Towerwall's InfoSec Blog

Content Type

See all

Seven Tips For A Successful Security Awareness Training Program

FISMA , SOX , Phishing , GDPR , PCI , malware , ransomware , HIPAA , Compliance , Security Awareness Training Program , COVID-19 , cannabis , cybersecurity , Enterprise

Michelle Drolet

When we hear the word “cybersecurity” a lot comes to mind — firewalls, antivirus, endpoint protection, email security, web security and much more. But how often do we think or talk about people? This is a central element in cybersecurity that is often ignored. ‘To err is human"— it’s obvious that as humans we often make mistakes. And we can’t be programmed either. As humans, our behavior is largely unpredictable, and failure to account for insider threats can result into costly securityfalse

Five Steps For Creating An Advanced Threat Detection And Vulnerability Management Plan

risk tolerance , Advanced Threat Detection , Incident Response Plan , Phishing , GDPR , PCI , malware , ransomware , HIPAA , COVID-19 , Vulnerability Management Plan , cannabis , Enterprise

Michelle Drolet

While much of cybersecurity is focused on prevention, the simple fact is that many attacks are successful. Even a sophisticated, expensive security system is going to be breached from time to time. Smart attackers try to fly under the radar, biding their time and extracting maximum value or causing maximum carnage, sometimes over a period of months or even years.

Build A Strong Cybersecurity Posture With These 10 Best Practices

Forbes Technology Council , Phishing , GDPR , MaaS , PCI , malware , ransomware , HIPAA , Compliance , COVID-19 , cannabis , cybersecurity , Enterprise , Equifax

Michelle Drolet

The numerous high-profile data breaches that took place in 2018 illustrate that no organization, irrespective of size, scale or scope, is immune from cyberattacks. Last year witnessed a 350% increase in ransomware attacks and a 70% increase in spear-phishing attacks.

7th Annual Information Security Summit - 6/6/19

MassBay Community College , IoT security , #summitbuzz19 , Phishing , GDPR , PCI , malware , ransomware , General Data Protection Regulation (GDPR) , Information Security Summit , HIPAA , Events , cannabis , Enterprise

Michelle Drolet

7th Annual Information Security Summit Presented by MassBay Community College and Towerwall, Inc.

Trends in Advanced Threat Detection & Vulnerability Management - 4/16/19

Phishing , GDPR , PCI , malware , ransomware , HIPAA , cannabis , Enterprise

Michelle Drolet

As cyber attacks become increasingly common, it is vital for organizations to be armed with the most effective tools and knowledge to prevent, detect and respond to cyber threats. Join this interactive Q&A panel with top security experts across the ecosystem to learn more about:

How Organizations Use Threat Intelligence To Boost Security - 4/15/19

GDPR , PCI , malware , ransomware , HIPAA , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

What is cyber threat intelligence, and how can organizations leverage it to identify threats and potential malicious activity in advance? Discover the best ways organizations can arm themselves with actionable threat intelligence to block cyber attacks or mitigate their impact. Join this panel of experts to learn more about:

Watch Now: Operationalizing Cybersecurity - 3/19/19

Social Engineering , Phishing , malware , ransomware , COVID-19 , cannabis , Enterprise

Michelle Drolet

Cybersecurity, much like safety, cannot be achieved - it is an ongoing process that changes and adjusts to respond to the threat landscape, business needs and resources. As essential a cybersecurity strategy is to the enterprise, so is the implementation of it.

What Exactly Is Automated Penetration Testing? - 2/27/19

Business Continuity , malware , ransomware , penetration testing , cannabis , Enterprise

Michelle Drolet

What Exactly Is Automated Penetration Testing? Software-based penetration testing is here! Learn how leading companies are taking advantage of this new technology to drive cost-effective remediation.

Best Practices for Protecting Your Business from Cybercrime

Business Continuity , ransomware , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

Best Practices for Protecting Your Business from Cybercrime Cybercrime has evolved from random activities being carried out by individuals into a billion dollar illegal industry that continues to grow. How is cybersecurity keeping up with the rise of cybercrime?

An Introduction to New Technology - Automated Penetration Testing - 1/16/19

ransomware , penetration testing , cannabis , Enterprise

Michelle Drolet

An Introduction to New Technology - Automated Penetration Testing In this webinar, we will review Automated Penetration Testing - principles, benefits, use cases, case studies, and live demo.