Towerwall's InfoSec Blog

Content Type

See all
8 Common Pen Testing Mistakes and How to Avoid Them

8 Common Pen Testing Mistakes and How to Avoid Them

Penetration Tests , Phishing , Application Security , PCI , malware , ransomware , HIPAA , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Penetration testing is vital, but are you doing it right? Here are some common mistakes and advice on how to avoid them.

5 Steps To Develop An Incident Response Plan

NIST framework , ISO 27001/2 , Penetration Tests , Incident Response Plan , Phishing , GDPR , IBM , PCI , Consumer Privacy Rights and Enforcement Act , malware , ransomware , HIPAA , Compliance , COVID-19 , cannabis , cybersecurity , Enterprise

Michelle Drolet

It’s almost a no-brainer that all organizations, regardless of their size, need some form of cybersecurity. Cybersecurity not only means that you protect your digital assets against a cyberattack, but it also means that you must plan for the inevitable. What if your data is breached or your systems are attacked? Seems pretty obvious, doesn't it? Data however, seems to tell another story. A recent survey by the U.K. government has revealed that only 16% of all U.K. businesses have formalfalse

Always be Prepared: Monitor, Analyze and Test your Security

Center for Internet Security (CIS) , Incident Response and Management , 20 Critical Security Controls , web application security , Penetration Tests , Application Software Security , open-source software , Red Team Exercises , CIS Controls , Compliance & Privacy , penetration testing , OWASP , cannabis , Enterprise

Michelle Drolet

Stay vigilant, plan your response and test your defenses with CIS Controls 18, 19 and 20 This is the final entry in our series on the 20 Critical Security Controls devised by the Center for Internet Security (CIS) as best practices to help the public and private sectors tighten their cybersecurity. We started down the path of building a solid security foundation by taking inventory of hardware and software, we looked at vulnerability assessment and administrative privileges, and we discussedfalse