Towerwall's InfoSec Blog

Content Type

See all

10 Things I know about... Security Precautions

passwords , Worcester Business Journal , Wireless , Web Browser , third-party social media plug-ins , cannabis , Enterprise

Michelle Drolet

10) Change your password. If you've been using the same password for a long time, then it's time to change it. You should not only change your passwords regularly but not use the same one for every app or website. Try to use more than 13 characters.

LinkedIn Data Breach Still Causing Problems

Mark Zuckerberg’ , Linkedin , passwords , Hack , SHA1 , haveibeenpwned.com , cannabis , Enterprise

Michelle Drolet

Failing to take basic security precautions with website passwords puts your data at risk Do you remember back in 2012 when LinkedIn was hacked? Around 6.5 million user passwords were posted on a Russian blog. There was a mandatory password reset for affected users, and LinkedIn released a statement advising people to enable two-step verification and use stronger passwords. Four years later, and the passwords of 117 million accounts were compromised. Worryingly, this came to light only when afalse

10 Things I Know About... Ransomware Protection

passwords , Phishing , Whitelist , ransomware , Ransomware Protection , Patch , 10 Things I Know , cannabis , Enterprise

Michelle Drolet

10. Backup files every night. If you can access yesterday's files, then there is no need to pay to unlock them today.

Another Successful Information Security Summit

passwords , Smart Device , Data Security , COSO Cube , IT Infrastructure , Government Compliance Regulations , Virtual CISO , Assessment , Mobile Devices , CISO , Information Security , Application Security , Mobile Apps , Information Security Summit , Hackers , cybercriminals , Compliance , cloud services , Big Data , Mobile Protection , Data Privacy , Mobile Security , cybersecurity , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

Once again, the Information Security Summit hosted by Towerwall and MassBay was a resounding success. Hundreds of attendees and vendors participated in diverse data security panels and networked with industry leaders and peers. The Summit opened with Michelle Drolet, CEO of Towerwall, and Shamsi Moussav, Computer Science Professor at MassBay Community College, presenting scholarships to MassBay students Kirk Barge and Julius Newton. Michelle Drolet said,

Shellshock , The Latest Mac OSX and Linux Vulnerabilty—

network security , Shellshock. Bash bug , passwords , security software , Data Security , Linux , iOS update , Security Threat , Information Security , web server , Bash , Mac , Mac OSX , Hackers , cybercriminals , Security Alert , Data Privacy , security research , iOS , GNU Bash Remote Code Execution Vulnerability , Unix , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

By: Solange_Desc1 Security researchers have discovered a new software bug known as the “Bash Bug” or “Shellshock,” or to those more technically “in-the-know” as GNU Bash Remote Code Execution Vulnerability (CVE-2014-6271)(link is external). This bug, more correctly termed, ‘vulnerability’, potentially allows attackers to gain control over targeted computers. The bug is present in a piece of computer software called, Bash, that is typically found on computers running an operating system calledfalse

1.2 billion logins scooped up by CyberVor hacking crew - what you need to do

passwords , Cache , Heartbleed , infected phone , Botnet , bot-infected , two-factor authentification , SQL injection , Information Security , web server , infected computer , Hackers , Cloud Security , Web Application Firewall , cybercriminals , Cryptolocker , Web Browser , web users , cybersecurity

Michelle Drolet

Towerwall Application Security Alert Vol 13.73 Hackers have amassed a vast collection of stolen data, including 1.2 billion unique username/password pairs, by compromising over 420,000 websites using SQL injection techniques. Researchers monitored the gang for over seven months, thought to be "fewer than a dozen men in their 20s who know one another personally" based in a small city in central Russia. They found that the group, working together since at least 2011, had rented time on false

Towerwall Application Security Alert Vol 13.73

network security , passwords , Web Storage , Data Security , Security Regulations , Botnet , credit card security , Security Threat , bot-infected , two-factor authentification , Information Security , web server , Application Security , Security , Hackers , Cloud Security , Web Application Firewall , security policy , cybercriminals , penetration testing , Cryptolocker , Security Alert , Data Privacy , Web Browser , web users , cybersecurity , Enterprise , Data Breach

Michelle Drolet

1.2 billion logins scooped up by CyberVor hacking crew - what you need to do Hackers have amassed a vast collection of stolen data, including 1.2 billion unique username/password pairs, by compromising over 420,000 websites using SQL injection techniques. Researchers monitored the gang for over seven months, thought to be "fewer than a dozen men in their 20s who know one another personally" based in a small city in central Russia. They found that the group, working together since at least 2011,false

Cork That App or Face Attack

Cork That App or Face Attack

passwords , Data Security , Government Compliance Regulations , Assessment , Security Regulations , credit card security , Security Threat , Security Program , Information Security , Application Security , Mobile Apps , Hackers , endpoint security system , security policy , cybercriminals , penetration testing , information security tips , Compliance , Mobile Security , cybersecurity , Enterprise , Gap Assessment

Michelle Drolet

Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority also confess they have been hacked at least once in the last two years. While most large businesses have begun application vulnerability testing, there is still a long way to go. After all, you are only asfalse

10 Things I Know About ... Passwords

passwords , security software , Data Security , Security Regulations , credit card security , Security Threat , Security Program , Information Security , Application Security , Security , Hackers , Cloud Security , security policy , cybercriminals , information security tips , Big Data , Data Privacy , security research , cybersecurity , Data Breach

Michelle Drolet

10 Things I Know About... Mobile Security

Security Services , passwords , Web Storage , Data Security , Security Regulations , Mobile Devices , Security Threat , Information Security , web server , Application Security , Security , iPhone , Mobile Apps , Cloud Security , T-Mobile , Web Application Firewall , cyber-attack , Apple , cybercriminals , Security Alert , information security tips , Mobile Protection , Data Privacy , Web Browser , security research , Mobile Security , web users , cybersecurity , Data Breach

Michelle Drolet

10. Malware Is On The Rise The threat of malware on mobile platforms is growing steadily as more cybercriminals target mobile devices in increasingly sophisticated ways.