Towerwall's InfoSec Blog

Content Type

See all
Join Towerwall at these Upcoming InfoSec Events

Join Towerwall at these Upcoming InfoSec Events

ISACA , Conference , Information Security Summit 2016 , Boston , Social Engineering , Phishing , Information Security , Security BSides Boston 2016 , malware , Information Security Summit , Events , Compliance , Massachusetts , cannabis , Enterprise

Michelle Drolet

We will be attending, sponsoring and hosting the following InfoSec events this Spring / Summer. Join us!

5 cybersecurity trends to watch for in 2016

5 cybersecurity trends to watch for in 2016

Phishing , malware , ransomware , Internet of Things , cloud services , Known vulnerabilities , cannabis , Enterprise

Michelle Drolet

As threats evolve and grow more sophisticated, securing IT systems is more important than ever. We may welcome in the New Year with open arms, but we must also prepare for the cybersecurity threats ahead of us. The 2015 Cost of Data Breach Study from IBM and the Ponemon Institute put the average cost of a data breach at $3.79 million, and that figure is expected to grow in the year ahead. With the right resolutions, you can drastically reduce your chances of falling prey to cybercriminals.

Michelle Drolet

Another staple in a series examining the Center for Internet Security's best practices. Our last article looked at applying Critical Security Controls 4, 5, and 6 to your organization, covering vulnerability assessment, administrative privileges, and audit logs. Now it’s time to move on to CSCs 7, 8, and 9. Email programs and web browsers are still the most common points of entry for attackers, too many companies have woefully inadequate malware defenses, and a failure to control ports andfalse

7 security threats that go ignored too often

Phishing , Application Security , malware , cannabis , Enterprise

Michelle Drolet

From unencrypted email to open Wi-Fi to faulty firewalls, some of the most common security threats could easily give away the entire farm. More threats emerge for IT departments every year. Cybersecurity is increasingly challenging as attacks get more sophisticated. But many core basics are still being ignored.

What You Need to Know About This New Bank Account Threat

Social Engineering , Phishing , Security Program , Information Security , Security , malware , Cloud Security , Security Alert , Mobile Security , cybersecurity

Michelle Drolet

Sophos Researcher James Wyke recently did an analysis of the malware Vawtrak. He found that Vawtrak has been targeting financial institutions, especially banks. Vawtrak injects a DLL code into the targeted bank’s website, which allows a bypass of the victim’s two-factor authentication and infects the victim with a mobile malware. The malware then automatically transfers money out of the victims account and hides any traces of the transfer. If you notice unusual activity in your bank account orfalse

Debunking 5 Reasons Businesses Use to Not Invest In Computer Security

network security , Risk Management , Data Security , Security Regulations , Information Security , Application Security , Security , Mac , software systems , malware , iPhone , software updates , Hackers , Cloud Security , security policy , cybercriminals , cloud services , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

The rise of malware seems to have passed some people by. As the ranks of cybercriminals grow and they find new ways to exploit our systems and steal our data, a lot of computer users and small-business owners have convinced themselves that it won't happen to them. Here are five common excuses that explain why some people think they don't need computer security and the reasons why they do.

More Devices, More Problems.

Unsecured Wi-Fi , network security , Data Security , IT Infrastructure , BYOD , Towerwall , Mobile Devices , Security Threat , Smartphone , Information Security , Application Security , Security , Mac , malware , Encryption , Mobile Apps , Cloud Security , Tablets , cloud services , Mobile Protection , Mobile Security , Data Breach

Michelle Drolet

Check out this infographic for the numbers behind BYOD.

Towerwall Security/Malware Alert Vol 13.72

Security Threat , Information Security , Security , malware , ransomware , Hackers , cybercriminals , Security Alert , information security tips , security research , cybersecurity , Enterprise

Michelle Drolet

When an international law enforcement action earlier this month knocked out theGameover botnet, one happy consequence was the takedown of the servers that the CryptoLocker ransomware needed in order to do its dirty work. Well, any celebration over CryptoLocker’s demise is certainly premature - encrypting ransomware is alive and well. With many victims paying up, ransomware is a lucrative business for the crooks, and CryptoLocker has inspired copycats who want in on the loot.

Towerwall Information Security/Malware Alert Vol 13.67 - Notorious "Gameover" malware gets itself a kernel-mode rootkit...

Data Security , Security Regulations , Security Threat , Information Security , Security , malware , Hackers , Compliance & Privacy , cybercriminals , Security Alert , information security tips , Data Privacy , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Zeus, also known as Zbot, is a malware family that we have written about many times on Naked Security. We've covered it as plain old Zbot. We've covered the Citadel variant, which appeared when the original Zbot code was leaked online. We've even written about the time it pretended to be a Microsoft fix for CryptoLocker, a completely different strain of malware. Currently, the most widespread Zbot derivative is the Gameover bot, also known as Zeus P2P because of its use of peer-to-peer networkfalse

Introducing our Quarterly Newsletter: the Data Security Review

Security Partners , network security , Security Services , security software , Web Storage , Data Security , Government Compliance Regulations , Security Regulations , Heartbleed , credit card security , Mobile Devices , Security Threat , Security Program , Information Security , web server , Application Security , Security , malware , Mobile Apps , Hackers , endpoint security system , Cloud Security , T-Mobile , Web Application Firewall , Apple , Shockwave. Internet Explorer , security policy , cybercriminals , penetration testing , financial security , Security Alert , information security tips , Big Data , Mobile Protection , Data Privacy , Web Browser , security research , vulnerability management , Mobile Security , Third-party Vendor , web users , cybersecurity , Data Breach

Michelle Drolet

I am excited to announce the launch of our quarterly newsletter, the Data Security Review.