Towerwall's InfoSec Blog

Content Type

See all

Towerwall Named Cyber Security Leader for 2016

Cyber Security Leader for 2016 , Mass Bay Community College , Outstanding Women in Business , Phishing , GDPR , PCI , malware , ransomware , Information Security Summit , HIPAA , Compliance & Privacy , penetration testing , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Company among top 20 recognized for their IT security leadership and innovation BOSTON – November 15, 2016 – Towerwall (www.towerwall.com), a data security services provider for small to mid-size businesses, today announced that Cyber Defense Magazine has named Towerwall a “Cyber Security Leader for 2016.” Towerwall was among the top 20 companies to receive the recognition for exceptional information security (InfoSec) products and services. “The personal relationship Towerwall extends is veryfalse

7 Steps to Proactive Security

CEO , CFO , BYOD , CIO , Phishing , GDPR , malware , ransomware , Encryption , Breach Prevention , continuous data protection (CDP) , SnoopWall , Ponemon Institute Data Breach , cannabis , Enterprise

Michelle Drolet

The key to securing against this threat lies in a common metaphor—if a ship has a hole, it is better to patch the breach than bail the water Data breaches are increasingly becoming an expensive problem for more and more companies. According to the most recent Ponemon Institute Data Breach report, insecure data cost companies an average of $221 per compromised record in 2016, an increase of 7 percent from the previous year and an all-time high. The key to securing against this threat lies in afalse

Michelle Drolet featured in WBJ: Building Walls and Breaking Barriers

Towerwall , cannabis security , Michelle Drolet , Worcester Business Journal , cannabis compliance , Phishing , GDPR , PCI , malware , ransomware , HIPAA , Compliance & Privacy , penetration testing , Compliance , 2016 Outstanding Women in Business , cannabis , Enterprise

Michelle Drolet

Michelle Drolet, CEO of Towerwall in Framingham, is an innovative thinker. Never one to shy away from looking at new factors that come into a situation with an open perspective, she has a few things she's learned about good management and good leadership along the way. First, she delegates more. "When I first started, it was all about internal, and we had to do it all. As I've gotten older, I'm able to hand things over and say, 'We can't do that well, but I know they can do that well,'" Droletfalse

Towerwall named Cyber Security Leader 2016 by Cyber Defense Magazine

GDPR , Towerwall in the News , Cyber Security Leader 2016 , Compliance & Privacy , penetration testing , Cyber Defense Magazine , Compliance , cannabis , Enterprise

Michelle Drolet

We are honored to be named a Cyber Security Leader 2016 by Cyber Defense Magazine We are excited to share the list other worth leaders in cyber security. Click here to see the full list of winners.

Towerwall's Blog named to the Best Computer Security Blogs 2016 by CreditDonkey

TrendMicro , Vormetric , Phishing , Top Computer Security Blogs 2016 , GDPR , ransomware , Compliance & Privacy , penetration testing , Compliance , Imperva , Qualys , CreditDonkey , cannabis , Fortinet , Enterprise

Michelle Drolet

We are honored to share that our blog was named as a Top Computer Security Blogs 2016 by CreditDonkey. CreditDonkey sites:

Information Security Summit 2016 Raises $5,000 for MassBay Cyber Security Scholarships

Varonis , Sophos , ISACA , TCG , MassBay Community College , Michelle Drolet , Mary Shia , CDW , AlienVault , Dr. David Podell , Phishing , PhishMe , GDPR , RSA , Interwork , malware , ransomware , CyberSN , Information Security Summit , HIPAA , Compliance & Privacy , Michael Lyons , penetration testing , Compliance , SnoopWall , FTG , Veeam , ISSA , Information Security Summit Scholarship , Infraguard

Michelle Drolet

WELLESLEY HILLS, MA (August 2016) – Massachusetts Bay Community College is pleased to announce it has received a generous donation of $5,000 from this year’s annual Information Security Summit to support student scholarships in the field of cyber security. The Information Security Summit, held each year on MassBay Community College’s Wellesley Hills campus, was established in 2013 to help professionals advance their programs and knowledge base on the latest network security and technologyfalse

Save the Date: Information Security Summit 2016

Security Partners , network security , Fractional Chief Information Security Officer (CIS , Phishing , GDPR , Information Security , Application Security , Security , ransomware , Information Security Summit , HIPAA , Compliance & Privacy , penetration testing , Events , Compliance , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Click here for more information & to register! Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

2015 International Compendium of Data Privacy Laws

GDPR , HIPAA , Compliance , cannabis , Enterprise

Michelle Drolet

Privacy and data protection issues confront all organizations—whether you handle employee information, credit card data, sensitive financial information, or trade secrets. Securing data is a daunting task that is further complicated by cross-border transfer issues and the differences in privacy laws around the world. The team at BakerHostetler has developed a prompt and practical PDF to assist and inform your data protection policies. Download the 2015 International Compendium of Data Privacyfalse

Why every business needs a WISP

Business Continuity , GDPR , HIPAA , Compliance & Privacy , Compliance , Enterprise

Michelle Drolet

Non-compliance is a risk, and the Attorney General's office carries a big stick for those who don't follow the rules. If you don't have a written information security program (WISP) in place for your business, then you could be risking data theft, legal action, and punitive fines. The law in many states now dictates that you must take steps to safeguard personal information. They vary in strictness, but there are nearly 50 different regulations you need to cater for if you're doing businessfalse

Beware of BYOD trend wreaking havoc

BYOD , Mobile Devices , Security Threat , GDPR , Information Security , Security , Mobile Apps , Hackers , cyber-attack , security policy , cybercriminals , Tablets , Security Alert , information security tips , Mobile Protection , COVID-19 , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Bringing mobile devices to work? Not so fast. Like it or not, the line between the workplace and the home is blurring. Work-at-home arrangements are becoming more common and cloud services make it easier to co-ordinate teams online. People are constantly on call, with the ability to check their emails and stay in touch wherever they are. The days of having a personal mobile and a work device are fast disappearing as the BYOD (Bring Your Own Device) trend continues to grow. A recent SkyDoxfalse