Towerwall's InfoSec Blog

Content Type

See all
8 Common Pen Testing Mistakes and How to Avoid Them

8 Common Pen Testing Mistakes and How to Avoid Them

Penetration Tests , Phishing , Application Security , PCI , malware , ransomware , HIPAA , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Penetration testing is vital, but are you doing it right? Here are some common mistakes and advice on how to avoid them.

6 Steps to Building a Strong Breach Response Plan

Business Continuity , CCPA , Phishing , GDPR , phishing attacks , PCI , ransomware , HIPAA , Compliance & Privacy , Compliance , COVID-19 , Breach Response Plan , cannabis , Enterprise

Michelle Drolet

Cybersecurity resilience depends on having a detailed, thorough, and tested breach response plan in place. Here's how to get started. No matter how secure your business, data breaches are an unfortunate fact of life. Whether an attack is the result of a determined cybercriminal, a disgruntled insider, or simple human error, you can limit the damage with a carefully crafted response strategy. There’s a lot of groundwork to cover to begin building an effective strategy for coping with a breach:false

Three Crucial Keys to Understanding HIPAA Compliance

CCPA , GDPR , PCI , HIPAA , Compliance & Privacy , Compliance , cannabis

Michelle Drolet

asellus molestie hendrerit bibendum. Proin suscipit, justo non porttitor fringilla, nulla mauris accumsan diam, non mattis enim nibh nec ipsum. Ut arcu urna, fermentum et nulla sit amet, auctor porta metus. Aenean vitae dictum nulla. Proin sit amet lorem id ligula pulvinar egestas. Proin tincidunt lacinia turpis a vestibulum. Cras sollicitudin, risus sed eleifend ullamcorper, odio ligula dignissim dui, in iaculis magna metus a lacus. Donec sed dui et quam vehicula ullamcorper quis ac dui.false

10 (More) Free Security Tools Worth a Look

Sophos Intercept X for Mobile , Sophos XG Firewall Home Edition , Have I Been Pwned? , Phishing , GDPR , Application Security , PCI , AT&T Alien Labs Open Threat Exchange (OTX) , ransomware , HIPAA , KnowBe4 Phish-prone , Qualys Cloud Platform Community Edition , Compliance , KnowBe4 RanSim , Imperva Scuba Database Vulnerability Scanner , LogRhythm NetMon Freemium , COVID-19 , Kali Linux , cannabis , Free Security Tools , Enterprise

Michelle Drolet

Security pros have a lot to juggle, but look in the right places and you can find invaluable assistance for free. Maintaining security is a never-ending business. There’s so much to worry about, from misconfigured software to phishing attacks to a rapidly expanding inventory of devices with their own vulnerabilities and update requirements. We could all use a little help to stay on top of things, as we strive to assess where issues lie, protect data effectively, and test the defenses we havefalse

What's New in PenTera

PenTera , Phishing , PCI , malware , ransomware , Pcysys , cannabis , Enterprise

Michelle Drolet

Join our partner Pcysys for their latest webinar:

10 Things I know about... Cybersecurity

Worcester Business Journal , Phishing , GDPR , PCI , malware , ransomware , HIPAA , 10 Things I Know , Compliance , COVID-19 , cannabis , cybersecurity , Enterprise

Michelle Drolet

10) High priority. 64% of businesses are prioritizing IT security above everything else and 80% of small and medium businesses rank IT security as a top business priority.

The CCPA is an Opportunity to Get Your Data Security House in Order

ISO 27001/2 , California Consumer Privacy Act (CCPA) , General Data Protection Legislation (GDPR) , Phishing , GDPR , PCI , malware , ransomware , HIPAA , Compliance , NIST Cybersecurity Framework , COVID-19 , cannabis , Enterprise

Michelle Drolet

As California’s privacy legislation goes into effect, it’s time to take stock of your security strategies around data and think about the future. The trend towards greater privacy is set to continue. The big data grab drove companies to stockpile data, with little thought of how to use it, and even less thought about how to properly secure it. People everywhere are growing more conscious of the data they share, who collects it, and how it is handled. This rising awareness has sparkedfalse

10 Basic And Easy Cybersecurity Steps

IT Infrastructure , Phishing , GDPR , IT Systems , PCI , malware , ransomware , HIPAA , Risk Management Strategy And Program , cybercrime , Compliance , COVID-19 , cannabis , Zero-Day Protection , Enterprise

Michelle Drolet

Is cybersecurity a top priority for your business? We certainly hope so. A recent report revealed that almost 64% of all businesses prioritize IT security above everything else. Even 80% of all SMBs rank IT security as a top business priority.

Finding Clarity in the Cloud

Sophos , Webinar , Phishing , GDPR , PCI , malware , ransomware , Cloud Security , HIPAA , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Cloud security is simpler than you think. Move to the cloud with confidence while increasing the efficiency of your security management, compliance, and governance. Listen in to learn how you can:

Humans are the new Malware

Qnext/FileFlex , Phishing , edge-cloud architecture , PCI , malware , ransomware , COVID-19 , cannabis , Enterprise

Michelle Drolet

It may seem like a peculiar twist of irony, but as the technical capabilities afforded by automation proliferate, successful cyberattacks are increasingly more reliant on human execution. Join this 60-minute presentation to learn more about the cyber threat landscape, threat hunting and response techniques, and real-world examples of how Sophos Managed Threat Response detects and neutralizes threats. Hosted By: Sophos & Towerwall