Towerwall's InfoSec Blog

Content Type

See all

10 Things I Know About... Holiday Cyber Scams

malware , ransomware , penetration testing , COVID-19 , cannabis , Enterprise

Michelle Drolet

10) With so many people working from home on all sorts of devices, make sure these endpoints continue to receive the latest security patches and software operating system updates to lessen your chance of compromise.

8 Common Pen Testing Mistakes and How to Avoid Them

8 Common Pen Testing Mistakes and How to Avoid Them

Penetration Tests , Phishing , Application Security , PCI , malware , ransomware , HIPAA , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Penetration testing is vital, but are you doing it right? Here are some common mistakes and advice on how to avoid them.

5 Open Source Intrusion Detection Systems for SMBs

Intrusion Detection Systems , malware , penetration testing , COVID-19 , cannabis , Enterprise

Michelle Drolet

If you don’t have a lot of budget at your disposal, these open-source intrusion detection tools are worth a look. As businesses grapple with the pandemic, millions of workers are no longer working in the traditional office behind the traditional perimeter. They are working from home, accessing data and network resources using unauthorized devices, unauthorized software and unsecured WiFi.

10 Things I know about… COVID-19 scams

Worcester Business Journal , Phishing , Coronavirus , malware , ransomware , COVID-19 , cannabis , Enterprise

Michelle Drolet

10. Pandemic panic Criminals thrive during a crisis, knowing people under stress and distraction are more prone to readily click a text or email link without thought to its legitimacy. As such, COVID-19-related phishing attacks grew 600% in the first quarter.

10 Things I Know About...Setting up a Crisis Response Plan

Worcester Business Journal , Phishing , Crisis Response Plan , malware , ransomware , 10 Things I Know , Compliance , cannabis , Enterprise

Michelle Drolet

10) Start with a plan. Companies of all shapes and sizes should draft a distinct crisis response plan. Existing disaster recovery plans or business continuity plans might not suffice.

Tips For Setting Up A Cybersecure Response Plan

Phishing , GDPR , Coronavirus , malware , ransomware , HIPAA , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

As the novel coronavirus (which causes COVID-19) continues to spread around the world, businesses must do what they can to prepare for absent staff and possible periods of enforced closure. In general, it’s vital that companies of all sizes and types draft a distinct crisis response plan because existing disaster recovery plans or business continuity plans might not suffice. The Centers for Disease Control (CDC) offers various resources to help businesses and employers plan responses to afalse

What's New in PenTera

PenTera , Phishing , PCI , malware , ransomware , Pcysys , cannabis , Enterprise

Michelle Drolet

Join our partner Pcysys for their latest webinar:

10 Things I know about... Cybersecurity

Worcester Business Journal , Phishing , GDPR , PCI , malware , ransomware , HIPAA , 10 Things I Know , Compliance , COVID-19 , cannabis , cybersecurity , Enterprise

Michelle Drolet

10) High priority. 64% of businesses are prioritizing IT security above everything else and 80% of small and medium businesses rank IT security as a top business priority.

The CCPA is an Opportunity to Get Your Data Security House in Order

ISO 27001/2 , California Consumer Privacy Act (CCPA) , General Data Protection Legislation (GDPR) , Phishing , GDPR , PCI , malware , ransomware , HIPAA , Compliance , NIST Cybersecurity Framework , COVID-19 , cannabis , Enterprise

Michelle Drolet

As California’s privacy legislation goes into effect, it’s time to take stock of your security strategies around data and think about the future. The trend towards greater privacy is set to continue. The big data grab drove companies to stockpile data, with little thought of how to use it, and even less thought about how to properly secure it. People everywhere are growing more conscious of the data they share, who collects it, and how it is handled. This rising awareness has sparkedfalse

10 Basic And Easy Cybersecurity Steps

IT Infrastructure , Phishing , GDPR , IT Systems , PCI , malware , ransomware , HIPAA , Risk Management Strategy And Program , cybercrime , Compliance , COVID-19 , cannabis , Zero-Day Protection , Enterprise

Michelle Drolet

Is cybersecurity a top priority for your business? We certainly hope so. A recent report revealed that almost 64% of all businesses prioritize IT security above everything else. Even 80% of all SMBs rank IT security as a top business priority.