Towerwall's InfoSec Blog

Content Type

See all

Delivering Secure & Compliant Remote File Access with Decentralized Cloud Computing - 10/1/19

Phishing , GDPR , malware , ransomware , COVID-19 , cannabis , Enterprise

Michelle Drolet

How to secure remote file access, sharing and collaboration with decentralized cloud computing.

Top Social Media Scams And How To Avoid Them

Scams , Romance Scams , Hidden URLs , Phishing , Social Phishing , Social Media , malware , ransomware , Clickbait , Quizzes , Shortened URLs , cannabis , Enterprise , two-factor authentication

Michelle Drolet

Social media has completely changed the way humans interact. Our lives have become increasingly public as we all share a variety of personal information online on various social networks. 2019 has seen worldwide social media user numbers grow to almost 3.5 billion, with 288 million new users in the past 12 months, pushing the global social media penetration figure to 45% and close to 80% of the U.S. population. Facebook and YouTube have more than a staggering 2 billion active users, Instagramfalse

Seven Tips For A Successful Security Awareness Training Program

FISMA , SOX , Phishing , GDPR , PCI , malware , ransomware , HIPAA , Compliance , Security Awareness Training Program , COVID-19 , cannabis , cybersecurity , Enterprise

Michelle Drolet

When we hear the word “cybersecurity” a lot comes to mind — firewalls, antivirus, endpoint protection, email security, web security and much more. But how often do we think or talk about people? This is a central element in cybersecurity that is often ignored. ‘To err is human"— it’s obvious that as humans we often make mistakes. And we can’t be programmed either. As humans, our behavior is largely unpredictable, and failure to account for insider threats can result into costly securityfalse

Five Steps For Creating An Advanced Threat Detection And Vulnerability Management Plan

risk tolerance , Advanced Threat Detection , Incident Response Plan , Phishing , GDPR , PCI , malware , ransomware , HIPAA , COVID-19 , Vulnerability Management Plan , cannabis , Enterprise

Michelle Drolet

While much of cybersecurity is focused on prevention, the simple fact is that many attacks are successful. Even a sophisticated, expensive security system is going to be breached from time to time. Smart attackers try to fly under the radar, biding their time and extracting maximum value or causing maximum carnage, sometimes over a period of months or even years.

Operationalizing Cybersecurity: Evolution, Seamlessness And Holistic Thinking As Key Drivers

operationalizing cybersecurity , Phishing , PCI , vulnerability management , cannabis , Enterprise

Michelle Drolet

When we say "operationalizing cybersecurity," what we are essentially saying is the implementation of best practices that strengthen your cybersecurity infrastructure. This results in a strong security posture able to address advanced and continuously evolving cyberthreats leveled at any organization. A well-defined cybersecurity strategy lies at the very root of seamless operationalizing. Key stakeholders like the C-suite and board members must actively define this strategy and ensure that itfalse

Build A Strong Cybersecurity Posture With These 10 Best Practices

Forbes Technology Council , Phishing , GDPR , MaaS , PCI , malware , ransomware , HIPAA , Compliance , COVID-19 , cannabis , cybersecurity , Enterprise , Equifax

Michelle Drolet

The numerous high-profile data breaches that took place in 2018 illustrate that no organization, irrespective of size, scale or scope, is immune from cyberattacks. Last year witnessed a 350% increase in ransomware attacks and a 70% increase in spear-phishing attacks.

7th Annual Information Security Summit - 6/6/19

MassBay Community College , IoT security , #summitbuzz19 , Phishing , GDPR , PCI , malware , ransomware , General Data Protection Regulation (GDPR) , Information Security Summit , HIPAA , Events , cannabis , Enterprise

Michelle Drolet

7th Annual Information Security Summit Presented by MassBay Community College and Towerwall, Inc.

Trends in Advanced Threat Detection & Vulnerability Management - 4/16/19

Phishing , GDPR , PCI , malware , ransomware , HIPAA , cannabis , Enterprise

Michelle Drolet

As cyber attacks become increasingly common, it is vital for organizations to be armed with the most effective tools and knowledge to prevent, detect and respond to cyber threats. Join this interactive Q&A panel with top security experts across the ecosystem to learn more about:

Watch Now: Operationalizing Cybersecurity - 3/19/19

Social Engineering , Phishing , malware , ransomware , COVID-19 , cannabis , Enterprise

Michelle Drolet

Cybersecurity, much like safety, cannot be achieved - it is an ongoing process that changes and adjusts to respond to the threat landscape, business needs and resources. As essential a cybersecurity strategy is to the enterprise, so is the implementation of it.

Battling Ransomware: How To Prevent A Ransomware Incident

security software , Social Engineering , Business Continuity , Phishing , PCI , malware , ransomware , cannabis , Enterprise

Michelle Drolet

Ransomware attacks can prove extremely disruptive and expensive to remedy. Prevention is better than finding a cure, and ransomware incidents are easily preventable with the right action. A few high-profile ransomware incidents have spread awareness, and many individuals and organizations have likely taken strides to protect themselves, which may have diminished the success rate of ransomware and prompted attackers to employ other means. A Kaspersky report shows a 30% decline in ransomwarefalse