Data Privacy , security research , Enterprise , Data Breach

Michelle Drolet

3 Keys To Keep Enterprise Clouds Secure Outsourcing has won out over ownership, and the rush to the cloud continues to gather pace. Where security is concerned there are two major trends that threaten to expose your company to unnecessary risk. There’s a lack of planning and due diligence when choosing cloud providers, and there’s a murky grey area when it comes to responsibility. They can both be mitigated by building security planning into your system from the start, instead of trying tofalse

How Can you Expose Targeted Attacks and Combat APTs?

network security , Security Services , security software , Data Security , Towerwall , Security Regulations , Security Threat , Security Program , Information Security , Application Security , Security , malware , endpoint security system , Cloud Security , cyber-attack , cybercriminals , penetration testing , financial security , information security tips , Big Data , Data Privacy , APT , vulnerability management , cybersecurity , Data Breach

Michelle Drolet

Cybercriminals are employing more sophisticated techniques all the time and far too many companies and organizations still don’t have the protection they really need to safeguard their systems. The prevalence of targeted attacks and advanced persistent threats (APTs) is disturbing. The risk is that security is breached, typically through manipulation of employees using a technique such as spear phishing, and existing security systems are unable to detect the attack. Data can be harvested forfalse

Four Steps to Respond & Recover from Sophisticated Security Attacks

Security Partners , network security , security software , Data Security , BYOD , Security Regulations , credit card security , Mobile Devices , Security Threat , Security Program , Information Security , Mobile Apps , Hackers , endpoint security system , Cloud Security , cyber-attack , security policy , cybercriminals , financial security , Security Alert , information security tips , Compliance , Big Data , Mobile Protection , Data Privacy , security research , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Great information in SC Magazine’s latest whitepaper report, ‘Four steps to respond and recover from sophisticated security attacks’, it discusses the four proactive steps that you can – and should – take now to help keep your organization safe. Click here to view more details: http://bit.ly/131uu2J As we all know, cyber-attacks are becoming more sophisticated every year. At the same time, IT resources are moving outside the firewall and enterprises are distributing their applications and datafalse

Towerwall and the Information Security Summit highlighted in SearchSecurity.com Article

Security Partners , network security , Security Services , security software , Data Security , Towerwall , Security Regulations , threat landscape , credit card security , Mobile Devices , Security Threat , Information Security , Application Security , Security , Mobile Apps , Information Security Summit , endpoint security system , Cloud Security , HIPAA , penetration testing , financial security , information security tips , Compliance , Mobile Protection , vulnerability management , Mobile Security

Michelle Drolet

Check out Search Security's article - "HIPAA Omnibus Rule, PPACA challenge enterprise compliance management", where our own Natalie Kmit and the Information Security Summit 2013 are highlighted: