Towerwall's InfoSec Blog

Content Type

See all

6 Steps to Building a Strong Breach Response Plan

Business Continuity , CCPA , Phishing , GDPR , phishing attacks , PCI , ransomware , HIPAA , Compliance & Privacy , Compliance , COVID-19 , Breach Response Plan , cannabis , Enterprise

Michelle Drolet

Cybersecurity resilience depends on having a detailed, thorough, and tested breach response plan in place. Here's how to get started. No matter how secure your business, data breaches are an unfortunate fact of life. Whether an attack is the result of a determined cybercriminal, a disgruntled insider, or simple human error, you can limit the damage with a carefully crafted response strategy. There’s a lot of groundwork to cover to begin building an effective strategy for coping with a breach:false

For true cybersecurity you must know what employees are doing

User behavior analytics (UBA) , Phishing , phishing attacks , malware , ransomware , employee , cannabis , Enterprise , Data Breach

Michelle Drolet

A look at some options for keeping tabs on your staff and the possible pros and cons. Securing your data in the digital age is very challenging, but it has never been more necessary. We just looked at the hair-raising cost of a data breach in 2018 and we know that employees are often the weakest link. In fact, over 90% of all cyber-attacks are successfully executed with information stolen from employees, according to the Identity Management Institute. The majority of these employees arefalse

5 Tips to Help you Block Ransomware

sandbox , Social Engineering , Phishing , SamSam attack , phishing attacks , PCI , ransomware , malwarebytes , cannabis , Enterprise

Michelle Drolet

Learn about best practices to combat the threat of ransomware There have been some seriously nasty ransomware attacks in the last few years. From Petya to Wannacry to the SamSam attack on health record company Allscripts just last month, ransomware has been wreaking havoc across the world. Global ransomware damages exceeded $5 billion last year, up from $325 million in 2015. That’s a meteoric rise. The sad thing is we understand the risks and how to mitigate them. A few simple steps can atfalse

4 Steps to Launch a Security Awareness Training Program

phishing attacks , ransomware , Training , Security Awareness Training Program , cannabis , Enterprise

Michelle Drolet

Policies and software are not enough to secure your data, staff must be regularly trained. Your organization might have the most robust security program in the world. You may have stringent policies, and the latest and greatest security software tools. You might think your data is safe, but if your employees don’t have the right training or a working understanding of your policies and the potential risks, then all your magnificent defenses can be easily side-stepped. As many as 81% offalse

Scan the Dark Web for Threat Intelligence

Phishing , phishing attacks , dark web , ransomware , Threat Intelligence , cannabis , Enterprise

Michelle Drolet

It may be possible to glean valuable security insights by monitoring the dark web. Although awareness of the importance of cybersecurity is spreading, the number of successful cyber-attacks continues to grow with every passing year. Globally, almost 1.9 billion data records were compromised in the first half of 2017, up 164% compared to the last six months of 2016, according to Gemalto’s Breach Level Index report. Many companies are struggling to secure their data in the face of ever morefalse

Making a bad situation worse: how Equifax mishandled the breach

KrebsonSecurity , Social Security Number , high-profile data breaches , hacking , GDPR , phishing attacks , cannabis , Enterprise , Equifax

Michelle Drolet

Companies must respond to data breaches properly to limit the damage. Unfortunately, Equifax did not. There have been some very high-profile data breaches in the last few years, but the latest disaster to hit the headlines concerns one of the largest credit bureaus in the United States. It’s estimated that the Equifax data breach exposed 143 million consumers, with cybercriminals accessing birth dates, addresses, and even Social Security, credit card and driver’s license numbers, making itfalse

5 InfoSec concerns for colleges and universities

device management , database systems , Phishing , phishing attacks , malware , cybercriminals

Michelle Drolet

Higher education institutions are a prime target for cybercriminals, and IT needs resources to prevent attacks and provide a proper level of security No industry or sector is immune to data breaches, but some are targeted more often than others. Education came ahead of government, retail and financial sectors, and it was second only to healthcare on Trend Micro’s list of the most-breached industries. With more than 500 security breaches across 320 higher education institutions since 2005,false