Towerwall's InfoSec Blog

Content Type

See all

10 things I know about... Securing mobile devices

password protection , password , Mobile Devices , Worcester Business Journal , Phishing , 10 Things I Know , cannabis , Enterprise

Michelle Drolet

10) Always lock your screen. Unlocked phones are always going to dangerously accessible. The first line of defense is a PIN, password, pattern or a biometric measure like your fingerprint.

Another Successful Information Security Summit

passwords , Smart Device , Data Security , COSO Cube , IT Infrastructure , Government Compliance Regulations , Virtual CISO , Assessment , Mobile Devices , CISO , Information Security , Application Security , Mobile Apps , Information Security Summit , Hackers , cybercriminals , Compliance , cloud services , Big Data , Mobile Protection , Data Privacy , Mobile Security , cybersecurity , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

Once again, the Information Security Summit hosted by Towerwall and MassBay was a resounding success. Hundreds of attendees and vendors participated in diverse data security panels and networked with industry leaders and peers. The Summit opened with Michelle Drolet, CEO of Towerwall, and Shamsi Moussav, Computer Science Professor at MassBay Community College, presenting scholarships to MassBay students Kirk Barge and Julius Newton. Michelle Drolet said,

Are Mobile Apps Putting Your Data at Risk?

BYOD , Mobile Devices , Information Security , Encryption , Mobile Apps , Cloud Security , Mobile Security

Michelle Drolet

Frequently, companies don’t realize that the mobile apps they use are reason for concern. Once their data is breached, they begin to investigate. However, there are telltale signs that indicate an insecure mobile app. If you know what to look for, you may be able to avoid a catastrophic data breach. Mobile apps are everywhere and their benefits are many, offering functionality, flexibility and increased productivity. These apps have altered the way we do business. Unfortunately, all of thesefalse

Data Privacy Alert Vol 13.80 - CES 2015 Trends that Can Impact Data and Privacy

Wearables , 3D Printing , Smart Device , CES , Mobile Devices , Bluetooth , Smart Home , Wireless , Information Security , Mobile Apps , Cloud Security , Compliance & Privacy , ATM , Portables , Mobile Security , Data Breach

Michelle Drolet

As the International Consumer Electronice Show (CES) 2015 brings forth the next generation of devices to watch out for, it also opens issues of digital security. While new technologies and devices are always interesting, they also have the potential to burn consumers and vendors with risks to security and privacy. With these in mind, we picked out four tech trends from CES 2015 can impact your data and privacy.

Build security into your app development

Security Partners , Security Services , Data Security , IAST , Mobile Devices , Security Threat , Establish , Security Program , Information Security , Application Security , Security , software systems , DevOps , software updates , Mobile Apps , Hackers , Big Data , Data Privacy , OWASP , Mobile Security , Gap Assessment

Michelle Drolet

Integrate security testing into your dev process now or else face cyber-attacks later

More Devices, More Problems.

Unsecured Wi-Fi , network security , Data Security , IT Infrastructure , BYOD , Towerwall , Mobile Devices , Security Threat , Smartphone , Information Security , Application Security , Security , Mac , malware , Encryption , Mobile Apps , Cloud Security , Tablets , cloud services , Mobile Protection , Mobile Security , Data Breach

Michelle Drolet

Check out this infographic for the numbers behind BYOD.

Test All Apps to Keep Hackers from Penetrating Castle Walls

Test All Apps to Keep Hackers from Penetrating Castle Walls

security software , Data Security , Security Regulations , Mobile Devices , Security Threat , Security Program , Information Security , Application Security , Security , Mobile Apps , Hackers , Cloud Security , security policy , cybercriminals , Tablets , information security tips , Compliance , Mobile Protection , Mobile Security , cybersecurity

Michelle Drolet

Four major challenges when protecting apps and how to solve them Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority also confess they have been hacked at least once in the last two years. While most large businesses have begun application vulnerability testing,false

Top 10 things to know about mobile security

Security Partners , Verizon , security software , Data Security , Security Regulations , iOS update , credit card security , Mobile Devices , Security Threat , Information Security , iPhone , AT&T , Mobile Apps , Information Security Summit , T-Mobile , Compliance & Privacy , Apple , Big Data , Mobile Protection , Data Privacy , security research , iOS , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

10. Malware is on the rise

Introducing our Quarterly Newsletter: the Data Security Review

Security Partners , network security , Security Services , security software , Web Storage , Data Security , Government Compliance Regulations , Security Regulations , Heartbleed , credit card security , Mobile Devices , Security Threat , Security Program , Information Security , web server , Application Security , Security , malware , Mobile Apps , Hackers , endpoint security system , Cloud Security , T-Mobile , Web Application Firewall , Apple , Shockwave. Internet Explorer , security policy , cybercriminals , penetration testing , financial security , Security Alert , information security tips , Big Data , Mobile Protection , Data Privacy , Web Browser , security research , vulnerability management , Mobile Security , Third-party Vendor , web users , cybersecurity , Data Breach

Michelle Drolet

I am excited to announce the launch of our quarterly newsletter, the Data Security Review.

Please join us at the Information Security Summit 2014

Security Partners , network security , security software , Data Security , Security Regulations , credit card security , Mobile Devices , Security Threat , Information Security , Mobile Apps , Information Security Summit , Hackers , endpoint security system , Cloud Security , Compliance & Privacy , security policy , cybercriminals , financial security , Events , information security tips , Compliance , Mobile Protection , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!