Towerwall's InfoSec Blog

Content Type

See all

Michelle Drolet published in NetworkWorld - Throw your vendor under the bus after a breach? Not quite so fast

Security Partners , network security , Security Regulations , Information Security , Application Security , Cloud Security , security policy , Compliance , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Our Michelle Drolet is quoted in NetworkWorld's article "Throw your vendor under the bus after a breach? Not quite so fast". Read more below:

Data Security Alert Vol 13.79 - The Top Hacks of the Year

Security Regulations , Security Program , Information Security , Application Security , Hackers , Cloud Security , security policy , Security Alert , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

As we approach the end of the year, let’s have a look back at the top hacking incidents of 2014. This year, we might have witnessed the most damaging attack of the decade. It will not be easy beating the Sony attack.

What You Need to Know About This New Bank Account Threat

Social Engineering , Phishing , Security Program , Information Security , Security , malware , Cloud Security , Security Alert , Mobile Security , cybersecurity

Michelle Drolet

Sophos Researcher James Wyke recently did an analysis of the malware Vawtrak. He found that Vawtrak has been targeting financial institutions, especially banks. Vawtrak injects a DLL code into the targeted bank’s website, which allows a bypass of the victim’s two-factor authentication and infects the victim with a mobile malware. The malware then automatically transfers money out of the victims account and hides any traces of the transfer. If you notice unusual activity in your bank account orfalse

The 4 Es of Enterprise Security

Security Partners , network security , Security Services , IT Infrastructure , Assessment , Security Regulations , Enforce , Establish , Security Program , Information Security , Evaluate , Application Security , Security , Cloud Security , security policy , 4E Methodology , Educate , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

Building a solid security program takes time. Every organization is different. It's very important to assess your technology, and consider both internal and external threats. An assessment will reveal vulnerabilities. The remediation process will help you take full advantage of your existing security assets and point you at any gaps that need filling. Even once your defenses are in place, vigilance is an ongoing requirement because new threats are emerging all the time. In the face of ourfalse

The Cybersecurity Skills Gap

IT Infrastructure , Virtual CISO , Assessment , Security Program , Information Security , security policy , cybercriminals , cybersecurity , vCISO , Data Breach

Michelle Drolet

The information security profession, which evolved largely in reaction to threats, is now paying the price of an entire “missing generation.” Companies are challenged finding pros with the combination of business and technical savvy that is needed to combat growing threats. Compounding this problem, educational institutions are not graduating enough students with the necessary skills or experience for entry-level positions. It is estimated that between 300,000 and 1,000,000 currentfalse

Debunking 5 Reasons Businesses Use to Not Invest In Computer Security

network security , Risk Management , Data Security , Security Regulations , Information Security , Application Security , Security , Mac , software systems , malware , iPhone , software updates , Hackers , Cloud Security , security policy , cybercriminals , cloud services , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

The rise of malware seems to have passed some people by. As the ranks of cybercriminals grow and they find new ways to exploit our systems and steal our data, a lot of computer users and small-business owners have convinced themselves that it won't happen to them. Here are five common excuses that explain why some people think they don't need computer security and the reasons why they do.

Towerwall Security Alert V13.79 - How to clear out cookies, Flash cookies and local storage

HTTP , Linkedin , Web Storage , Cache , KISSmetrics , Data Security , DOM , Security Regulations , Twitter , Add-ons , Chrome , Cookies , eBay , Fingerprinting , Security Program , Information Security , Settings , Application Security , Security , HTML , Internet Explorer , LSO , Facebook , Private Browsing , Flash Cookies , Amazon , security policy , Gmail , Windows , Safari , Wikipedia , Data Privacy , Web Browser , WordPress , Pinterest , ETag , cybersecurity , Firefox , Enterprise , Data Breach , PayPal

Michelle Drolet

by Mark Stockley This quick fix will show you how to clear out cookies and the cookie-like things that can be used to track you online. If you already know what cookies are all about then you can skip the next bit and go straight to the instructions.

Build security into your app development

Security Partners , Security Services , Data Security , IAST , Mobile Devices , Security Threat , Establish , Security Program , Information Security , Application Security , Security , software systems , DevOps , software updates , Mobile Apps , Hackers , Big Data , Data Privacy , OWASP , Mobile Security , Gap Assessment

Michelle Drolet

Integrate security testing into your dev process now or else face cyber-attacks later

Towerwall Information Security Update Vol 13.78 - 3 ways to make your Outlook.com account safer

network security , Data Security , Security Regulations , Outlook , Security Threat , Security Program , Information Security , Security , Hackers , Cloud Security , security policy , cybercriminals , Security Alert , internal emails , Data Privacy , cybersecurity , Data Breach

Michelle Drolet

3 ways to make your Outlook.com account safer by John Hawes

Towerwall's Candy Alexander Receives 2014 ISSA Award for "Hall of Fame"

Data Security , Towerwall , ISSA International Awards , CISO , Information Security , ISSA International Conference , Security , cybersecurity , ISSA , Enterprise

Michelle Drolet

We are proud to announce that our own Candy Alexander will receive the ISSA "Hall of Fame" Award. See below for more information: Honoree to be Recognized Among RSA Founders at ISSA International Conference on Oct. 22 in Orlando BOSTON, MA--(Marketwired - Oct 9, 2014) - Towerwall (www.towerwall.com), an IT security services provider for small to mid-size businesses, today announced that Candy Alexander, CISSP CISM, GRC Consultant for Towerwall, been inducted into the Hall of Fame by thefalse