Towerwall's InfoSec Blog

Content Type

See all

Michelle Drolet featured in WBJ: Building Walls and Breaking Barriers

Towerwall , cannabis security , Michelle Drolet , Worcester Business Journal , cannabis compliance , Phishing , GDPR , PCI , malware , ransomware , HIPAA , Compliance & Privacy , penetration testing , Compliance , 2016 Outstanding Women in Business , cannabis , Enterprise

Michelle Drolet

Michelle Drolet, CEO of Towerwall in Framingham, is an innovative thinker. Never one to shy away from looking at new factors that come into a situation with an open perspective, she has a few things she's learned about good management and good leadership along the way. First, she delegates more. "When I first started, it was all about internal, and we had to do it all. As I've gotten older, I'm able to hand things over and say, 'We can't do that well, but I know they can do that well,'" Droletfalse

Information Security Summit 2016 Raises $5,000 for MassBay Cyber Security Scholarships

Varonis , Sophos , ISACA , TCG , MassBay Community College , Michelle Drolet , Mary Shia , CDW , AlienVault , Dr. David Podell , Phishing , PhishMe , GDPR , RSA , Interwork , malware , ransomware , CyberSN , Information Security Summit , HIPAA , Compliance & Privacy , Michael Lyons , penetration testing , Compliance , SnoopWall , FTG , Veeam , ISSA , Information Security Summit Scholarship , Infraguard

Michelle Drolet

WELLESLEY HILLS, MA (August 2016) – Massachusetts Bay Community College is pleased to announce it has received a generous donation of $5,000 from this year’s annual Information Security Summit to support student scholarships in the field of cyber security. The Information Security Summit, held each year on MassBay Community College’s Wellesley Hills campus, was established in 2013 to help professionals advance their programs and knowledge base on the latest network security and technologyfalse

Hired guns: The rise of the virtual CISO

Virtual CISO , Information Systems Security Association , Fractional Chief Information Security Officer (CIS , CISO , PCI , HIPAA , Compliance , cannabis , vCISO , Enterprise

Michelle Drolet

When is the right time to rent yourself a CISO? The enterprise is facing a dangerous combination of mounting cybersecurity threats of increasing subtlety—and a widening gap in the skills required to identify and combat them. Having someone who knows how to lead the charge in identifying and analyzing threats, creating strategic security plans and ensuring compliance requires the right level of expertise.

Join Towerwall & SnoopWall for a timely webinar on: Breach Prevention & Near-Term ROI

Join Towerwall & SnoopWall for a timely webinar on: Breach Prevention & Near-Term ROI

identification , SOX , Webinar , auditing , vulnerability , Near-Term ROI , PCI , malware , Breach Prevention , HIPAA , Compliance & Privacy , Compliance , SnoopWall , Zero-day malware , patch management , Gary Miliefsky , cannabis , Enterprise

Michelle Drolet

Towerwall & SnoopWall Complimentary Webinar: Breach Prevention & Near-Term ROI Tuesday, July 26 11:00am – 12:00pm EST

Save the Date: Information Security Summit 2016

Security Partners , network security , Fractional Chief Information Security Officer (CIS , Phishing , GDPR , Information Security , Application Security , Security , ransomware , Information Security Summit , HIPAA , Compliance & Privacy , penetration testing , Events , Compliance , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Click here for more information & to register! Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

2015 International Compendium of Data Privacy Laws

GDPR , HIPAA , Compliance , cannabis , Enterprise

Michelle Drolet

Privacy and data protection issues confront all organizations—whether you handle employee information, credit card data, sensitive financial information, or trade secrets. Securing data is a daunting task that is further complicated by cross-border transfer issues and the differences in privacy laws around the world. The team at BakerHostetler has developed a prompt and practical PDF to assist and inform your data protection policies. Download the 2015 International Compendium of Data Privacyfalse

Why every business needs a WISP

Business Continuity , GDPR , HIPAA , Compliance & Privacy , Compliance , Enterprise

Michelle Drolet

Non-compliance is a risk, and the Attorney General's office carries a big stick for those who don't follow the rules. If you don't have a written information security program (WISP) in place for your business, then you could be risking data theft, legal action, and punitive fines. The law in many states now dictates that you must take steps to safeguard personal information. They vary in strictness, but there are nearly 50 different regulations you need to cater for if you're doing businessfalse

Why wasn't healthcare.gov security properly tested?

security software , Security Regulations , credit card security , Security Threat , Security Program , Information Security , web server , Application Security , Security , software updates , Hackers , Web Application Firewall , HIPAA , security policy , cybercriminals , penetration testing , information security tips , web users , cybersecurity

Michelle Drolet

When the healthcare.gov website was launched on Oct. 1 it didn't take long for technical issues to hit the headlines. Americans trying to register for health care found the website unusable. There were glitches, extremely long loading times, and serious errors, but most worrying of all for anyone entrusting sensitive data to the system was the lack of security testing. Three white hat hackers, charged with exposing flaws in the security of online systems told a Congress hearing that thefalse

Views from the Inside: Is your data safe with free cloud services? (guest post)

Security Partners , network security , Security Services , security software , Data Security , threat landscape , Security Threat , Security Program , Security , Hackers , Cloud Security , cyber-attack , HIPAA , security policy , cybercriminals , Security Alert , cloud services , Mobile Security , cybersecurity , Enterprise

Michelle Drolet

The overwhelming advantages of cloud-based file storage are not in dispute. You have an automatic backup of your files, which can be accessed on any device, at any time. Small amounts of storage are generally free, and large swathes of server space are coming down in price all the time. They absolve your business from the headache of backup management, disaster recovery, and bandwidth for instant anytime access. Convenient? Yes, most definitely. Safe and suitable for the enterprise? Well ...false

Towerwall and the Information Security Summit highlighted in SearchSecurity.com Article

Security Partners , network security , Security Services , security software , Data Security , Towerwall , Security Regulations , threat landscape , credit card security , Mobile Devices , Security Threat , Information Security , Application Security , Security , Mobile Apps , Information Security Summit , endpoint security system , Cloud Security , HIPAA , penetration testing , financial security , information security tips , Compliance , Mobile Protection , vulnerability management , Mobile Security

Michelle Drolet

Check out Search Security's article - "HIPAA Omnibus Rule, PPACA challenge enterprise compliance management", where our own Natalie Kmit and the Information Security Summit 2013 are highlighted: