Towerwall's InfoSec Blog

Content Type

See all

Dealing with Phishing Messages

network security , Security Services , security software , Data Security , Security Regulations , Social Engineering , Security Threat , Phishing , Security Program , Information Security , Security , Hackers , cyber-attack , cybercriminals , Security Alert , information security tips , internal emails , security research , Mobile Security , email scam , cannabis , cybersecurity , Enterprise

Michelle Drolet

According to the article in Dark Reading, Study: Phishing Messages Elude Filters, Frequently Hit Untrained Users, many people are still being tripped up by phishing emails. The article summarizes the findings of a survey that was conducted at the Black Hat USA security conference held in July 2012. Of the 250 conference attendees that were polled, 69% said that phishing messages get past spam filters and into users’ inboxes on a weekly basis. Over 25% indicated that top executives and otherfalse

BYOD means Bring Your Own Dilemma

network security , Security Services , security software , BYOD , Security Regulations , Security Threat , Information Security , Security , Hackers , cyber-attack , security policy , cybercriminals , Tablets , Security Alert , information security tips , Mobile Security , cybersecurity , Enterprise

Michelle Drolet

It’s becoming more and more common for workers to store work-related documents on their smartphones, tablet computers and other devices they bring to and from work each day. While this can be convenient--employees can access important documents at home or on the road--it also creates greater security risks for businesses.

Microsoft Windows Update emails try to steal your Gmail, Yahoo, AOL passwords...

Yahoo , Security Services , passwords , security software , Data Security , Social Engineering , Security Threat , AOL , Phishing , Information Security , Security , Hackers , cyber-attack , security policy , cybercriminals , Microsoft , Gmail , Security Alert , information security tips , internal emails , Web Browser , security research , email scam , cannabis , cybersecurity , Enterprise

Michelle Drolet

Beware any emails which claim to come from privacy@microsoft.com - it could be that you're being targeted in an attack designed to steal your AOL, Gmail, Yahoo or Windows Live password. At first glance, if you don't look too carefully, the emails entitled "Microsoft Windows Update" may appear harmless enough. But the grammatical errors and occasional odd language should raise alarms bells that the emails may not really be from Microsoft. Dear Windows User, It has come to our attention thatfalse

Separation of Corporate and Personal: Best Practices for Securing Data on Mobile Devices

Security Partners , Security Services , security software , Data Security , Security Regulations , Security Threat , Security , security policy , Security Alert , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

As the BYOD trend gains momentum, not all employees are comfortable having their personal phones locked down and controlled as tightly as a corporate-issued device. To get around this issue some organizations are turning to separation techniques to securely manage corporate email, apps, and docs on employee devices while keeping personal data out of sight and out of mind.

Beware of BYOD Harming your Company

Security Partners , network security , security software , Data Security , BYOD , Security Regulations , Security Threat , Security Program , Information Security , Security , Cloud Security , security policy , Security Alert , information security tips , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

It’s becoming more and more common for workers to store work-related documents on their smartphones, tablet computers and other devices they bring to and from work each day. While this can be convenient -- employees can access important documents at home or on the road --it also creates greater security risks for businesses.

Introducing our Security Training Toolkit

Security Partners , Security Services , Data Security , Security Regulations , Security Program , Information Security , Security , vulnerability scanning , Hackers , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Compliance , cannabis , cybersecurity , Enterprise

Michelle Drolet

A customizable security training program for your review. We're giving you all the tools you need to keep your employees out of trouble. Whether you’re starting a program from scratch, or just in need of some refresher materials, we’ve got you covered. Here’s whats included in the Towerwall Security Training Toolkit:

Hackers leak 1 million Apple device IDs

Security Partners , Security Services , security software , Data Security , ID Theft , Security Regulations , Mobile Devices , Security Threat , Security Program , Information Security , Security , Mobile Apps , Hackers , cyber-attack , Compliance & Privacy , Apple , cybercriminals , Security Alert , information security tips , Mobile Protection , security research , Mobile Security , cybersecurity , Enterprise

Michelle Drolet

To cap off a summer of devastating corporate data breaches, hackers yesterday posted online what might be the crown jewel of 2012 data dumps: 1 million identification numbers for Apple iPhones, iPads and iPod Touch's, all purportedly stolen from the FBI. There may also be an additional 11 million Apple device IDs yet to be released, many with users' full names, addresses and telephone numbers attached.

Why You Need A Mobile Device Policy

Security Partners , network security , Security Services , security software , Data Security , BYOD , Security Regulations , Mobile Devices , Security Threat , cisco , Security Program , Information Security , Security , Mobile Apps , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Compliance , Mobile Protection , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Whether you choose to embrace it or try to resist it, the BYOD (Bring Your Own Device) trend is set to grow. A study by Cisco Systems found that 78 percent of white-collar workers in the U.S. use a mobile device for work and 41 percent indicated that most smartphones that connect to the company network are actually employee-owned. So, if you don't already have a BYOD policy, you need one. Employees will connect to your network and use their personal mobile devices for work, whether you allow itfalse

Symantec Update Causes Some XP Systems to BSOD

security software , Data Security , Security Threat , Information Security , Application Security , software updates , Security Alert , information security tips , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

Security firm Symantec released malware signature updates for it antivirus software that caused some Windows XP machines to crash into a Blue Screen Of Death — BSOD. The update was sent out to users of Symantec’s security products over about an eight hour period between July 11th and 12th. “The root cause of the issue,” writes Symantec’s Orla Cox, “was an incompatibility due to a three way interaction between some third party software that implements a file system driver using kernel stackfalse

The worst passwords you could ever choose

Security Partners , network security , Security Services , passwords , security software , Data Security , Security Regulations , credit card security , Security Threat , Security Program , Information Security , Cloud Security , security policy , penetration testing , financial security , Security Alert , information security tips , Compliance , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

For those on our Security Alert and Update list we just emailed this great article by Graham Cluley on the worst possible passwords you could ever choose. Many of you know this is something we preach to our clients on a regular basis and is part of our comprehensive 4E Program. Too many internet users are making poor decisions when choosing their passwords. We've spoken time and time again about the importance of choosing hard-to-crack, unguessable, unique passwords that (provided the websitefalse