Towerwall's InfoSec Blog

Content Type

See all
Information Security Summit 2017 Recap: Ransomware, Application Security, Unstructured Data and the Cloud

Information Security Summit 2017 Recap: Ransomware, Application Security, Unstructured Data and the Cloud

spear phishing , Information Security Summit 2017 , BYOD , Government Compliance Regulations , Third Party Outsourcing , Phishing , GDPR , PCI , malware , ransomware , Unstructured Data , HIPAA , Compliance & Privacy , GRC , penetration testing , Events , Compliance , cannabis , Enterprise

Michelle Drolet

Thanks to all who attended and sponsored our 2017 Information Security Summit. It was a great turnout where we discussed a number of issues and threats facing InfoSec today. We were happy to see attendees share ideas and continue the discussion online with #summitbuzz17

Towerwall Named Cyber Security Leader for 2016

Cyber Security Leader for 2016 , Mass Bay Community College , Outstanding Women in Business , Phishing , GDPR , PCI , malware , ransomware , Information Security Summit , HIPAA , Compliance & Privacy , penetration testing , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Company among top 20 recognized for their IT security leadership and innovation BOSTON – November 15, 2016 – Towerwall (www.towerwall.com), a data security services provider for small to mid-size businesses, today announced that Cyber Defense Magazine has named Towerwall a “Cyber Security Leader for 2016.” Towerwall was among the top 20 companies to receive the recognition for exceptional information security (InfoSec) products and services. “The personal relationship Towerwall extends is veryfalse

Michelle Drolet featured in WBJ: Building Walls and Breaking Barriers

Towerwall , cannabis security , Michelle Drolet , Worcester Business Journal , cannabis compliance , Phishing , GDPR , PCI , malware , ransomware , HIPAA , Compliance & Privacy , penetration testing , Compliance , 2016 Outstanding Women in Business , cannabis , Enterprise

Michelle Drolet

Michelle Drolet, CEO of Towerwall in Framingham, is an innovative thinker. Never one to shy away from looking at new factors that come into a situation with an open perspective, she has a few things she's learned about good management and good leadership along the way. First, she delegates more. "When I first started, it was all about internal, and we had to do it all. As I've gotten older, I'm able to hand things over and say, 'We can't do that well, but I know they can do that well,'" Droletfalse

Hired guns: The rise of the virtual CISO

Virtual CISO , Information Systems Security Association , Fractional Chief Information Security Officer (CIS , CISO , PCI , HIPAA , Compliance , cannabis , vCISO , Enterprise

Michelle Drolet

When is the right time to rent yourself a CISO? The enterprise is facing a dangerous combination of mounting cybersecurity threats of increasing subtlety—and a widening gap in the skills required to identify and combat them. Having someone who knows how to lead the charge in identifying and analyzing threats, creating strategic security plans and ensuring compliance requires the right level of expertise.

Join Towerwall & SnoopWall for a timely webinar on: Breach Prevention & Near-Term ROI

Join Towerwall & SnoopWall for a timely webinar on: Breach Prevention & Near-Term ROI

identification , SOX , Webinar , auditing , vulnerability , Near-Term ROI , PCI , malware , Breach Prevention , HIPAA , Compliance & Privacy , Compliance , SnoopWall , Zero-day malware , patch management , Gary Miliefsky , cannabis , Enterprise

Michelle Drolet

Towerwall & SnoopWall Complimentary Webinar: Breach Prevention & Near-Term ROI Tuesday, July 26 11:00am – 12:00pm EST

10 things I know about preventing ID theft

network security , Security Services , Data Security , ID Theft , Gift Cards , credit card security , Security Threat , Information Security , Application Security , Security , PCI , endpoint security system , Cloud Security , security policy , financial security , Security Alert , information security tips , Compliance , Big Data , Data Privacy , Mobile Security , Cash , cybersecurity , Data Breach

Michelle Drolet

10. Use cash or gift cards The threat of identity theft is reduced dramatically if you don't use your credit card for all your purchases, so consider using cash or even gift cards to pay your way.