Towerwall's InfoSec Blog

Content Type

See all
8 Common Pen Testing Mistakes and How to Avoid Them

8 Common Pen Testing Mistakes and How to Avoid Them

Penetration Tests , Phishing , Application Security , PCI , malware , ransomware , HIPAA , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Penetration testing is vital, but are you doing it right? Here are some common mistakes and advice on how to avoid them.

Why Penetration Testing Is Critical To Bolster Your Cybersecurity Efforts

Why Penetration Testing Is Critical To Bolster Your Cybersecurity Efforts

Forbes Technology Council , Phishing , ransomware , cybercrime , penetration testing , cannabis , Enterprise

Michelle Drolet

The threat of a cybercriminal gaining access to your network is a constant source of anxiety. Amid all of the high-profile data breaches, businesses and organizations of all sizes have been successfully targeted by hackers who employ a wide range of different strategies. Too many companies have had to learn all about the potential cost of a data breach firsthand. The important thing to keep in mind is that all these companies had top-tier security measures and professionals, yet they werefalse

A Cybersecurity Checklist For The New Norm

Phishing , ransomware , COVID-19 , cannabis , Enterprise

Michelle Drolet

Unauthorized software and devices and stressed and distracted workers have expanded the attack surface and left businesses exposed to a number of cyber-risks. Small and medium-sized businesses in particular are most vulnerable since a majority of them run legacy or outdated systems.

6 Steps to Building a Strong Breach Response Plan

Business Continuity , CCPA , Phishing , GDPR , phishing attacks , PCI , ransomware , HIPAA , Compliance & Privacy , Compliance , COVID-19 , Breach Response Plan , cannabis , Enterprise

Michelle Drolet

Cybersecurity resilience depends on having a detailed, thorough, and tested breach response plan in place. Here's how to get started. No matter how secure your business, data breaches are an unfortunate fact of life. Whether an attack is the result of a determined cybercriminal, a disgruntled insider, or simple human error, you can limit the damage with a carefully crafted response strategy. There’s a lot of groundwork to cover to begin building an effective strategy for coping with a breach:false

VCISO: A Pragmatic Path To Cybersecurity In Pandemic Times And Beyond

Social Engineering , Phishing , COVID-19 , cannabis , Enterprise

Michelle Drolet

Covid-19 has disrupted our lives and caused a lot of stress and panic globally. Even though lockdowns may be relaxing, cyber-attacks are showing no signs of slowing down. The pandemic has created the perfect environment for hacktivists to strike with a high degree of success. Let’s understand the top five reasons for this:

10 (More) Free Security Tools Worth a Look

Sophos Intercept X for Mobile , Sophos XG Firewall Home Edition , Have I Been Pwned? , Phishing , GDPR , Application Security , PCI , AT&T Alien Labs Open Threat Exchange (OTX) , ransomware , HIPAA , KnowBe4 Phish-prone , Qualys Cloud Platform Community Edition , Compliance , KnowBe4 RanSim , Imperva Scuba Database Vulnerability Scanner , LogRhythm NetMon Freemium , COVID-19 , Kali Linux , cannabis , Free Security Tools , Enterprise

Michelle Drolet

Security pros have a lot to juggle, but look in the right places and you can find invaluable assistance for free. Maintaining security is a never-ending business. There’s so much to worry about, from misconfigured software to phishing attacks to a rapidly expanding inventory of devices with their own vulnerabilities and update requirements. We could all use a little help to stay on top of things, as we strive to assess where issues lie, protect data effectively, and test the defenses we havefalse

Inside InfoSec Panel 2: Zero Trust Architectures Expert Panel

Webinar , Phishing , Zero Trust , ransomware , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Live online July 2, 2020 12:00 pm ET Panelist include: Michelle Drolet, Towerwall, Itay Nachum, Safe-T, Scott Tingley, Cogito & Tom Ward, Qnext Data breaches are on the rise, highlighting no organization is safe from cyberattacks. One cause is that workforce mobility and cloud computing has placed most workloads beyond the shelter of corporate networks and traditional perimeter defenses. There are no perimeters. What are the issues, drivers and considerations for how Information Technology andfalse

10 Things I know about ... Working from home

Business Continuity , Worcester Business Journal , Phishing , ransomware , 10 Things I Know , Remote Workforce , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

10) Zooming out. Video conferencing is a two-edged sword; while a boon to nurture group discussion, the degree of focus paid to a small screen while feeling self-conscious (how’s my hair?) can oversaturate users. People are now reporting Zoom fatigue, citing anxiety. Identify mental health and grief counsellors who can step in during these COVID-19 times.

Five Things To Keep In Mind Before Adopting A Zero Trust Security Approach

Business Continuity , Phishing , Zero Trust , ransomware , COVID-19 , cannabis , Enterprise

Michelle Drolet

The COVID-19 pandemic has brought about a seismic shift in how the world goes to work. Apart from essential services, remote work is the new normal, mandated everywhere — even in organizations that never previously offered remote work options.

Inside InfoSec 1: Malware in the time of COVID-19

Webinar , Diana Kelley , Phishing , ransomware , Information Security Summit , Microsoft , COVID-19 , cannabis , Enterprise

Michelle Drolet

Live online June 4, 2020 12:00 pm ET Presented by Diana Kelley, Cybersecurity Field CTO, Microsoft Michelle Drolet, CEO, Towerwall Wherever we turn it feels like the news is all COVID-19 all the time. Many of us are feeling stressed and overwhelmed and attackers know it. At Microsoft, we've seen an increase in the success of phishing attacks, one of the common vectors for malware and ransomware infections. Rather than inventing entirely new exploits, attackers are pivoting their existingfalse