Towerwall's InfoSec Blog

Content Type

See all

Best Practices for Securing Your Organization in 2019 - 1/15/19

CISO , Phishing , BrightTalk , PCI , ransomware , 2019 , cannabis , cybersecurity , Enterprise

Michelle Drolet

Best Practices for Securing Your Organization in 2019 Data breaches are on the rise and getting their fair share of media attention. It is no longer a question of "if", but "when" an organization will get breached. So, how are organizations preparing for the inevitable?

Don't Bite That Phishing Bait: Bet On These Five Simple Safety Rules

Social Engineering , Phishing , Anti-Phishing Working Group (APWG) , Forbes , cloud phishing , cannabis , Enterprise

Michelle Drolet

Bad actors have taken advantage of unpatched systems, software vulnerabilities and increasingly devious forms of malware for years, but their preferred weapon is often phishing. While their motives haven’t changed — luring target victims to click highly legitimate-looking emails so they can steal the keys to the castle — I've seen their attack methods grow more sophisticated as the CEO of a data security services provider.

The Rise of Targeted Ransomware

Webinar , Business Continuity , Michelle Drolet , Phishing , BrightTalk , malware , ransomware , COVID-19 , cannabis , cybersecurity , Breach Response , Enterprise , Data Breach

Michelle Drolet

The Rise of Targeted Ransomware What is targeted ransomware? Are you susceptible? What can you do to defend against it? Presented by: Michelle Drolet, CEO, Towerwall

Mindset Entrepreneur featuring Michelle Drolet

Mindset Entrepreneur featuring Michelle Drolet

Business Continuity , CCPA , Phishing , GDPR , PCI , malware , ransomware , HIPAA , Compliance & Privacy , Compliance , cannabis , Enterprise

Michelle Drolet

Michelle Drolet sits down with Mindset Entrepreneur. Click the image below to watch now:

5 Open Source Intrusion Detection Tools That Are Too Good to Ignore

Android , OSSEC , Open DLP , Phishing , Data Loss Prevention (DLP) , Application Security , Snort , malware , Bro , Windows , Kismet , iOS , cannabis , Enterprise , Open Source

Michelle Drolet

Everyone should employ an intrusion detection system (IDS) to monitor their network and flag any suspicious activity or automatically shut down potentially malicious traffic. We look at five of the best open source options. As cybersecurity professionals, we try to prevent attackers from gaining access to our networks but protecting perimeters that have grown exponentially with the rise of mobile devices, distributed teams, and the internet of things (IoT) is not easy. The unpalatable truth isfalse

Meetup: GDPR Context and Myth Busters by Our Resident Expert Greg Albertyn - Thursday, September 6, 2018

Meetup: GDPR Context and Myth Busters by Our Resident Expert Greg Albertyn - Thursday, September 6, 2018

Armis , InfoSec at Your Services Meetup , CCPA , InfoSec at Your Services , Phishing , GDPR , PCI , malware , ransomware , Internet of Things , HIPAA , Compliance & Privacy , Events , Compliance , COVID-19 , meetup , cannabis , Enterprise

Michelle Drolet

Join us for our next InfoSec at Your Services Meetup: "GDPR Context and Myth Busters by Our Resident Expert Greg Albertyn" Hosted by Michelle Drolet and Greg Albertyn

For true cybersecurity you must know what employees are doing

User behavior analytics (UBA) , Phishing , phishing attacks , malware , ransomware , employee , cannabis , Enterprise , Data Breach

Michelle Drolet

A look at some options for keeping tabs on your staff and the possible pros and cons. Securing your data in the digital age is very challenging, but it has never been more necessary. We just looked at the hair-raising cost of a data breach in 2018 and we know that employees are often the weakest link. In fact, over 90% of all cyber-attacks are successfully executed with information stolen from employees, according to the Identity Management Institute. The majority of these employees arefalse

5 Tips to Help you Block Ransomware

sandbox , Social Engineering , Phishing , SamSam attack , phishing attacks , PCI , ransomware , malwarebytes , cannabis , Enterprise

Michelle Drolet

Learn about best practices to combat the threat of ransomware There have been some seriously nasty ransomware attacks in the last few years. From Petya to Wannacry to the SamSam attack on health record company Allscripts just last month, ransomware has been wreaking havoc across the world. Global ransomware damages exceeded $5 billion last year, up from $325 million in 2015. That’s a meteoric rise. The sad thing is we understand the risks and how to mitigate them. A few simple steps can atfalse

10 Things I Know About… Cybersecurity trends

Virtual CISO , Worcester Business Journal , Phishing , Data breaches , PCI , malware , ransomware , cybersecurity trends , 10 Things I Know , IoT , cannabis , cybersecurity , vCISO , Enterprise

Michelle Drolet

10) Data breaches. Nearly 5 million data records are lost or stolen worldwide every single day, or 58 records every second. According to an IBM report, the average cost of a data breach is $7.3 million.

The Cost of a Data Breach in 2018

Business Continuity , CCPA , Phishing , GDPR , PCI , malware , ransomware , General Data Protection Regulation (GDPR) , HIPAA , Compliance & Privacy , penetration testing , Compliance , cannabis , 2018 , Enterprise , Data Breach , Equifax

Michelle Drolet

58 data records are stolen every second at an average cost of $141 each. Trading in intellectual property and personal data is so widespread that someone invented a calculator that can estimate the potential harm to your own business. Nearly 5 million data records are lost or stolen worldwide every single day, according to the Breach Level Index. That’s a staggering 58 records every second. High profile data breaches hit the headlines with worrying frequency. Just last year there werefalse