Towerwall's InfoSec Blog

Content Type

See all

Verify the Security of your Mobile Apps

Security Partners , network security , Security Services , security software , Data Security , Mobile Devices , Security Threat , Security Program , Information Security , Application Security , Security , iPhone , Mobile Apps , T-Mobile , security policy , information security tips , Big Data , Mobile Protection , Data Privacy , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Network World - The enterprise is increasingly turning to mobile app developers for solutions to leverage interest in BYOD. Gartner estimates that 70% of mobile professionals will conduct their work on personal smart devices by 2018. The app development boom has fostered a competitive environment for developers and there is a focus on speed. But In the rush to deploy enterprise apps and start reaping the benefits, it is easy to overlook key security risks that could cause irreparable damage tofalse

BYOD Brings on a War of Worry

BYOD Brings on a War of Worry

network security , Security Services , security software , Data Security , BYOD , Mobile Devices , Security Threat , Security Program , Information Security , Security , Mobile Apps , Hackers , T-Mobile , cyber-attack , security policy , cybercriminals , Tablets , Security Alert , information security tips , Mobile Protection , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

It appears that BYOD, “Bring Your Own Device” to work, is beyond just being a growing trend if not currently a sanctioned practice within the corporate walls. It may seem that bowing to this desire on the parts of employees would have a lot to offer, not the least of which is a reduction in costs for employee-issued hardware. Unfortunately that is not entirely the case.

Towerwall Security Alert 2013

network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Information Security , Security , cyber-attack , security policy , cybercriminals , Security Alert , Data Privacy , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

As the year draws to a close, it's time for us to take a step back, absorb the lessons of 2012, and look at what 2013 and beyond will bring for users, the security industry, and even cybercriminals. We know this time of year is incredibly busy and as a trusted advisor, you expect Towerwall to stay on the cutting edge of security information and share our findings. To help you understand the impacts of threats to your business, we would like to share Trend Micro's 2013 forecast report, "Securityfalse

Compliance Combines with Vulnerability Scanning to Create Aegify

network security , Security Services , security software , Data Security , GDPR , Security Program , Information Security , Application Security , vulnerability scanning , Hackers , cyber-attack , security policy , cybercriminals , penetration testing , information security tips , Compliance , vulnerability management , cannabis , cybersecurity , Enterprise

Michelle Drolet

Two security firms, the established Rapid7 vulnerability manager and eGestalt, a cloud-based compliance management provider, have signed an OEM deal that will do something for the IT security industry that hasn’t been done before: a combination security and compliance posture management offering called Aegify SPM. The SPM stands for Security Posture Management, and eGestalt of Santa Clara defines SPM as “the art and science of monitoring and managing business security status by orchestratingfalse

Dealing with Phishing Messages

network security , Security Services , security software , Data Security , Security Regulations , Social Engineering , Security Threat , Phishing , Security Program , Information Security , Security , Hackers , cyber-attack , cybercriminals , Security Alert , information security tips , internal emails , security research , Mobile Security , email scam , cannabis , cybersecurity , Enterprise

Michelle Drolet

According to the article in Dark Reading, Study: Phishing Messages Elude Filters, Frequently Hit Untrained Users, many people are still being tripped up by phishing emails. The article summarizes the findings of a survey that was conducted at the Black Hat USA security conference held in July 2012. Of the 250 conference attendees that were polled, 69% said that phishing messages get past spam filters and into users’ inboxes on a weekly basis. Over 25% indicated that top executives and otherfalse

BYOD means Bring Your Own Dilemma

network security , Security Services , security software , BYOD , Security Regulations , Security Threat , Information Security , Security , Hackers , cyber-attack , security policy , cybercriminals , Tablets , Security Alert , information security tips , Mobile Security , cybersecurity , Enterprise

Michelle Drolet

It’s becoming more and more common for workers to store work-related documents on their smartphones, tablet computers and other devices they bring to and from work each day. While this can be convenient--employees can access important documents at home or on the road--it also creates greater security risks for businesses.

Beware of BYOD Harming your Company

Security Partners , network security , security software , Data Security , BYOD , Security Regulations , Security Threat , Security Program , Information Security , Security , Cloud Security , security policy , Security Alert , information security tips , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

It’s becoming more and more common for workers to store work-related documents on their smartphones, tablet computers and other devices they bring to and from work each day. While this can be convenient -- employees can access important documents at home or on the road --it also creates greater security risks for businesses.

Microsoft discovers Chinese malware pre-installed on new PCs

Security Partners , network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Information Security , Security , malware , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , Microsoft , information security tips , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Microsoft has published evidence of an extraordinary conspiracy in which potent botnet malware was apparently installed and hidden on PCs during their manufacture in China. This is a big deal, the team at Towerwall has been aware that this level of threat and exploitation existed, but none the less surprised. Read the rest of the article: Microsoft discovers Chinese malware pre-installed on new PCs

Michelle Drolet Named One of the Most Powerful Women Of The Channel for 2012

network security , security software , Data Security , Towerwall , Security Regulations , Michelle Drolet , Security Program , Information Security , Security , security policy , information security tips , cannabis , cybersecurity , Enterprise

Michelle Drolet

Michelle Drolet, CEO of Towerwall came in at number 32 for the most powerful women for the Channel Reseller Network (CRN). The following 100 are pulled from those ranks as executives who have proven themselves exceptional during the past year. CRN is proud to highlight their achievements. For more information Visit CRN online

Why You Need A Mobile Device Policy

Security Partners , network security , Security Services , security software , Data Security , BYOD , Security Regulations , Mobile Devices , Security Threat , cisco , Security Program , Information Security , Security , Mobile Apps , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Compliance , Mobile Protection , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Whether you choose to embrace it or try to resist it, the BYOD (Bring Your Own Device) trend is set to grow. A study by Cisco Systems found that 78 percent of white-collar workers in the U.S. use a mobile device for work and 41 percent indicated that most smartphones that connect to the company network are actually employee-owned. So, if you don't already have a BYOD policy, you need one. Employees will connect to your network and use their personal mobile devices for work, whether you allow itfalse