Towerwall's InfoSec Blog

Content Type

See all

The Anatomy Of A Sophisticated, Large-Scale Ransomware Attack

Multi-Stage Attacks , Dark Reading , Forbes Technology Council , Phishing , PCI , malware , ransomware , malwarebytes , cybercriminals , COVID-19 , cannabis , Trojan-like Emotet , Enterprise

Michelle Drolet

One of the biggest challenges about working in cybersecurity is that you’re facing an enemy who learns and adapts. Cybercriminals can be very organized, they cooperate, and they’re constantly working to develop new techniques and strategies that will breach your defenses. They’re also growing increasingly adept at sniffing out the best opportunities to extract maximum profit, and ransomware is an essential weapon in their arsenal that has seen a recent spike in usage. According to Malwarebytesfalse

7th Annual Information Security Summit Recap

MassBay Community College , IoT security , #summitbuzz19 , GDPR , malware , ransomware , General Data Protection Regulation (GDPR) , Information Security Summit , HIPAA , Events , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Thank you to all who attended this year’s Information Security Summit! Please see the video recap below. Looking forward to seeing everyone next year!

Delivering Secure & Compliant Remote File Access with Decentralized Cloud Computing - 10/1/19

Phishing , GDPR , malware , ransomware , COVID-19 , cannabis , Enterprise

Michelle Drolet

How to secure remote file access, sharing and collaboration with decentralized cloud computing.

7 Best Practices for Securing the Public Cloud - 9/17/19

PCI , malware , ransomware , cannabis , Enterprise

Michelle Drolet

Workloads in the public cloud are the new pot of gold for savvy cybercriminals. Often misconfigured and under-secured, they’re an easy way for hackers to steal data and take advantage of your processing power. If you use Amazon Web Services, Microsoft Azure, or Google Cloud Platform, or are thinking about migrating to any of these, this webinar will provide essential insight for you. We’ll cover:

Top Social Media Scams And How To Avoid Them

Scams , Romance Scams , Hidden URLs , Phishing , Social Phishing , Social Media , malware , ransomware , Clickbait , Quizzes , Shortened URLs , cannabis , Enterprise , two-factor authentication

Michelle Drolet

Social media has completely changed the way humans interact. Our lives have become increasingly public as we all share a variety of personal information online on various social networks. 2019 has seen worldwide social media user numbers grow to almost 3.5 billion, with 288 million new users in the past 12 months, pushing the global social media penetration figure to 45% and close to 80% of the U.S. population. Facebook and YouTube have more than a staggering 2 billion active users, Instagramfalse

Seven Tips For A Successful Security Awareness Training Program

FISMA , SOX , Phishing , GDPR , PCI , malware , ransomware , HIPAA , Compliance , Security Awareness Training Program , COVID-19 , cannabis , cybersecurity , Enterprise

Michelle Drolet

When we hear the word “cybersecurity” a lot comes to mind — firewalls, antivirus, endpoint protection, email security, web security and much more. But how often do we think or talk about people? This is a central element in cybersecurity that is often ignored. ‘To err is human"— it’s obvious that as humans we often make mistakes. And we can’t be programmed either. As humans, our behavior is largely unpredictable, and failure to account for insider threats can result into costly securityfalse

Five Steps For Creating An Advanced Threat Detection And Vulnerability Management Plan

risk tolerance , Advanced Threat Detection , Incident Response Plan , Phishing , GDPR , PCI , malware , ransomware , HIPAA , COVID-19 , Vulnerability Management Plan , cannabis , Enterprise

Michelle Drolet

While much of cybersecurity is focused on prevention, the simple fact is that many attacks are successful. Even a sophisticated, expensive security system is going to be breached from time to time. Smart attackers try to fly under the radar, biding their time and extracting maximum value or causing maximum carnage, sometimes over a period of months or even years.

Build A Strong Cybersecurity Posture With These 10 Best Practices

Forbes Technology Council , Phishing , GDPR , MaaS , PCI , malware , ransomware , HIPAA , Compliance , COVID-19 , cannabis , cybersecurity , Enterprise , Equifax

Michelle Drolet

The numerous high-profile data breaches that took place in 2018 illustrate that no organization, irrespective of size, scale or scope, is immune from cyberattacks. Last year witnessed a 350% increase in ransomware attacks and a 70% increase in spear-phishing attacks.

7th Annual Information Security Summit - 6/6/19

MassBay Community College , IoT security , #summitbuzz19 , Phishing , GDPR , PCI , malware , ransomware , General Data Protection Regulation (GDPR) , Information Security Summit , HIPAA , Events , cannabis , Enterprise

Michelle Drolet

7th Annual Information Security Summit Presented by MassBay Community College and Towerwall, Inc.

Trends in Advanced Threat Detection & Vulnerability Management - 4/16/19

Phishing , GDPR , PCI , malware , ransomware , HIPAA , cannabis , Enterprise

Michelle Drolet

As cyber attacks become increasingly common, it is vital for organizations to be armed with the most effective tools and knowledge to prevent, detect and respond to cyber threats. Join this interactive Q&A panel with top security experts across the ecosystem to learn more about: