Towerwall's InfoSec Blog

Content Type

See all

Towerwall Security/Vulnerability Alert Vol 13.62

Data Security , Security Threat , Information Security , Application Security , Security , Hackers , cybercriminals , Security Alert , information security tips , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

Recent vulnerabilities for which exploits are available compiled by the Qualys Vulnerability Research Team. This is a list of recent vulnerabilities for which exploits are available. System administrators can use this list to help in prioritization of their remediation activities. The Qualys Vulnerability Research Team compiles this information based on various exploit frameworks, exploit databases, exploit kits and monitoring of internet activity.

Establishing Security Goals

network security , Security Services , security software , Data Security , Security Threat , Security Program , Information Security , Application Security , Security , Hackers , endpoint security system , Cloud Security , security policy , cybercriminals , penetration testing , information security tips , Compliance , security research , vulnerability management , Mobile Security , cybersecurity

Michelle Drolet

Implementing security practices in your organization’s employees’ daily work habits, and ensuring the integrity and confidentiality of information security, the goals of the Security Awareness Program are:

10 Things I Know About ... Passwords

passwords , security software , Data Security , Security Regulations , credit card security , Security Threat , Security Program , Information Security , Application Security , Security , Hackers , Cloud Security , security policy , cybercriminals , information security tips , Big Data , Data Privacy , security research , cybersecurity , Data Breach

Michelle Drolet

3 Keys To Keep Enterprise Clouds Secure

3 Keys To Keep Enterprise Clouds Secure

network security , Security Services , security software , Data Security , Security Threat , Information Security , Cloud Security , security policy , financial security , information security tips , cloud services , Big Data , Data Privacy , security research , Enterprise , Data Breach

Michelle Drolet

3 Keys To Keep Enterprise Clouds Secure Outsourcing has won out over ownership, and the rush to the cloud continues to gather pace. Where security is concerned there are two major trends that threaten to expose your company to unnecessary risk. There’s a lack of planning and due diligence when choosing cloud providers, and there’s a murky grey area when it comes to responsibility. They can both be mitigated by building security planning into your system from the start, instead of trying tofalse

MetroWest Chamber of Commerce: 118th Annual Meeting

Data Security , Towerwall , Security Threat , Information Security , Security , Hackers , cybercriminals , Events , cybersecurity

Michelle Drolet

Well, it was certainly a night to remember and much to celebrate With over 325+ people coming to celebrate the 118th MetroWest Chamber of Commerce Annual Meeting! It was a great night with much money raised for United Way’s Feed a Family and our hero's - Military Veterans. Watch some of the fun we had:

Sophos expert talks about Cryptolocker and bitcoin ransom on CNBC (Video)

Security Partners , Data Security , Information Security , Security , ransomware , Encryption , Hackers , cybercriminals , Cryptolocker , information security tips , CNBC , Big Data , Data Privacy , Data Breach

Michelle Drolet

And it keeps getting worse… A widespread outbreak of a sneaky, file-encrypting piece of ransomware called Cryptolocker has many people talking. One very important question raised by Cryptolocker’s success to date: Should you ever pay a ransom to a cybercriminal? Sophos security expert James Lyne, head of global security research at Sophos, went on cable network CNBC to explain how the criminal gang behind Cryptolocker is demanding a ransom in return for unlocking a victim’s files. In the videofalse

Join us for Sophos' Upcoming Event: Today’s Threat Landscape – How to Stay Safe

Security Partners , security software , Data Security , threat landscape , Security Threat , Security Program , Information Security , Security , Hackers , cybercriminals , Events , information security tips , cybersecurity , Enterprise

Michelle Drolet

Join us for Sophos' upcoming event:

How to Expose Cyber-Attacks and Combat Threats

Security Partners , network security , security software , Data Security , Security Threat , Security Program , Information Security , Security , endpoint security system , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Published by Michele Drolet, CEO of Towerwall Proper analysis will flag suspicious behavior and allow the IT department to assess the threat and take action to close it down Cybercriminals are employing more sophisticated techniques all the time and far too many companies and organizations still don't have the protection they really need to safeguard their systems. The prevalence of targeted attacks and advanced persistent threats (APTs) is disturbing. The risk is that security is breached,false

Towerwall's Michelle Drolet on Fox 25 to Present MassBay Scholarship Foundation with $10,000 Donation

Security Partners , Data Security , Towerwall , Michelle Drolet , MassBay , Security Program , Information Security , Security , Information Security Summit , cybercriminals , Events , information security tips , Fox 25 , Data Privacy , Scholarship , cybersecurity , Data Breach

Michelle Drolet

Boston News, Weather, Sports | FOX 25 | MyFoxBoston We are delighted to provide $10,000 to the MassBay Scholarship Foundation so the next generation can become cyber security experts. To learn more about the MassBay Foundation and the Information Security Summit Scholarship, click here.

Could Syria Launch a Major Cyberattack Against the U.S.?

network security , Data Security , Towerwall , Syria , Security Regulations , Information Security , Security , Hackers , cyber-attack , cybercriminals , Security Alert , cybersecurity , Data Breach

Michelle Drolet

Cyber-attacks take many forms, from cybercrime, to hacktivism, to cyber warfare, and espionage. We’re all used to hearing about phishing attacks and the threat of malware, but organized cyber-attacks perpetrated by groups with political motivations, and sometimes affiliated with foreign governments, are on the rise, and they could represent a much graver threat. Major concerns about the threat of state-sponsored cyber-attacks on U.S. military and infrastructure have been raised repeatedly longfalse