Towerwall's InfoSec Blog

Content Type

See all

5 Steps To Develop An Incident Response Plan

NIST framework , ISO 27001/2 , Penetration Tests , Incident Response Plan , Phishing , GDPR , IBM , PCI , Consumer Privacy Rights and Enforcement Act , malware , ransomware , HIPAA , Compliance , COVID-19 , cannabis , cybersecurity , Enterprise

Michelle Drolet

It’s almost a no-brainer that all organizations, regardless of their size, need some form of cybersecurity. Cybersecurity not only means that you protect your digital assets against a cyberattack, but it also means that you must plan for the inevitable. What if your data is breached or your systems are attacked? Seems pretty obvious, doesn't it? Data however, seems to tell another story. A recent survey by the U.K. government has revealed that only 16% of all U.K. businesses have formalfalse

Five Steps For Creating An Advanced Threat Detection And Vulnerability Management Plan

risk tolerance , Advanced Threat Detection , Incident Response Plan , Phishing , GDPR , PCI , malware , ransomware , HIPAA , COVID-19 , Vulnerability Management Plan , cannabis , Enterprise

Michelle Drolet

While much of cybersecurity is focused on prevention, the simple fact is that many attacks are successful. Even a sophisticated, expensive security system is going to be breached from time to time. Smart attackers try to fly under the radar, biding their time and extracting maximum value or causing maximum carnage, sometimes over a period of months or even years.