Towerwall's InfoSec Blog

Content Type

See all

10 Things I Know About ... Passwords

passwords , security software , Data Security , Security Regulations , credit card security , Security Threat , Security Program , Information Security , Application Security , Security , Hackers , Cloud Security , security policy , cybercriminals , information security tips , Big Data , Data Privacy , security research , cybersecurity , Data Breach

Michelle Drolet

Join us for Sophos' Upcoming Event: Today’s Threat Landscape – How to Stay Safe

Security Partners , security software , Data Security , threat landscape , Security Threat , Security Program , Information Security , Security , Hackers , cybercriminals , Events , information security tips , cybersecurity , Enterprise

Michelle Drolet

Join us for Sophos' upcoming event:

How to Expose Cyber-Attacks and Combat Threats

Security Partners , network security , security software , Data Security , Security Threat , Security Program , Information Security , Security , endpoint security system , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Published by Michele Drolet, CEO of Towerwall Proper analysis will flag suspicious behavior and allow the IT department to assess the threat and take action to close it down Cybercriminals are employing more sophisticated techniques all the time and far too many companies and organizations still don't have the protection they really need to safeguard their systems. The prevalence of targeted attacks and advanced persistent threats (APTs) is disturbing. The risk is that security is breached,false

Towerwall Information Security Alert Vol 13.50 - Making phishing more complex - on purpose

Data Security , Security Regulations , Security Threat , Phishing , Security Program , Security , Hackers , cyber-attack , security policy , cybercriminals , Security Alert , security research , cybersecurity , Data Breach

Michelle Drolet

Earlier this week a colleague pointed out an intriguing phishing sample that he had come across. It was interesting not because of any great sophistication or complexity, but rather that it illustrated the reuse of an old social engineering trick. The brand being targeted in the phish campaign is Poste Italiane, a well-known Italian group that includes financial and payment services in its product portfolio. We see numerous phishing attacks targeting this group each month, with attackers keenfalse

Towerwall's Michelle Drolet on Fox 25 to Present MassBay Scholarship Foundation with $10,000 Donation

Security Partners , Data Security , Towerwall , Michelle Drolet , MassBay , Security Program , Information Security , Security , Information Security Summit , cybercriminals , Events , information security tips , Fox 25 , Data Privacy , Scholarship , cybersecurity , Data Breach

Michelle Drolet

Boston News, Weather, Sports | FOX 25 | MyFoxBoston We are delighted to provide $10,000 to the MassBay Scholarship Foundation so the next generation can become cyber security experts. To learn more about the MassBay Foundation and the Information Security Summit Scholarship, click here.

How Can you Expose Targeted Attacks and Combat APTs?

network security , Security Services , security software , Data Security , Towerwall , Security Regulations , Security Threat , Security Program , Information Security , Application Security , Security , malware , endpoint security system , Cloud Security , cyber-attack , cybercriminals , penetration testing , financial security , information security tips , Big Data , Data Privacy , APT , vulnerability management , cybersecurity , Data Breach

Michelle Drolet

Cybercriminals are employing more sophisticated techniques all the time and far too many companies and organizations still don’t have the protection they really need to safeguard their systems. The prevalence of targeted attacks and advanced persistent threats (APTs) is disturbing. The risk is that security is breached, typically through manipulation of employees using a technique such as spear phishing, and existing security systems are unable to detect the attack. Data can be harvested forfalse

Critical fixes for Office, Outlook and IE in September Patch Tuesday

Security Services , Data Security , Office , threat landscape , Outlook , Security Threat , Security Program , Information Security , Security , Hackers , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Big Data , Data Privacy , IE , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Windows admins will have their hands full with the large number of security updates in this month's Patch Tuesday. There are fixes for 47 vulnerabilities in 13 bulletins for September's Patch Tuesday cycle. Four of this month's bulletins are critical. This year's total for bulletins is up to 79, a considerable increase from 62 at the same time last year. One critical bulletin this month addresses a remote code execution vulnerability in Microsoft Outlook, which can be exploited if users openfalse

First malicious apps to exploit critical Android bug found in the wild

Android , network security , Security Regulations , Mobile Devices , Security Threat , Phishing , Security Program , Information Security , Application Security , Security , Mobile Apps , Hackers , cyber-attack , security policy , cybercriminals , Tablets , Mobile Protection , security research , Mobile Security , cybersecurity , Enterprise

Michelle Drolet

Researchers have spotted the first in-the-wild apps to exploit a critical Android vulnerability allowing attackers to inject malicious code into legitimate programs without invalidating their digital signature. The two apps, distributed on unofficial Android marketplaces in China, help people find doctors and make appointments, according to a blog post published Tuesday by researchers from security firm Symantec. By exploiting the recently disclosed "master key" vulnerability—or possibly a false

Four Steps to Respond & Recover from Sophisticated Security Attacks

Security Partners , network security , security software , Data Security , BYOD , Security Regulations , credit card security , Mobile Devices , Security Threat , Security Program , Information Security , Mobile Apps , Hackers , endpoint security system , Cloud Security , cyber-attack , security policy , cybercriminals , financial security , Security Alert , information security tips , Compliance , Big Data , Mobile Protection , Data Privacy , security research , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Great information in SC Magazine’s latest whitepaper report, ‘Four steps to respond and recover from sophisticated security attacks’, it discusses the four proactive steps that you can – and should – take now to help keep your organization safe. Click here to view more details: http://bit.ly/131uu2J As we all know, cyber-attacks are becoming more sophisticated every year. At the same time, IT resources are moving outside the firewall and enterprises are distributing their applications and datafalse

Views from the Inside: Is your data safe with free cloud services? (guest post)

Security Partners , network security , Security Services , security software , Data Security , threat landscape , Security Threat , Security Program , Security , Hackers , Cloud Security , cyber-attack , HIPAA , security policy , cybercriminals , Security Alert , cloud services , Mobile Security , cybersecurity , Enterprise

Michelle Drolet

The overwhelming advantages of cloud-based file storage are not in dispute. You have an automatic backup of your files, which can be accessed on any device, at any time. Small amounts of storage are generally free, and large swathes of server space are coming down in price all the time. They absolve your business from the headache of backup management, disaster recovery, and bandwidth for instant anytime access. Convenient? Yes, most definitely. Safe and suitable for the enterprise? Well ...false