Towerwall's InfoSec Blog

Content Type

See all

Join us for Sophos' Upcoming Event: Today’s Threat Landscape – How to Stay Safe

Security Partners , security software , Data Security , threat landscape , Security Threat , Security Program , Information Security , Security , Hackers , cybercriminals , Events , information security tips , cybersecurity , Enterprise

Michelle Drolet

Join us for Sophos' upcoming event:

How to Expose Cyber-Attacks and Combat Threats

Security Partners , network security , security software , Data Security , Security Threat , Security Program , Information Security , Security , endpoint security system , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Published by Michele Drolet, CEO of Towerwall Proper analysis will flag suspicious behavior and allow the IT department to assess the threat and take action to close it down Cybercriminals are employing more sophisticated techniques all the time and far too many companies and organizations still don't have the protection they really need to safeguard their systems. The prevalence of targeted attacks and advanced persistent threats (APTs) is disturbing. The risk is that security is breached,false

Towerwall's Michelle Drolet on Fox 25 to Present MassBay Scholarship Foundation with $10,000 Donation

Security Partners , Data Security , Towerwall , Michelle Drolet , MassBay , Security Program , Information Security , Security , Information Security Summit , cybercriminals , Events , information security tips , Fox 25 , Data Privacy , Scholarship , cybersecurity , Data Breach

Michelle Drolet

Boston News, Weather, Sports | FOX 25 | MyFoxBoston We are delighted to provide $10,000 to the MassBay Scholarship Foundation so the next generation can become cyber security experts. To learn more about the MassBay Foundation and the Information Security Summit Scholarship, click here.

How Can you Expose Targeted Attacks and Combat APTs?

network security , Security Services , security software , Data Security , Towerwall , Security Regulations , Security Threat , Security Program , Information Security , Application Security , Security , malware , endpoint security system , Cloud Security , cyber-attack , cybercriminals , penetration testing , financial security , information security tips , Big Data , Data Privacy , APT , vulnerability management , cybersecurity , Data Breach

Michelle Drolet

Cybercriminals are employing more sophisticated techniques all the time and far too many companies and organizations still don’t have the protection they really need to safeguard their systems. The prevalence of targeted attacks and advanced persistent threats (APTs) is disturbing. The risk is that security is breached, typically through manipulation of employees using a technique such as spear phishing, and existing security systems are unable to detect the attack. Data can be harvested forfalse

Critical fixes for Office, Outlook and IE in September Patch Tuesday

Security Services , Data Security , Office , threat landscape , Outlook , Security Threat , Security Program , Information Security , Security , Hackers , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Big Data , Data Privacy , IE , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Windows admins will have their hands full with the large number of security updates in this month's Patch Tuesday. There are fixes for 47 vulnerabilities in 13 bulletins for September's Patch Tuesday cycle. Four of this month's bulletins are critical. This year's total for bulletins is up to 79, a considerable increase from 62 at the same time last year. One critical bulletin this month addresses a remote code execution vulnerability in Microsoft Outlook, which can be exploited if users openfalse

Phone 5S Phishing Mail Arrives in time for launch.

Security Services , Data Security , infected phone , threat landscape , iOS update , Mobile Devices , Security Threat , Smartphone , Phishing , Information Security , Security , iPhone , Mobile Apps , cyber-attack , Apple , cybercriminals , Security Alert , information security tips , Big Data , Mobile Protection , Data Privacy , iOS , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

While millions of mobile users are anticipating the launch of the new iPhone (5S and 5C), cybercriminals are already making their move to distribute spam that promise to give away the said devices for free, in the guise of a contest. We saw samples of spammed messages that attempted to spoof an Apple Store email notification. The said message informs recipients that they won the latest iPhone 5S mobile phones and iPad. Figure 1. Fake Apple email To get these prizes, they are asked to go to afalse

10 Things I Know About... Mobile Security

Security Services , passwords , Web Storage , Data Security , Security Regulations , Mobile Devices , Security Threat , Information Security , web server , Application Security , Security , iPhone , Mobile Apps , Cloud Security , T-Mobile , Web Application Firewall , cyber-attack , Apple , cybercriminals , Security Alert , information security tips , Mobile Protection , Data Privacy , Web Browser , security research , Mobile Security , web users , cybersecurity , Data Breach

Michelle Drolet

10. Malware Is On The Rise The threat of malware on mobile platforms is growing steadily as more cybercriminals target mobile devices in increasingly sophisticated ways.

Read the EDA's Report on Malware Infections

Security Partners , Security Services , Data Security , Security Threat , Information Security , malware , cyber-attack , cybercriminals , Security Alert , information security tips , Big Data , Data Privacy , security research , cybersecurity , Data Breach

Michelle Drolet

Read the EDA's Report on Malware Infections - Malware Infections on EDA’s Systems Were Overstated and the Disruption of IT Operations Was Unwarranted Click here to read.

Four Steps to Respond & Recover from Sophisticated Security Attacks

Security Partners , network security , security software , Data Security , BYOD , Security Regulations , credit card security , Mobile Devices , Security Threat , Security Program , Information Security , Mobile Apps , Hackers , endpoint security system , Cloud Security , cyber-attack , security policy , cybercriminals , financial security , Security Alert , information security tips , Compliance , Big Data , Mobile Protection , Data Privacy , security research , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Great information in SC Magazine’s latest whitepaper report, ‘Four steps to respond and recover from sophisticated security attacks’, it discusses the four proactive steps that you can – and should – take now to help keep your organization safe. Click here to view more details: http://bit.ly/131uu2J As we all know, cyber-attacks are becoming more sophisticated every year. At the same time, IT resources are moving outside the firewall and enterprises are distributing their applications and datafalse

New LinkedIn E-Mail Scam

Linkedin , security software , Security Regulations , Social Engineering , credit card security , Security Threat , Information Security , web server , Security , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Web Browser , security research , Mobile Security , web users , email scam , cybersecurity , Enterprise

Michelle Drolet

Hi all, there is an e-mail scam doing the rounds. The message is an invite from some random person you won’t know with a link (how original). If you get such a message don’t use the link, check your LinkedIn account as if it’s a legit request it will be there waiting for approval. Even if it is legit, make sure you vet all invite requests carefully. I have had several dodgy requests from what I believe to be bogus profiles who are likely up to no good. LinkedIn is about the quality of yourfalse