Towerwall's InfoSec Blog

Content Type

See all

10 Best Practices for Securing Your Cannabis Business in 2020

Phishing , PCI , malware , ransomware , HIPAA , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

The risk of a data breach is ever-present and can prove disastrous especially for cash-based businesses like cannabis. It’s vital to guard against cyber-attacks, but also to establish solid plans to ensure you react to any breach in the right way. It has never been easier for cybercriminals to infect your business with malware or ransomware. A vast array of malware tools can be bought on the dark web, complete with helpdesks for hackers, so the barrier to entry is low. Most hackers will sit onfalse

Michelle Drolet Recently Interviewed by Superb Crew

Phishing , PCI , malware , ransomware , HIPAA , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Our CEO, Michelle Drolet recently sat down with Superb Crew to discuss industry trends, threats and how to stay ahead. Link to the full interview below

Protect Yourself From Ad Threats And 'Malvertising'

Malvertising , Ad Threats , Forbes Technology Council , Phishing , PCI , malware , ransomware , HIPAA , COVID-19 , cannabis , Enterprise

Michelle Drolet

Record numbers for internet sales were reported in 2019, but online retailers aren’t the only ones laughing all the way to the bank. Cybercrime costs retailers a staggering $30 billion a year, and the sector is among the top ones targeted globally. Last year, three quarters of global retailers reported falling victim to cyberattacks.

The Evolving Threat Landscape: Five Trends To Expect In 2020 And Beyond

Zero-trust networks , California Consumer Privacy Act (CCPA) , artificial intelligence , Phishing , GDPR , PCI , malware , ransomware , Internet of Things , European General Data Protection Regulation (GDPR) , Cloud Security , HIPAA , Compliance , COVID-19 , remote browser isolation (RBI) , cannabis , Enterprise

Michelle Drolet

2019 is set to break a record for the highest number of security incidents ever recorded and probably the biggest and most expensive year in terms of data breach fines, penalties and court settlements. While large-scale breaches always make big headlines, hackers are not sparing small businesses and consumers. As we head into the new decade, cyberattacks will continue to grow in scale and volume. Cybersecurity is a fast-evolving industry, as hackers and security providers both continuously tryfalse

5 Steps To Develop An Incident Response Plan

NIST framework , ISO 27001/2 , Penetration Tests , Incident Response Plan , Phishing , GDPR , IBM , PCI , Consumer Privacy Rights and Enforcement Act , malware , ransomware , HIPAA , Compliance , COVID-19 , cannabis , cybersecurity , Enterprise

Michelle Drolet

It’s almost a no-brainer that all organizations, regardless of their size, need some form of cybersecurity. Cybersecurity not only means that you protect your digital assets against a cyberattack, but it also means that you must plan for the inevitable. What if your data is breached or your systems are attacked? Seems pretty obvious, doesn't it? Data however, seems to tell another story. A recent survey by the U.K. government has revealed that only 16% of all U.K. businesses have formalfalse

Michelle Drolet Celebrates Milestone with Forbes Technology Council

Phishing , PCI , malware , ransomware , HIPAA , COVID-19 , cannabis , Enterprise

Michelle Drolet

Forbes Technology Council Is an Invitation-Only Community for Executives Leading Their Industry BOSTON – October 25, 2019 — Michelle Drolet, CEO of Towerwall, is celebrating her one-year anniversary as a member of the Forbes Technology Council, an invitation-only organization for senior leaders to publish original content, connect and excel. “We are so pleased to have Michelle Drolet entering year two as a member of Forbes Technology Council," said Scott Gerber, founder and CEO of Forbesfalse

5 cloud security basics and best practices

Phishing , GDPR , PCI , malware , ransomware , Cloud Security , HIPAA , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Companies that move to the cloud have to assume new responsibilities, develop new skill sets and implement new processes. The first step to better cloud security is to assume you have no security. Cloud computing has transformed the way businesses work and continues to disrupt traditional business models. IDC predicts that by 2023 public cloud spending will more than double, growing from $229 billion this year to nearly $500 billion. It’s no secret that migrating to the cloud can deliverfalse

7th Annual Information Security Summit Recap

MassBay Community College , IoT security , #summitbuzz19 , GDPR , malware , ransomware , General Data Protection Regulation (GDPR) , Information Security Summit , HIPAA , Events , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Thank you to all who attended this year’s Information Security Summit! Please see the video recap below. Looking forward to seeing everyone next year!

Seven Tips For A Successful Security Awareness Training Program

FISMA , SOX , Phishing , GDPR , PCI , malware , ransomware , HIPAA , Compliance , Security Awareness Training Program , COVID-19 , cannabis , cybersecurity , Enterprise

Michelle Drolet

When we hear the word “cybersecurity” a lot comes to mind — firewalls, antivirus, endpoint protection, email security, web security and much more. But how often do we think or talk about people? This is a central element in cybersecurity that is often ignored. ‘To err is human"— it’s obvious that as humans we often make mistakes. And we can’t be programmed either. As humans, our behavior is largely unpredictable, and failure to account for insider threats can result into costly securityfalse

Five Steps For Creating An Advanced Threat Detection And Vulnerability Management Plan

risk tolerance , Advanced Threat Detection , Incident Response Plan , Phishing , GDPR , PCI , malware , ransomware , HIPAA , COVID-19 , Vulnerability Management Plan , cannabis , Enterprise

Michelle Drolet

While much of cybersecurity is focused on prevention, the simple fact is that many attacks are successful. Even a sophisticated, expensive security system is going to be breached from time to time. Smart attackers try to fly under the radar, biding their time and extracting maximum value or causing maximum carnage, sometimes over a period of months or even years.